Analysis
-
max time kernel
132s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 21:53
Static task
static1
Behavioral task
behavioral1
Sample
1dab8aa897b6d76d4d39359c032c9493.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1dab8aa897b6d76d4d39359c032c9493.exe
Resource
win10v2004-20231215-en
General
-
Target
1dab8aa897b6d76d4d39359c032c9493.exe
-
Size
40KB
-
MD5
1dab8aa897b6d76d4d39359c032c9493
-
SHA1
bd1b02f8727ea38c1c4b250412015b83a2ea80a2
-
SHA256
e8243293ab1e538d6124d5e3109e6f1795bd91c15a93ae91ae86ea1ff96b4743
-
SHA512
43cfb911ea626b84fccd615f2028fe3ac8434bccba5e426919438cbdc6a973539cde5df2fac9cba2502d2f2cf32b678ca60472b912a375a6fca97ea520d7b1af
-
SSDEEP
384:9b3TOmywlnoAUrAxrpFjLhoBOrpFTkKrpFUMNB+GsN7bZDOzDkSTaJ:9bv1noXgrfsOrTZrdB+GsNM
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c00000000000000010000000083ffff0083ffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{595439D1-A878-11EE-B49B-CE253106968E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2604 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2604 iexplore.exe 2604 iexplore.exe 1868 IEXPLORE.EXE 1868 IEXPLORE.EXE 1868 IEXPLORE.EXE 1868 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2604 2088 1dab8aa897b6d76d4d39359c032c9493.exe 30 PID 2088 wrote to memory of 2604 2088 1dab8aa897b6d76d4d39359c032c9493.exe 30 PID 2088 wrote to memory of 2604 2088 1dab8aa897b6d76d4d39359c032c9493.exe 30 PID 2088 wrote to memory of 2604 2088 1dab8aa897b6d76d4d39359c032c9493.exe 30 PID 2604 wrote to memory of 1868 2604 iexplore.exe 32 PID 2604 wrote to memory of 1868 2604 iexplore.exe 32 PID 2604 wrote to memory of 1868 2604 iexplore.exe 32 PID 2604 wrote to memory of 1868 2604 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1dab8aa897b6d76d4d39359c032c9493.exe"C:\Users\Admin\AppData\Local\Temp\1dab8aa897b6d76d4d39359c032c9493.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2604 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558d9c58c53477119514805516122e0dc
SHA1eadd8fc1b151263e40c0e6a856087166d031f892
SHA2564524d14f2cb3b664938c6aab798cc9dd57cbcbb3dbe52f09dc240fb81af3bd11
SHA5126672f54bdfb6cce98bf813ab88b6e945721a792a205ba47eea3db7793200b59f0fca3ec8db623b945787b6764e362cd16fac5511a7fea45047825c1c2c4316ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a311fa7c2b02a9e8c1774835c742890
SHA182fc275dcb2ec25bcd2eb071aac4f25fa81cd026
SHA2562e080e854ff15be440c5656132e1ec9b43c045b69fab3c8982b01463d6432062
SHA512d2d0ff24431d15ddb55f11f1d6ae4e82eea1f1c5f11a8c62c0243685118d8e431e96c849eb002c7457f2f7d3f4e9b2a5ed78aebcd857f0fd4602ca2ea4d8ef15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58682b1c9bf89411f1a27171d4bf942c5
SHA1d4bea4cde6b3bdccced95074ff50a2e88422931c
SHA2565a514b9ebe1e81ce0b59a2480a3a60344d56af7b1f966b09cdeff274cf044cb1
SHA5129bedbf4b56ac9865a09b98e280dcb76f539479b6ff1ea479173473100ad86f729ad6575c81dc63e347e024464c4bd2c3342ec672f4bd53f7308243ef2c4dfa1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576ec3f4dbc15bf125ca0cf7c58dd971e
SHA166ea15845ffa3e268bb1d81b0d46f385072f0166
SHA2562cac1296d003f0ea45220d8ba4776d40ba79af419187bc8290563af4091ff15f
SHA5126d990098593b4718e76f777f28ce695cf803920255828b009965a6eccc97502eb6befbd201a3d3d7a4757a7ce90aa10ab6d9962db34d92add0f5d6ee83ec23ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dd39f5a72bc7fefd1d812a449b750af
SHA15fdaff20b3a0c8120b42371a68a8baeb8fb1c3f9
SHA256ab6cd11baf7d3b3f8bab60c1a20ad8a80f3b6db4d4cd48096f98a5da98820459
SHA51247603761e5df42126a8b6d863573b426e10e374654d43b7026e2b176e2cc2911ba2c07cdc3232d5c9f6f82cebcb13cf01bf9d486147ee0887b04473ab4b2c353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a86e0cfcabf73a727d390ee2dfe7b558
SHA1ef37b91ddd2ff70124d0e036934542a5d4869fa9
SHA2564e079145ba7957fa59bc426c781cf2ee469318bca03406744363a6817ce446cd
SHA512d9d6b7aedb7a7eb9cd84f6e31dd7cac2bbaede51bb4fe60eba961ba6e08d64400bb80a5d304d042b37349fca57fefe3daf5cc0032315972ee61f4b742c1887e3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06