Analysis
-
max time kernel
141s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 03:57
Behavioral task
behavioral1
Sample
0da24e9a4fe58ac5beb38be8ccea52fd.exe
Resource
win7-20231215-en
General
-
Target
0da24e9a4fe58ac5beb38be8ccea52fd.exe
-
Size
149KB
-
MD5
0da24e9a4fe58ac5beb38be8ccea52fd
-
SHA1
a6d12e8ad8e3eead695c490913d845f5e586df68
-
SHA256
15bdce9489d2c74c5c88a5a8f0140e60982c038c8169977a1a2c1f0aebab50b9
-
SHA512
8dcdcfcf1b13dcf11bed9dc0040fb832df7f4c154a34a4f88e0ee38c1c38ba7c357397c711797644ea9bd525d081987521d1cf001b96a96026845c87442c7237
-
SSDEEP
3072:RROzoTq0+RO7IwnYZnSDADeak7dJHB/A9ouUljtQnjPtwi3gSO8EeL:fkdNwBGnSsQLH5A6uzPtw/j
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2720 0da24e9a4fe58ac5beb38be8ccea52fdSrv.exe 2680 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2332 0da24e9a4fe58ac5beb38be8ccea52fd.exe 2720 0da24e9a4fe58ac5beb38be8ccea52fdSrv.exe -
resource yara_rule behavioral1/files/0x000b000000012185-2.dat upx behavioral1/memory/2332-1-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2720-7-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2720-10-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2680-17-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2680-21-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2332-100-0x0000000000400000-0x0000000000446000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px756E.tmp 0da24e9a4fe58ac5beb38be8ccea52fdSrv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe 0da24e9a4fe58ac5beb38be8ccea52fdSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe 0da24e9a4fe58ac5beb38be8ccea52fdSrv.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2412 2332 WerFault.exe 27 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7A082861-A802-11EE-9840-CE9B5D0C5DE4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410205783" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2680 DesktopLayer.exe 2680 DesktopLayer.exe 2680 DesktopLayer.exe 2680 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2736 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2736 iexplore.exe 2736 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2720 2332 0da24e9a4fe58ac5beb38be8ccea52fd.exe 28 PID 2332 wrote to memory of 2720 2332 0da24e9a4fe58ac5beb38be8ccea52fd.exe 28 PID 2332 wrote to memory of 2720 2332 0da24e9a4fe58ac5beb38be8ccea52fd.exe 28 PID 2332 wrote to memory of 2720 2332 0da24e9a4fe58ac5beb38be8ccea52fd.exe 28 PID 2720 wrote to memory of 2680 2720 0da24e9a4fe58ac5beb38be8ccea52fdSrv.exe 30 PID 2720 wrote to memory of 2680 2720 0da24e9a4fe58ac5beb38be8ccea52fdSrv.exe 30 PID 2720 wrote to memory of 2680 2720 0da24e9a4fe58ac5beb38be8ccea52fdSrv.exe 30 PID 2720 wrote to memory of 2680 2720 0da24e9a4fe58ac5beb38be8ccea52fdSrv.exe 30 PID 2680 wrote to memory of 2736 2680 DesktopLayer.exe 31 PID 2680 wrote to memory of 2736 2680 DesktopLayer.exe 31 PID 2680 wrote to memory of 2736 2680 DesktopLayer.exe 31 PID 2680 wrote to memory of 2736 2680 DesktopLayer.exe 31 PID 2332 wrote to memory of 2412 2332 0da24e9a4fe58ac5beb38be8ccea52fd.exe 29 PID 2332 wrote to memory of 2412 2332 0da24e9a4fe58ac5beb38be8ccea52fd.exe 29 PID 2332 wrote to memory of 2412 2332 0da24e9a4fe58ac5beb38be8ccea52fd.exe 29 PID 2332 wrote to memory of 2412 2332 0da24e9a4fe58ac5beb38be8ccea52fd.exe 29 PID 2736 wrote to memory of 2704 2736 iexplore.exe 32 PID 2736 wrote to memory of 2704 2736 iexplore.exe 32 PID 2736 wrote to memory of 2704 2736 iexplore.exe 32 PID 2736 wrote to memory of 2704 2736 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\0da24e9a4fe58ac5beb38be8ccea52fd.exe"C:\Users\Admin\AppData\Local\Temp\0da24e9a4fe58ac5beb38be8ccea52fd.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\0da24e9a4fe58ac5beb38be8ccea52fdSrv.exeC:\Users\Admin\AppData\Local\Temp\0da24e9a4fe58ac5beb38be8ccea52fdSrv.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 1202⤵
- Program crash
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5062c87fb082eb83dec6289c6c0b51bc9
SHA1e9c190b2302155feb00564cd337bb5e7bce9a5a5
SHA25689208d5ebd216e03c3908feac4e3c802e8aef4d0d7587e20c1b259f805810ad7
SHA51220c1f2fbeff09695149a08e3b228303dea824c2b0d548b81aee1ac74d95a2a1eba0fdec724930a899e577c0800d6367b18b301cf826787c9a16905c49495bbf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ab281d699cff3f5fd95d6805911a750
SHA1f667ec2983c4e7cbe0812b37bcac46b21147438c
SHA25668d0da80a578abd2f0d334cf559c30855acd98686875f445a2fc678faf8f94ab
SHA5125994acfd5c386c0701f48e07283f3ecb9743e47a2f33b2f7e86330c69ac1480723847e453e8e731f985c000bef44509ebf351195480ef44e62b9f7a0adc79655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c5f25747fb069c8c31b1e74d9a5a791
SHA1ba4fe71d12830b9c3c555c8e12fa6d27a0cc64d2
SHA256e06426167ef61ea89a8402279f7cf8506c936ddc303e519e5f3b370ea9c7433b
SHA5122eef87c2f96ea5a927d695b751c77b653b3a1fcd5790fec0e48ee3d36aecdc74ae6556b5299ade624f8030d3bdf9681ee4c11cf3a328c9e1dfccc8f5702ce37f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bea01e5ee82902e5021438bcb9d60f3
SHA1d217c87a3a9b7c4ae3cbfb79bf7adfda9a0a419c
SHA256d3ab2742568d4a134ce50307eeffe4b9926b334378abfa253765475d922f4168
SHA5127a5e73030b2e51828610d0932ac97ce1baf734b03fee680ad512be22209bc618b2cda321aa23db89de6ea38b85445c9a061fb7a201602d9dc46ee8dddf85efb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522ebba38c9272169b53776d860ca869a
SHA1170f3ca4db711d264dafd8c022afd572e7780de3
SHA2563a5bfa604520927c64504128b38e7db6493fa56a70497fe7809ccd30d0b8f0f1
SHA512cdd0d67c306ec9b6ab1b5b09fc73aba780e6c1b85186a63726f8978c5145b25423ae80e3be7b985429e06d40e32383ea9423f87a5452a3a1633eed0acd4023ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9fe4462e70023ce305cda78fb657457
SHA11359b29560a71ed9553d253eaa5b4104138dfd67
SHA2562912c5e555f358742494a175a73fafdb4f5d10d19996be3a0ce5e1441c65e1f3
SHA512dd69c5f11b5dd9cf41ff580668f7b6b8a5b18a02f490366339d2f98b493013f033d7c791a70e58ef2aea2c4d964b8466326b4aefd4076562e24ddb197408d105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584075956034cee2c4443d85368302dbb
SHA1fc46de5edd8b9f264ed388a584dbc8743041b94c
SHA256937eadc9ef2b5717b1b16e1ae2733350febb343c8699ef02f1d8388c8be0df9c
SHA512bda5351415d0947b7908e36469b6c6f4a8bc479e6c0ecc96ce4a8036cafe2e21e16d1737d08626253af992bcdd0fe85be49df0622a83b08c5e2d3a914832c567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578855c288df90d215007f5c02e580a9b
SHA1c2c72f890f574ec544e829f999a918c46328158d
SHA2563513b5dacc8d59991620f386ee18f74a5d095ed5406d7ec2d5d00c8f077a9e9f
SHA5128122a17a3f2e27385a099fa8544b94ee78347b533b88cfbbd7a9e1a003a21ef1ee6d72608f7ddc2992783606e3ea3a35cc3b166b5f8ae661e575762443138fba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5558dd6f1a620f9c2725e124f56578bd4
SHA1cd179ac63f05a8aeb305fcf6c4387587d4bd3d39
SHA2565a9098f9eec5a8eca4808ef630934ccc868abf70a06f454576919ee0b16a6e23
SHA512c29b72e07d31411d884af141e719d1d44b3c487f44d7dabde5e97af6127000f8d75a6c5265ae66786791b629a0a7695c7353fbe3030f231f88df4dcb9512bb3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ceef7b3a56840292904b0c0ce2bd4e4a
SHA1fc51d7c025b0bc96f0c70e9393c1006195d5386d
SHA2560125e0242724b0d2366151ce4db9def7c61816b593d7192cdff9f6e8e4d16001
SHA512e88cfcf6466eb723b97f2c216f8e2e9a1d5007f5970f6946767bdf365626a8c59be0103c2c7b06a427b6681278def0894f8c98e96b3a8e4b62c8af8e3275b1c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c08416eb71bcc4ad3c3e4b3d4046eaf1
SHA1d50fbd8c3728436c1c579677eb8ff66ef3d40603
SHA25676ff376ccf73b5f9ddd824330630a444b3a627a78e8b34d0c1beab10f6890ee0
SHA5126d611269e89863576fabb0d9169194b52afddc179caebd21538b35bcab673f661103651cc0947928413dc7ee6bec87613266bc7076b0280f7247b6d096b24e69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab15e7d287ac0d70bd5a5e032144db80
SHA18bf98aa5412c0c0d35371f0fa019a3248c1fc3c8
SHA256b3b1cefdb032d1d60a0828cd8b73c3783ee67446627598f1a84d903ddd7df5a6
SHA51232321800c2728f6d0d3fcb40ddbb421d188ad7adfe35c4e16986792a76165b6b6ca8c2a03325ef61682e9d7354c5c06e3cf82a6df2e809ef069736fb5f09b537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0dc3dd7a7438a614c7bdc824008d12f
SHA117373e68fd1c17f6b06a2183f159702ede8679d4
SHA256ac8c2c1e4f50b67765633ca869541b41891a60af10b0239ecabd3ccdfa80817d
SHA51294ef5077916dc27593a563ad8484e54f70cb15b58518d9818b55ec159062f679156302742dcbf77e1bea87c8833bd7c479d7e7d955cb5c4115b5ebe590cfff79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec892dcfa94ee6fdcb0904917c919478
SHA1d479dbb0b33384c9b6b21586672c7fd6ea43c548
SHA256bc92b70f7c8524336ac362c03a8b619bd4b87334c8b2a1d560e9915620b75618
SHA512a0499aeb965ee88c8b283540cc3a90d4370a7f19e48e2f22984c8e3788c4ddee4670718a56b124047c9ca57e2a9afb111dd449fe07c8ee8543d01dd31876d350
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a