Analysis
-
max time kernel
118s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 01:23
Static task
static1
Behavioral task
behavioral1
Sample
09f9dffafa1f54709ed02e0b0f839838.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
09f9dffafa1f54709ed02e0b0f839838.exe
Resource
win10v2004-20231215-en
General
-
Target
09f9dffafa1f54709ed02e0b0f839838.exe
-
Size
223KB
-
MD5
09f9dffafa1f54709ed02e0b0f839838
-
SHA1
c45d987c577cee6b0fcd69798ddef6e46eb404bf
-
SHA256
78fe950dfdf9c089aaf3d01347c4f10e730f54f80c3856a5973da96c503dc61d
-
SHA512
980c99c723dc38070433df3e77e8f913d48b476f664b418d237f019d8a13e784a2ba1d3ec714720604448829b7121ba102870837ae116f29a17e6a635ac48e54
-
SSDEEP
6144:DsO+lvcj4zBnOnfhQNa0PdbUlyY42vaRER:oO+lsSBnOnp8lbmi2ig
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2644-10-0x0000000010000000-0x000000001005D000-memory.dmp upx behavioral1/memory/2644-20-0x0000000010000000-0x000000001005D000-memory.dmp upx behavioral1/memory/2644-18-0x0000000010000000-0x000000001005D000-memory.dmp upx behavioral1/memory/2644-11-0x0000000010000000-0x000000001005D000-memory.dmp upx behavioral1/memory/2644-8-0x0000000010000000-0x000000001005D000-memory.dmp upx behavioral1/memory/2644-5-0x0000000010000000-0x000000001005D000-memory.dmp upx behavioral1/memory/2644-4-0x0000000010000000-0x000000001005D000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winxp2\run.bat 09f9dffafa1f54709ed02e0b0f839838.exe File opened for modification C:\Windows\SysWOW64\winxp2\ 09f9dffafa1f54709ed02e0b0f839838.exe File created C:\Windows\SysWOW64\winxp2\winxpsys.dll 09f9dffafa1f54709ed02e0b0f839838.exe File opened for modification C:\Windows\SysWOW64\winxp2\winxpsys.dll 09f9dffafa1f54709ed02e0b0f839838.exe File created C:\Windows\SysWOW64\winxp2\run.bat 09f9dffafa1f54709ed02e0b0f839838.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2372 set thread context of 2644 2372 09f9dffafa1f54709ed02e0b0f839838.exe 21 PID 2644 set thread context of 2204 2644 09f9dffafa1f54709ed02e0b0f839838.exe 20 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DDB064A1-A716-11EE-A68A-46FC6C3D459E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410104587" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2372 09f9dffafa1f54709ed02e0b0f839838.exe 2204 iexplore.exe 2204 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2644 2372 09f9dffafa1f54709ed02e0b0f839838.exe 21 PID 2372 wrote to memory of 2644 2372 09f9dffafa1f54709ed02e0b0f839838.exe 21 PID 2372 wrote to memory of 2644 2372 09f9dffafa1f54709ed02e0b0f839838.exe 21 PID 2372 wrote to memory of 2644 2372 09f9dffafa1f54709ed02e0b0f839838.exe 21 PID 2372 wrote to memory of 2644 2372 09f9dffafa1f54709ed02e0b0f839838.exe 21 PID 2372 wrote to memory of 2644 2372 09f9dffafa1f54709ed02e0b0f839838.exe 21 PID 2372 wrote to memory of 2644 2372 09f9dffafa1f54709ed02e0b0f839838.exe 21 PID 2372 wrote to memory of 2644 2372 09f9dffafa1f54709ed02e0b0f839838.exe 21 PID 2644 wrote to memory of 2204 2644 09f9dffafa1f54709ed02e0b0f839838.exe 20 PID 2644 wrote to memory of 2204 2644 09f9dffafa1f54709ed02e0b0f839838.exe 20 PID 2644 wrote to memory of 2204 2644 09f9dffafa1f54709ed02e0b0f839838.exe 20 PID 2644 wrote to memory of 2204 2644 09f9dffafa1f54709ed02e0b0f839838.exe 20 PID 2644 wrote to memory of 2204 2644 09f9dffafa1f54709ed02e0b0f839838.exe 20 PID 2204 wrote to memory of 2668 2204 iexplore.exe 19 PID 2204 wrote to memory of 2668 2204 iexplore.exe 19 PID 2204 wrote to memory of 2668 2204 iexplore.exe 19 PID 2204 wrote to memory of 2668 2204 iexplore.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\09f9dffafa1f54709ed02e0b0f839838.exe"C:\Users\Admin\AppData\Local\Temp\09f9dffafa1f54709ed02e0b0f839838.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\09f9dffafa1f54709ed02e0b0f839838.exe"C:\Users\Admin\AppData\Local\Temp\09f9dffafa1f54709ed02e0b0f839838.exe"2⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2644
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:21⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eda9f494e29e829878dbc56dfa821d53
SHA186cc1893852f9111274b4046fc397f9bad6521bc
SHA256193a95af377c44ff0f04cee610a55082928d277a3b41f81006ed0b4b9e65a6ef
SHA512f03e73afbcdfecdbea00d8759865369a1af4d459741c70584c36e9a244c8f08c7bc89e7ac15f7ed8f6e5bf4bd9947b3dab79658365445489f92be410c2b62ab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535ee18612d5fd77974cf0824d3ee1fa4
SHA152e4524401fe5ccfdbafdea189b81d7d7226e3a9
SHA25693d9b2394b72a6ac4234d1e5aefac2837e2f777151bb940252f896982db3ee0f
SHA512603e00c508c0fa5eff7cac805b78f0811d85d797b64ffede6c8b1fd1cb2fd402fb0a9c589202f1e060bb14779ef8c42bc54b2a74c63a9de7416cb557d9e1554b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53df39b019288fe10fd8a0ed13c51297d
SHA1ed34b5a2145325f40f6a11af6de4074ea8630d22
SHA256877c2c03daff17a0335ee36d91b0f1f035df710a7398dd669a8998710223a685
SHA512673e61ef8221e24042c5ba878a4166893737160c2a7e5f66423d6deccd292ca123c59f49301911d02f8f9510a8c0c021ec2e3cf01ff911a10d608b46156a2a67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8c4fe674792d244a7a0d0eaf51c709b
SHA14b9128fff22b7d9ccaed25b1f002b6677d9bef9a
SHA256241cae4494be02e0a13fe9547745bd8931a694173d22dd047f4ce4184c1549ba
SHA512d5693b1a3aef6f567173647f21591d53e9cacb37a474e5a110624668b6c0a3431ebce37ba64cb8d7ac76a69a06a66104ef8a72afcaec49c05439761a60faae48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591f5539da7a83b98cea01eb94fab83e5
SHA179600f4aa220dc437b99a0893d05797614bcbcc9
SHA256f88bd4ef430062c3fbacf2386a9a42c9530fd16ea159e434549391ac070247e6
SHA5126388ab0ee38ea7f4c0c69a97c4a788eb19b82d4f1c73d16891a9098879571f6dc458cad7f7b8434bf39cd27c24324200ebb028a456be9cde12b03b922dfb59fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51811dc7977a419046d0a7d3b222cd673
SHA1fb993373b1cf655768d23c99f95ee7efee6f6815
SHA2569a56cfef9fa9118c460331696decb471e6361e17329753a9746d9658e2309176
SHA5127ed82fb1e68b71de70975dd056e89b91bebf570f0a6ce89c4613b50cf5e0864d6872a6dead75007754f11912e2b8c3a3e118b86729eced77b6b334d658b3b422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50aaa1a3d02c0962aed281cfa6248ce7f
SHA1ab4fd0b0399d9159f05215e450d13452054d0aee
SHA2562786f7b303d551d1e43801b4a2caa9cd4d45b77c3d36be106ee1024fb4c962cc
SHA51246392ba3d2cc85e3b571701fdd467c6a7b6aafa1b28ce589f09c65bed952be981f5b89fb74d71c6e1b1110478e15c328bc97a2151081664f51f2bc96ac6a05d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b49dbbf36b06dd73869faae61ae5ecd0
SHA1cc69ac333eaa59b6b472524bbc977a544375af80
SHA2566715df74a5344dc307e94c58e937ce9b9152aec3ca88b13b7ab7eeb2861d1184
SHA5129bf03fa190aae84eea6b09a0ce3d94ec4ebd146dd9e2e7ec7d7f4a6fd0a8fbb777853a3d3615c523daf6bd6db1597bb5835404f06ee5dbc71bdba025c7578676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c0e9960858ec6da7046c9370a1afc6f
SHA11b19f922f097d3d83d34ef99f280c37c2e0af25b
SHA256e74047f2bddb8f2524b519a34fe0bf336f50ba71374cc172e760fb28f17c3db6
SHA512e7bddadc705f1ccbaa55ec7a681c54e961205313db15342dc1485cda2c7e7410015331fbab6c630c23c4ca4da54d3d62eb1c0718f86ba88b91ee0353b401919e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e69f3c2d050518fcf9aeb5c18302a52a
SHA12fb56cf317d8755d1426d59d31d9ab7912f4f4de
SHA25662c64b14df976f315bf5b51d1a0e66a03fc3a79911108a146daf78caa9b1de7e
SHA512b05e62300166d1dcb047e5a6c52c7b4224a08d9c8f7c1f351a3cfec99f82bff8f059ad97f0b1bec4ed9899deebf4adaeb98f79916511e156becd026e340b555b