Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 20:44
Behavioral task
behavioral1
Sample
0384663b4383114d9999466e3de32b4c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0384663b4383114d9999466e3de32b4c.exe
Resource
win10v2004-20231215-en
General
-
Target
0384663b4383114d9999466e3de32b4c.exe
-
Size
13KB
-
MD5
0384663b4383114d9999466e3de32b4c
-
SHA1
4782843c4ab093c6037ce3ed0b3b035b09d693a7
-
SHA256
f2009dec4af18f74e45d58a827a25a84a983b76ce3ca8b2a3e4a0f9b971a4ffa
-
SHA512
481023d5fd8a31f4d9027375aaeb0a43a38069a2b0fbb0468153f1382b1d093d7d091d9998371ad6a4ebc4b1e4c73c03b21817e1c51b3d3078f6af6dfcb3a52f
-
SSDEEP
192:LvOeihIaivohlwv7E64GL/VwJknr9ZCspE+TMwrRmK+vhOrF:5aivB7Nd/VwleM4mk
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2284-0-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2284-1-0x0000000000400000-0x0000000000408000-memory.dmp upx -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410066072" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d780000000002000000000010660000000100002000000082e549e82059c89f51257354b6b27c07b8981f064ab6645b9ac84b7eaa1f429b000000000e8000000002000020000000ddf73548138cafca631e29524cb7dfc2f4340d98b3cf68fea42c4e809313002820000000c4aedff7b3098c14d507eea084d9e21450b59a3b980f6b978a580871f28d47c540000000b5fc6e85e2caa5e38514c069040db68f009d91f37929f97db29737bd7fa7b5d0f90b5d77bfea2d4dd1f7598f6c17791e79ba598e530d88213a588bc4c6cb9cf7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{33DFF891-A6BD-11EE-BEA9-FE29290FA5F9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9046f908ca3ada01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1520 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2284 0384663b4383114d9999466e3de32b4c.exe 1520 iexplore.exe 1520 iexplore.exe 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2284 wrote to memory of 1520 2284 0384663b4383114d9999466e3de32b4c.exe 28 PID 2284 wrote to memory of 1520 2284 0384663b4383114d9999466e3de32b4c.exe 28 PID 2284 wrote to memory of 1520 2284 0384663b4383114d9999466e3de32b4c.exe 28 PID 2284 wrote to memory of 1520 2284 0384663b4383114d9999466e3de32b4c.exe 28 PID 1520 wrote to memory of 2168 1520 iexplore.exe 29 PID 1520 wrote to memory of 2168 1520 iexplore.exe 29 PID 1520 wrote to memory of 2168 1520 iexplore.exe 29 PID 1520 wrote to memory of 2168 1520 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0384663b4383114d9999466e3de32b4c.exe"C:\Users\Admin\AppData\Local\Temp\0384663b4383114d9999466e3de32b4c.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://ads.eorezo.com/cgi-bin/advert/getads?did=4332⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1520 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2168
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5d0e96502109ae31626b903f7f03a758a
SHA1a2723df35a23c54a760c880daa10c1655b6f2431
SHA2565f32c3a10e57fd5700a1d196f420927c06c26b69afc33e3c301cd6490e0c2f9b
SHA512be11f06659f405181a8eeeb2a1809f6fba1d361d946466432f3df6fd2979bd960d56fdcbe563e2300d3ca50ae7da0446187f5eb640b7f3a7c547d874ec30d555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5336fa56834f2b46417d4e0fee994128e
SHA1d04c7c10268b19190c032885c2408d8e89b18b2a
SHA256b6ce986bebc65f29710fae882410a51406089cfd9cfddde40640aaef4e946690
SHA512ef56b42fc47a839f0d6eba91cc8eccf203f4a2d6473d1f14bf3928828c7240bc12e2be4bcfe75c845e8ca8b5f1aa635a8e2c84e0613248f612144c84e35b0f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfad3388fab4e474683af1c21fc40842
SHA1581a7b303c9ef95fb09a494d1b5bcd2d9807316e
SHA256dc728a7e08445fef520040e20335b9c147d976cbcb4bbd1da6e9297386d645df
SHA512050e4e1234c71288b8a4cbc119cd405dca7f53ae93bbe06287390697b6fb308704225ab10b31ec65b8e363cb45205779beb9771c35e202170dca3dcd88545c74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527c37ee656391193915eff0c48da9d7e
SHA1368f3c9b412402eb5234287ae13892ba95e50afb
SHA256dd65ef6fc50ec77b2be93d9c19a55e98f461eae6ebfe2f34e0b35ae500c68cff
SHA512000a6f44308165ac48d16e34a79154e378251211c59a9463be6b592e15a3e7f94434087ab2651ab9c904f5001928e54f1d8b105ae111bf83d93b25dc3d75bf6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5124003feca31245aaaed71ea51b0a647
SHA1b77ec30a5b485b872019256c3b594aedee12d157
SHA256912f1554627476c47024cf63ad1f996352a963ff5b39ba423b03623ce03f48f6
SHA51280837b683deacf44fcd0fd275f00dab54b26362b701e29dd3962817896e91b229a7c6920db69afcc59b9bf24fe71872027959625284e3d60efa01178e30abae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a10fb7c11787bf7290a32d964464fe20
SHA169faf8af5680cd0db7d9f4ecf0bb389d42b73be1
SHA256155e57a7f778da2fb6380e6c0ac6a89107789d3c5df99d26877498b64fc267cb
SHA5123ba43abc06fa4809a5038443a52a85e1fca66a584ebbe4967527b6d549037b844aad8d2394f7ab16f69eb259ba79e9c56e1518bd13d5af9396207a6719ec602b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a88128b6b3d6f0ddc542b9efdd5e5b06
SHA14c0f73a52d2e14dd8bf1bb81f60b70a92e8cc7b6
SHA2562acbccabc67495f7e3e122264eb1c939fe19060e10d177afdff77329329f3954
SHA5121fd27741a63b1220e35bbf1f1f068d0be68ada85de865163362792622e7f322d9866b2689f633cb86813c0b356b2218da0a616650d6a33842b42692f4544a1dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59884ac155e69b3e22a6ddf24312dee70
SHA18679b039e67b529f1522eefff5ed8c973cf17277
SHA25680545c60c0c22ae241ef71f301eda964e08148ce0909a87f00c29351a197516a
SHA51212e25b04df0766c1001b5c1a9eedca4370954be1766d02c044d0b4513d9cd60d924f6385b9a0aded898cf369f7ab7195189465ebff01bdd6beb7263c81a1dabc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a169c021662614a9e9fcd2a919041a2
SHA1165c1a2ca6f4546c0bd338a6eb566c93a36fa11a
SHA2569025d8bf7f8d2394dfbea8242904c694794bce4b2ef9a93b5d730118a093e85f
SHA512536a5e9311be6a11e483fa1640ede2844d48e09bb1d022ea0098dfcddb256aeac8d014f23a67364a2f169f1f896644329e94a9df65e40ea04eb9679bd9c16d8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502ebe9170f8746d1ca034ce03288c16a
SHA193d84217d8f73e0ba02bdbf999de8a0bb09291c9
SHA256dec6cafe70d4888ef81ee50f0f4771f33464b9f54ab15fb082bb662902d60ca8
SHA512381480f6cf581e9958d02ef1b46db82ca0fcd0d0927c860e577fd4b671d09857dbcfc6af2fb025426d9fbcd7928dc1bfc997579b002dca34e1d97cb8680f9c7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5346ca9def0c8efe6f362afe41c814792
SHA19bdb8d1b647f4a8d14647bc6b1c4f2256c717d91
SHA256310b8eb548225161d7478826b5db743b94e45440e590aae8bf2f2ed08529deb4
SHA512868613be82404fa2c7ee5a95d0f712276d94f7db7f30b3b079f6620164b82390707c388e2e72007cc743094437a4391e47e2198880e004c79ba63253e33f87d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564c993e7c13ff1a10ca2687b80d9ddf9
SHA13c631d8fbddce30f1cc5a095af9bc7438f0b8b32
SHA256734a2efe79c4806e241d91e7bae770b3e73394e28029d73f8f6dc69cba5cfd20
SHA512d49596de0f49a9d771e355cbf185d9d973907603b88101e6c3b6842d6874e633dccb3a3801e3bb5f3128813ba6828db0f626a69a76ba5b3c73dbae5a10fb28f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD506a81e973713ebac5b1c2b9659cf22cc
SHA1d195d80349041588fad273303ddb40e168a20a50
SHA256d72e49d86b075d5793678edfad0f7cef68e27bff0869f60d6d7d898d59a7ac98
SHA512c1c199e48b648fba02b37c459f146e716ede81e55dc203b1f91d4f59ed34b21a911d9bc40a718dd439eb0fd0c74cddbd7e2ccd3b85d16364bdca09e97564947e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06