Analysis
-
max time kernel
117s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 07:32
Behavioral task
behavioral1
Sample
12383c3ac73fcdd59416c7e695d17180.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
12383c3ac73fcdd59416c7e695d17180.exe
Resource
win10v2004-20231215-en
General
-
Target
12383c3ac73fcdd59416c7e695d17180.exe
-
Size
28KB
-
MD5
12383c3ac73fcdd59416c7e695d17180
-
SHA1
904abd1b32a377a3ccbd2a9398aa36f19ed6429d
-
SHA256
acc6bf63969befee9889f78f6d81bac7fd523c2234372043f3b899e2f86bb66e
-
SHA512
7be3010915135213c49f1edf925dd0b5fe6d0aa4ef754f04dad05f93fef676bc0238f979449483d375a6354b9b9c47b9a736f736b53da320859ebe1dbc2a20fc
-
SSDEEP
768:AFjd3h0TMRxxK5onshMg6OM7ibt55l2TuEpaFoRgw:AzR0GxxKOdgzpf5l2TuEpEqgw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2748 cmd.exe -
resource yara_rule behavioral1/memory/2252-0-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/2252-3-0x0000000000400000-0x0000000000415000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\hd_driver.exe 12383c3ac73fcdd59416c7e695d17180.exe File opened for modification C:\Windows\SysWOW64\hd_driver.exe 12383c3ac73fcdd59416c7e695d17180.exe File created C:\Windows\SysWOW64\HD_DRIVER.dll 12383c3ac73fcdd59416c7e695d17180.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{04B92571-A887-11EE-A29D-C2500A176F17} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410262708" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2252 12383c3ac73fcdd59416c7e695d17180.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2184 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2252 12383c3ac73fcdd59416c7e695d17180.exe 2252 12383c3ac73fcdd59416c7e695d17180.exe 2252 12383c3ac73fcdd59416c7e695d17180.exe 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 1760 IEXPLORE.EXE 1760 IEXPLORE.EXE 1760 IEXPLORE.EXE 1760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2184 2252 12383c3ac73fcdd59416c7e695d17180.exe 28 PID 2252 wrote to memory of 2184 2252 12383c3ac73fcdd59416c7e695d17180.exe 28 PID 2252 wrote to memory of 2184 2252 12383c3ac73fcdd59416c7e695d17180.exe 28 PID 2252 wrote to memory of 2184 2252 12383c3ac73fcdd59416c7e695d17180.exe 28 PID 2184 wrote to memory of 1760 2184 IEXPLORE.EXE 29 PID 2184 wrote to memory of 1760 2184 IEXPLORE.EXE 29 PID 2184 wrote to memory of 1760 2184 IEXPLORE.EXE 29 PID 2184 wrote to memory of 1760 2184 IEXPLORE.EXE 29 PID 2252 wrote to memory of 2184 2252 12383c3ac73fcdd59416c7e695d17180.exe 28 PID 2252 wrote to memory of 2748 2252 12383c3ac73fcdd59416c7e695d17180.exe 30 PID 2252 wrote to memory of 2748 2252 12383c3ac73fcdd59416c7e695d17180.exe 30 PID 2252 wrote to memory of 2748 2252 12383c3ac73fcdd59416c7e695d17180.exe 30 PID 2252 wrote to memory of 2748 2252 12383c3ac73fcdd59416c7e695d17180.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\12383c3ac73fcdd59416c7e695d17180.exe"C:\Users\Admin\AppData\Local\Temp\12383c3ac73fcdd59416c7e695d17180.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1760
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\12383C~1.EXE > nul2⤵
- Deletes itself
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ee95578759b6bba39303f1e1739bfa7
SHA109205a1c8c44a59cafc9d87d3271a585456ede66
SHA2564c6be8443f846824ac22e4be6687008c0a5002af383706dcfd81bcb5af934e6a
SHA5120516f0f71e59bda3e28d4818af2cd107a2d989d42b65344674812f5568dad2a0a940aeab46b06cfe09ee14436bce1cc0fdbe1bfc4ac9099bef9387ff0840a613
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
37KB
MD5e6acc17a4f6bfa732b33b3bd52b336ca
SHA1b61b6d1bf3ff2d115ae7fa5844dd16ea091bf976
SHA2564099498507f844f267f8f505a3476d431e36a9250e656ff095192590f15b6fdd
SHA512a638661e4902d24fc58dea992994e34f294ba23e9a06c75fdcc96eb422ca57fbd1cf48049da9876e2fff5bd0747446b2ed64995b18ca179a1175e605c24d463e