Analysis
-
max time kernel
1s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 22:57
Static task
static1
Behavioral task
behavioral1
Sample
064abfe570ed51ea5c42d975dbc72c4b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
064abfe570ed51ea5c42d975dbc72c4b.exe
Resource
win10v2004-20231222-en
General
-
Target
064abfe570ed51ea5c42d975dbc72c4b.exe
-
Size
604KB
-
MD5
064abfe570ed51ea5c42d975dbc72c4b
-
SHA1
3edb95aa105fe628016ba0d1e54752e53ed61e8f
-
SHA256
d1159c74722e98b3a64ef9545835dc77f815411eac982c1600d559baf8f0408e
-
SHA512
6b204670645f621772caabf236578e2e5d931e14ca2b0bf3743d1023e41a96c15b566364cee8f759579f20d534abb81e10d375ca6f9396b977c1521c2ded5304
-
SSDEEP
12288:GwWMrqdGLxsoIjW9QVNo8hg0rOj24q6xGJOpq0RypiI3F:GtYqdGVsoGQQNrOj2J0GkpOpvF
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 920 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1968 Utility.exe -
Drops file in System32 directory 13 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\Favorites\desktop.ini IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\Favorites IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\PrivacIE\Low IEXPLORE.EXE File opened for modification C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch ie4uinit.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\Low IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\TabRoaming IEXPLORE.EXE File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Launch Internet Explorer Browser.lnk ie4uinit.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\History\Low IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\UserData\Low IEXPLORE.EXE File opened for modification C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini ie4uinit.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low IEXPLORE.EXE -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Utility.exe 064abfe570ed51ea5c42d975dbc72c4b.exe File created C:\Windows\Mangerr.DLL Utility.exe File created C:\Windows\RAV2007.BAT 064abfe570ed51ea5c42d975dbc72c4b.exe File created C:\Windows\Utility.exe 064abfe570ed51ea5c42d975dbc72c4b.exe -
Modifies data under HKEY_USERS 20 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main Utility.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\Main\Check_Associations = "no" Utility.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Connection Wizard\Completed = 01000000 Utility.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\BrowserEmulation IEXPLORE.EXE Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\BrowserEmulation\TLDUpdates = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%windir%\System32\ie4uinit.exe",-732 = "Finds and displays information and Web sites on the Internet." ie4uinit.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings IEXPLORE.EXE Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\Setup\HaveCreatedQuickLaunchItems = "1" ie4uinit.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\BrowserEmulation\UnattendLoaded = "1" IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix IEXPLORE.EXE Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Connection Wizard Utility.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections IEXPLORE.EXE Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 ie4uinit.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Setup ie4uinit.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\Main\OperationalData = "4" IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1764 wrote to memory of 920 1764 064abfe570ed51ea5c42d975dbc72c4b.exe 19 PID 1764 wrote to memory of 920 1764 064abfe570ed51ea5c42d975dbc72c4b.exe 19 PID 1764 wrote to memory of 920 1764 064abfe570ed51ea5c42d975dbc72c4b.exe 19 PID 1764 wrote to memory of 920 1764 064abfe570ed51ea5c42d975dbc72c4b.exe 19 PID 1968 wrote to memory of 2428 1968 Utility.exe 20 PID 1968 wrote to memory of 2428 1968 Utility.exe 20 PID 1968 wrote to memory of 2428 1968 Utility.exe 20 PID 1968 wrote to memory of 2428 1968 Utility.exe 20 PID 2428 wrote to memory of 2752 2428 IEXPLORE.EXE 18 PID 2428 wrote to memory of 2752 2428 IEXPLORE.EXE 18 PID 2428 wrote to memory of 2752 2428 IEXPLORE.EXE 18
Processes
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2428 CREDAT:275457 /prefetch:21⤵PID:2244
-
C:\Windows\System32\ie4uinit.exe"C:\Windows\System32\ie4uinit.exe" -ShowQLIcon1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2752
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\RAV2007.BAT1⤵
- Deletes itself
PID:920
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" about:blank1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2428
-
C:\Windows\Utility.exeC:\Windows\Utility.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1968
-
C:\Users\Admin\AppData\Local\Temp\064abfe570ed51ea5c42d975dbc72c4b.exe"C:\Users\Admin\AppData\Local\Temp\064abfe570ed51ea5c42d975dbc72c4b.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1764
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
Filesize65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD564ef060c35dc09d702d89376ad7bf5c6
SHA104e8b76607ef244fefab6accbe12c25a7df8ebca
SHA2564736dd9fcaff19ff67fad1a776967844eab8ddc8eea23d123c360ffd91dfc83d
SHA51215945d4e803bad565996fd35cd2672522c97883d00fe5a85a18a8955ecf16be8b154752ff7eb3d1b9d71312042a2823f5b259994a50906c1cf8f5c191a733b53
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e7ec2351838a36c0a7d01cf35bdaeb7
SHA16cda6477b8419a90642bbd076867391ce4e2d24e
SHA2560538c13bca436b3137592fc0bc25ab1974439471379cac5b3a5e64190c9044b5
SHA5127807cb2f766000b2f40bdefb7cd8fe8118ef8b38421594de88310cfab0d630e8e75f4e71c3f37b28cbffc99129d58def3cb1e900e55f6ad002ac8a10303988cc
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa93d173f88497748ca20be3c264536a
SHA174b75fc125bd8b5554bc46fe894973e001782530
SHA256d9d15b6b65257e8e5183753c1ec3641a9714cba2e08880f249f1ebedf2fc002a
SHA5128f136cffa758a9d0284c884e1e13d75594a1841ea2be2e8f108ecd419eaf68ed36736c6c4a63e9243979b79aef9fb8ceec349c45b4d4382c6e4925874fb7c7d1
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5389be5a2828012c11d786c588d0f8a6f
SHA11eedd54d950a011f9860a170b4ed415879cf198a
SHA256504c73421379cf093ccd4b4f2ade45351036eb9751321c91581694a9a4596f97
SHA5124193aa5fd12559299f1c63b8c08778603f0d920c1d82d29ffd9ead6159e8dcdd8d164d358cc87552ab21819fbd23713ec0f0489f5515d8ec48ac70a0f6e26359
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5679bb02639dd742e031770b273a99f20
SHA15e097ca771caa3f53b225fd98dd267fe3e77fafa
SHA2568bdd1ed6b96b217cd8f5a1773cbb97453143a5e000093ef49bfc4348dda9b49b
SHA512f843ee59b1ec204763fec0e0d16a8c279f175d535a6de6d12243c647d2ab64a5809e20f026f571bac160c0c74aea422de5cac2f6cf9d41b986893a9dc0254fdd
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f6ded9cb300187110a03783120b639f
SHA1ad547a0832700919018e033aff62e0cc22a96e3f
SHA256bb9ff94bc141286bf8f554c973d82f017dbb29d727f43305e5dd0e3edfc60b67
SHA5127c6edaa517f7206f64ba72a18980261ebe298bdd6f3077a1b3a2f4e465098127e90fd3aab5a6903d5622da917226eb8c821b37af7e59e671295f8adf70688619
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD506eb712c842f16964b222b0954be6959
SHA1b52e1687c55f7a800bb7dc40a38ff51e3d536b90
SHA256f70cea85348a8199bd2841356abb37fb5996b386e2e67f999ebc2a014eef900c
SHA512a820b1d1c1b8330ba79d6712903fda5f95fb41a3c374dad5666b3b3d60803665d4e68e369b3d0ee467c2db6ccb17ad23b4964dc9dab0f8431ad922af556e94a3
-
Filesize
236B
MD511cede0563d1d61930e433cd638d6419
SHA1366b26547292482b871404b33930cefca8810dbd
SHA256e3ab045d746a0821cfb0c34aee9f98ce658caab2c99841464c68d49ab2cd85d9
SHA512d9a4cdd3d3970d1f3812f7b5d21bb9ae1f1347d0ddfe079a1b5ef15ec1367778056b64b865b21dd52692134771655461760db75309c78dc6f372cc4d0ab7c752
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
216B
MD52ce792bc1394673282b741a25d6148a2
SHA15835c389ea0f0c1423fa26f98b84a875a11d19b1
SHA256992031e95ad1e0f4305479e8d132c1ff14ed0eb913da33f23c576cd89f14fa48
SHA512cdcc4d9967570018ec7dc3d825ff96b4817fecfbd424d30b74ba9ab6cc16cb035434f680b3d035f7959ceb0cc9e3c56f8dc78b06adb1dd2289930cc9acc87749