Analysis
-
max time kernel
121s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 00:56
Behavioral task
behavioral1
Sample
093d0d01c6187eacf34d4213014d88fc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
093d0d01c6187eacf34d4213014d88fc.exe
Resource
win10v2004-20231215-en
General
-
Target
093d0d01c6187eacf34d4213014d88fc.exe
-
Size
13KB
-
MD5
093d0d01c6187eacf34d4213014d88fc
-
SHA1
9b2df972af1d7731ad7235757131ffb8f654cf85
-
SHA256
3b35745a6c23954456a1571d1df15ad13f17fed56b175a55f2652eaebea55045
-
SHA512
54d4048c689b8cad8306dac66853911a08f82972505520bca15b3c0dfac0930c2067071397f0459948951805dbd3babf3698f2850da9b260f51f081bf12223ab
-
SSDEEP
192:CS4gbgkAN4SJj+bfrJsUwv7E67Pwnr9ZCspE+TMwrRmK+vhOr+0Ta:CS4uI44aJ+7NbNeM4ml0Ta
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2132-0-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2132-1-0x0000000000400000-0x0000000000408000-memory.dmp upx -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e9178664000000000200000000001066000000010000200000008574f88acd8f920ca747c481ba7a956fe5ade0dd769e5738450279316a79a585000000000e8000000002000020000000005116d59ce40255b117c9e8d0e4a4fc58839c3ffdadc86a996095a6b597d326200000008e8c808db79c281536c4d295e8d9d8a7fe9210d43b5580b92c0825bbf9e9bad44000000023af5d73b5de2eab11d49324c8d45ba5c39610e7a1b094e51c4132550697aa38eb0b1d88c0608812699c03fdc4fbafdc22dbd3fa722fb28ccb47b0362f1e411f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410099597" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{40E9C0E1-A70B-11EE-BB9C-CE9B5D0C5DE4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b04a1818183bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2424 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2132 093d0d01c6187eacf34d4213014d88fc.exe 2424 iexplore.exe 2424 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2424 2132 093d0d01c6187eacf34d4213014d88fc.exe 28 PID 2132 wrote to memory of 2424 2132 093d0d01c6187eacf34d4213014d88fc.exe 28 PID 2132 wrote to memory of 2424 2132 093d0d01c6187eacf34d4213014d88fc.exe 28 PID 2132 wrote to memory of 2424 2132 093d0d01c6187eacf34d4213014d88fc.exe 28 PID 2424 wrote to memory of 2784 2424 iexplore.exe 29 PID 2424 wrote to memory of 2784 2424 iexplore.exe 29 PID 2424 wrote to memory of 2784 2424 iexplore.exe 29 PID 2424 wrote to memory of 2784 2424 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\093d0d01c6187eacf34d4213014d88fc.exe"C:\Users\Admin\AppData\Local\Temp\093d0d01c6187eacf34d4213014d88fc.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://ads.eorezo.com/cgi-bin/advert/getads?did=432⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5064b776d7b2a0938110e3937d7812d32
SHA1976a4da7700bd45357b0b9ea334045c188928880
SHA2561a701385cca503c0d5b27e47411fa45591d862b9fce11b95b6ac9b0a30263baa
SHA512989d8006917468c23b4cb2eaf930d002534caae701b96e760e71f49ced1fb2a133f8e631237c1c20ed74b72244dda5ba3ad5bbbf3f3e5e03bbdba48d2c5c1edf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58846e653dd65f5104740fd1c01979d04
SHA12b7e1ce8ed2b5efa19c224be881656b89f4fa29d
SHA25605de7d5d34df5721dc0464dc1354e3ad195f308e2673f85b1a5b288e4c21d2ea
SHA512cd381936676ef293699d1ed4a24284e17157bd05011650ca81c2062842146be9b23d1a25b46869fc2ee2ad348d558ccb18a27c59bc059b343a9c0a228e0229ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5373c698e0ba430cd28cc2efdbfee2637
SHA1f8fd2c9fd643a395c5540e8ccce5d9408e2172cb
SHA25620f50f67039b062294640ac7a6ae605cc8ee389c0bbac2ecb93272d0ddcbb3c4
SHA512085d107aa3dd4c31ea7e55c637632d0bc324aae35b66d957e4107c32228a86629902b0b8f3ecb5a4d8516fc19bcc5040c7eb9420cfdde9a9bbfa130d4284dda0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2b1d665ddb97aa8bd146cbc0898337c
SHA18da5b652b60555589150fc1803c57ca2e9680a8e
SHA256b668fd5a5313905891980fcb6d26042f6c846c0563d02678a78478d907885d26
SHA512edd811cd4510c2738a3f9ad9adbd140893294dece4b4b581100402e13c3c9487bc264fe38478ed201c4667499a6858505e88a38882560391289696c3cc3a1051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528cd81abb89036d86ae95d2c0d452911
SHA1cffc64644f874471712d9e0a5873415261da264c
SHA25620839dd923cf19c785ed1f9f08ed607753c86baec8d1cc81ba5a534963ac3134
SHA512993b2a658991c494fd5f5d37c62758d596a50452fef8b153bc963d2553476464d34349581e26fff89693d61ac3a23dae8aa741216f9a170bef1a3abae745bb29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5daa4737d09d7be25073b375cfdd3de60
SHA11cbc03519678ce5feaede5ab1b1ba21e5313740c
SHA256399e67b56cfc07ae8a68aac213aa4828c12b9f398de551cd7790686c76ac015a
SHA5123a592fd8c6a271ba6640979e2a561d5c9e3810ab8b497c5f7c649edbb54d4f14145c7f594e9e303e9751917c20c7b65e308377155c104d8333d3fd9ccb4c6c1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce21f9040c2eb1430148cff858cdc6fb
SHA1671ad8c25f8ead71a1f302758f6cf0bc2ebdec3a
SHA256bed821567220c637342d7d7df68ca07de39ad573557f197484f01ce87c71fc30
SHA5127b7ff668bc7e7fe2fbdcd9709c143365b47615f4bcfb7a5023b7b3d3253066149312c2b46046e461210314e0db2930b7afd28623d735074a8d1cc98e0e4e283b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547f74dec7978b306037ad4a605c0b636
SHA16cff94cf55947602d1abea330490d70e0c362022
SHA256c79660cd8c57c2794b73d8e2c1115e45ad305527e1b3fe0718cb881f16c4ff0a
SHA512f923510592ea98b461e427738587cd5c940fca098150703dbabb30b6445014ff234e475bccccf0d27192d3402dd839c28bb4a4c0400c25adccdb3d3dc5c94b93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5520e2f8c81f4f39d124ef86694f32d97
SHA1809f4d679a658146b0a3abb34dbfbe560e0080c1
SHA25634ff5c74e33603f009529977bf427a783b5d3935b6253bf3fb4f4a31d16de100
SHA512bb483acfdb254fd933639d850cbf68cb3eee93dba4fae6da0e1ab66a075d6fb33e844563544f6abc75f49d373e292da2f932a5b72c39c5fef898bd70e8b30724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5379b3ad24d182680e8bbbcd487965879
SHA10a8d74d9fea204f6118f2b5857a0f1c6d7dcadaa
SHA25692cbb7b28244f46c404c271d9a7c8e97c408dfc9023362a917e0418b2fc7ad62
SHA512472fe9fba5099db162da27b06af3d304b2ee6a87be588e15acddbfb56e134c510111e32cdcc98f5da3d644f00c95d548575bb6ea617387bb518e882596e999fe
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06