Analysis
-
max time kernel
71s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 01:28
Static task
static1
Behavioral task
behavioral1
Sample
0a0c91cee9cc9c7d2f17aef3f6abe798.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0a0c91cee9cc9c7d2f17aef3f6abe798.exe
Resource
win10v2004-20231215-en
General
-
Target
0a0c91cee9cc9c7d2f17aef3f6abe798.exe
-
Size
44KB
-
MD5
0a0c91cee9cc9c7d2f17aef3f6abe798
-
SHA1
3bd9be2b5d11ba43fd5637c04eb882bcf146fcfd
-
SHA256
301c9b16a7310bb7c9c8d310a3c8c73e78f057162fd4924df9f7b9d8b897faa4
-
SHA512
bd6dc78d5fd0092bf81a44640ec6915c207c9e33eb231b6ea7c2850c09435d9f08ae8aa46156b9de0fe46b866da5386ca8fdb22ca7149269d88d0fb70cc7ff04
-
SSDEEP
768:OsJqbK2BlJ9Lz9EOQcnlXt0lZ8uDVbrf3OfV+c8Eb2MqyYQbeR:OsJqbxZz9EOQcnQZf//CV+clSM0Mk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2616 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2412 0a0c91cee9cc9c7d2f17aef3f6abe798.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSSMSGS = "rundll32.exe winsht32.rom,SOeRun" 0a0c91cee9cc9c7d2f17aef3f6abe798.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\winsht32.rom 0a0c91cee9cc9c7d2f17aef3f6abe798.exe File opened for modification C:\Windows\SysWOW64\winsht32.rom 0a0c91cee9cc9c7d2f17aef3f6abe798.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D2EF3CC1-A78F-11EE-8A74-66F723737CE2} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2540 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2540 iexplore.exe 2540 iexplore.exe 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2412 wrote to memory of 1184 2412 0a0c91cee9cc9c7d2f17aef3f6abe798.exe 28 PID 2412 wrote to memory of 1184 2412 0a0c91cee9cc9c7d2f17aef3f6abe798.exe 28 PID 2412 wrote to memory of 1184 2412 0a0c91cee9cc9c7d2f17aef3f6abe798.exe 28 PID 2412 wrote to memory of 1184 2412 0a0c91cee9cc9c7d2f17aef3f6abe798.exe 28 PID 1184 wrote to memory of 2540 1184 cmd.exe 30 PID 1184 wrote to memory of 2540 1184 cmd.exe 30 PID 1184 wrote to memory of 2540 1184 cmd.exe 30 PID 1184 wrote to memory of 2540 1184 cmd.exe 30 PID 2540 wrote to memory of 2656 2540 iexplore.exe 31 PID 2540 wrote to memory of 2656 2540 iexplore.exe 31 PID 2540 wrote to memory of 2656 2540 iexplore.exe 31 PID 2540 wrote to memory of 2656 2540 iexplore.exe 31 PID 2412 wrote to memory of 2540 2412 0a0c91cee9cc9c7d2f17aef3f6abe798.exe 30 PID 2412 wrote to memory of 2540 2412 0a0c91cee9cc9c7d2f17aef3f6abe798.exe 30 PID 2412 wrote to memory of 2540 2412 0a0c91cee9cc9c7d2f17aef3f6abe798.exe 30 PID 2412 wrote to memory of 2540 2412 0a0c91cee9cc9c7d2f17aef3f6abe798.exe 30 PID 2412 wrote to memory of 804 2412 0a0c91cee9cc9c7d2f17aef3f6abe798.exe 32 PID 2412 wrote to memory of 804 2412 0a0c91cee9cc9c7d2f17aef3f6abe798.exe 32 PID 2412 wrote to memory of 804 2412 0a0c91cee9cc9c7d2f17aef3f6abe798.exe 32 PID 2412 wrote to memory of 804 2412 0a0c91cee9cc9c7d2f17aef3f6abe798.exe 32 PID 2412 wrote to memory of 2616 2412 0a0c91cee9cc9c7d2f17aef3f6abe798.exe 33 PID 2412 wrote to memory of 2616 2412 0a0c91cee9cc9c7d2f17aef3f6abe798.exe 33 PID 2412 wrote to memory of 2616 2412 0a0c91cee9cc9c7d2f17aef3f6abe798.exe 33 PID 2412 wrote to memory of 2616 2412 0a0c91cee9cc9c7d2f17aef3f6abe798.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a0c91cee9cc9c7d2f17aef3f6abe798.exe"C:\Users\Admin\AppData\Local\Temp\0a0c91cee9cc9c7d2f17aef3f6abe798.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding2⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\gos20.bat"2⤵PID:804
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\0a0c91cee9cc9c7d2f17aef3f6abe798.bat"2⤵
- Deletes itself
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD59d487a1b11c2702bc86d153473b7967d
SHA14f2212fd76f885ccb4ce456c4eb61bb0e495abdb
SHA25680f24e752881449db83b5de1f45a41cf290772710aba82c0c394883139b8b728
SHA5125a4ef0e4c17d91004c392e8f7a04102b714cae4330ecfa4408f97e116d374c90a4fc64a6b936378dd1b25fd5d8cb0552f945df25566064f948f5f2c9e70e92dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c85a258061375ae41daffe25bc6f7625
SHA11a6db56af3e12e2ac19529e5da22e48748dd6ff0
SHA256667549125ff6438882418c7034476fadae7ec91c9be39d0d3fac8500c7fef428
SHA512308cff5ee8a1beb86d47ac8bd2e16e8212eeabffb4ba73cb99734f0619f522e4b64603bbb61724ca92ad3072904f19b628deff46d5ad1f4147c9c7f342d94bcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd1f1f2c2dcdb8593312dee552ed39f3
SHA129750f133fe83e798db00f60593e3ba4ec521873
SHA25686fd59dce59a8ebf7bce671133eb0f23b03e58f2c43cc9b0cc3fa9b4029dd4d9
SHA512c9ca46b8633b52406b4926f7dfc624c4275267ca5921923a2e83cb7c3b831e44d606b9badb880ee9d0a6feaac9de429fbf4f52e427cf867781c72e0066c3bd2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56631da3b50c1d5b0fa7207c5fa640ce2
SHA14c68b0f4a286b279d1fa16fc207349db4c1a5153
SHA256ca0464f500685ebba549a49024778ae201d9738fb7161230370de79a3c09b5cd
SHA512aa83b5ebbf5f30f6e0281a4176bef4ea6033d4152542a39ebc0b13b70e8a4dd076664ed0b8c77e53b59dd1534a5fde12196b589e3d94afce2074a7b26a0af1f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b9ba0804ac52f2f61152fbfa5ece5b6
SHA1fc6e48c47e3a3e0dd8182de6a6b243d896876f51
SHA25696f4a6d108e41441fef4920388fa1d44c6ff0a768c9b1caebf019b6efc99c340
SHA512b4e3c11191dc9939aff92140ff748d53c97f4b822da2b9dc2f68bc3de74ca4ca2320f7344164841ee01f2ceda9734a7e12567a210cd0a74f484aad25cf72db2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD59997faacfa74176793eba43574d9d13d
SHA17940d28841b753735da2ab32bc97867771c80b2b
SHA25623ffe48590129320f973fc20d125f320eff837a106818d998d97ed44da11b1ee
SHA5129dfca1d60c98fc56da75ac1e5b27dd175b4e166233458e28e4ce5a26018d472e5e803392e2835a0565a446cadb36a49edba4f481e718bb3de5d56dfb42164ede
-
Filesize
263B
MD5ff04bcd2a70d7c9ce795a3f0cfaa402e
SHA13d18873178c0b400c2ad422320917c2d2913f6d4
SHA256c68eb25266b5ad19d35d2319d6f512bad177e75c080d87c2d283da36a64b8a86
SHA5120bf3e01e68521bbe1da47646bc57aec1605919c17c1e24d2988dbac0865d73c93cf82391ccc7af89737372066702031cb5f46dc4f5e09d3d3d420168d6378f2a
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
182B
MD5f66ee7a58becbd4aa0e3b3b092fb8769
SHA120c66abd758e8f7004bf9b721ecd84dd206088bc
SHA256f9697898b46823d07fcee6c4dd164db9d9a53147d7a36b4bf2871b30796dbfef
SHA5122cdc09c13d394bfd53af611b0281f77b1f1de7175d0e057e399da20ed1e2589c2c10aaf5163fc97b143dafa03a8ddc2513a3c0e19f78716965a32ed70e251fe7
-
Filesize
32KB
MD5aab86d70689c799ad35ee783bec146ae
SHA108e3221f0df46ea80056d49f85726aa36361a33a
SHA2563db9a6e49c312bcb32ee9b201a656c951ea7f4730fc9169b457df9a348de4b30
SHA512dfcc270bdc8ca4ea9133f6ef85ea0692b4f4241d61743ec368e314d6559deb8f91dcf882528cf6c9b082ee5e662621188168a431ed4789283b276937bd35d49a