Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 08:31
Static task
static1
Behavioral task
behavioral1
Sample
137a1e64b5279885d7975fcaffd00d89.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
137a1e64b5279885d7975fcaffd00d89.exe
Resource
win10v2004-20231215-en
General
-
Target
137a1e64b5279885d7975fcaffd00d89.exe
-
Size
1.1MB
-
MD5
137a1e64b5279885d7975fcaffd00d89
-
SHA1
b856cd895d4cf9eaccc8d049d58de5f9f30e8666
-
SHA256
e10b6cf51c1cdc0022ee28f400c756cf72fa0187105b8d42676cc68978c9ce9d
-
SHA512
2b9de2d08abb38efa23d13169c9282d57d45124c6a8044cb8c7688279310e6acdfcd9b29d56e938d45e055034bac64aeb35ae22a50d509474b7fda8325166897
-
SSDEEP
24576:ezpuZd3xNFYkrqrZpbUbsH7zg76jBwQrIA95eJ:ezkZfRKpbUAbzg+jz8H
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00090000000120e1-2.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 1204 137a1e64b5279885d7975fcaffd00d89.exe -
resource yara_rule behavioral1/files/0x00090000000120e1-2.dat upx behavioral1/memory/1204-4-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1204-7-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1204-6-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1204-21-0x0000000010000000-0x000000001003C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main 137a1e64b5279885d7975fcaffd00d89.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410173464" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A5C10F1-A7B7-11EE-BF8F-CE253106968E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00771a29c43bda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000000e325b23c46665f9f899dbf9ef6ac4b8909e5e9d0dc243d6efd4aa56e30cc669000000000e8000000002000020000000edae412476bcfe0e5499cb2ecf21090243d20d10114b9c586cb0da9e12494ce620000000d40099cf33ec3713206cfd50e666ddc1f0bc27cbed481c0c0641839d8aa3f92f40000000d10aa1e28c5ccc90171d22b021fcc11310c4e7ddd70cc45389501dde8e4a923b82c350185d4e6896da83254adda576301880f518a4b28bc142a96adc58f540ca iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1204 137a1e64b5279885d7975fcaffd00d89.exe 1204 137a1e64b5279885d7975fcaffd00d89.exe 1204 137a1e64b5279885d7975fcaffd00d89.exe 1204 137a1e64b5279885d7975fcaffd00d89.exe 1204 137a1e64b5279885d7975fcaffd00d89.exe 3032 iexplore.exe 3032 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1204 wrote to memory of 3032 1204 137a1e64b5279885d7975fcaffd00d89.exe 29 PID 1204 wrote to memory of 3032 1204 137a1e64b5279885d7975fcaffd00d89.exe 29 PID 1204 wrote to memory of 3032 1204 137a1e64b5279885d7975fcaffd00d89.exe 29 PID 1204 wrote to memory of 3032 1204 137a1e64b5279885d7975fcaffd00d89.exe 29 PID 3032 wrote to memory of 3024 3032 iexplore.exe 30 PID 3032 wrote to memory of 3024 3032 iexplore.exe 30 PID 3032 wrote to memory of 3024 3032 iexplore.exe 30 PID 3032 wrote to memory of 3024 3032 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\137a1e64b5279885d7975fcaffd00d89.exe"C:\Users\Admin\AppData\Local\Temp\137a1e64b5279885d7975fcaffd00d89.exe"1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://52wucha.taobao.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e70f042f13169037692236cc5ad26d5e
SHA16beec2dbe9804db9176efac398be74ba02b4d415
SHA256d39b3bfa904150bc770cab43b773aa6c77023b0ad586f5b1fbcdd3570a403bca
SHA5121f7bc512a7ad69f3e3568cfddbb724612b345051d24b98fc5f72f17169e0847c2fdccdfff952eb9dab09299c5395b28d0f5f84212dd998f0984bb6ec7401289f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5baf46d5283a76c3a43cd0e83ac4d60cf
SHA1b085503da9381eb7607d02590aa8c7b77cc6b534
SHA2562cde4e33887095d646675dc9a0fa4a3d360ace939da4cba67111e0f306513dcf
SHA512b2a566d0ea2f880cce4cdfcf0626f3a835e907730f8de1ad18543ec596ba683db084ecf154ce8259cbf87b1c493e63a1df2bc213451725bc237facca3cef403a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efe94c4b71c0eb6a9e05fa37fbc00e3d
SHA16038ba8b4301e79e6f2344e3dced60d0d00b1ffd
SHA2564f98d1a91c2a5652a603483cd1c404d2e64bade8996ea6530ba5fe719e621268
SHA512d7344d8ea8629bcccca02b497d622c3b9cb172e1bcc1d534fb468841a09540ea1977dc48f049d8a56fb5c72b8dd1569b75a2408e9ff05a32afa1c0f650d8feaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5337ea1dd874626bbf3c62c65b6159086
SHA1b3f31f822549f112c45f65ba65439bd7df522bb5
SHA2568d13aa3fae9ea5307fc03b9c4f5f1f5afc2abd4cff87af7d477910608e77b583
SHA51216cb27389794d22020896c3040bb9600854e8007d558a8f447295a61b5b3d4bc762ecc0e14ba5cd2dbd7e64ed59d77aabc6008de71febf33b85467fd8a33af06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2e9a07e113885258600dbfd709b014a
SHA16c19642a55aaa45aadd045fa495cf3df161b8431
SHA256cb61c739a7c5e5b9628dd6e0bb8de85e80a47a0db45b56af3c6667db0ade2837
SHA51286485be40cb1771b36bd73eb63cdbf2851ce80682229722fc90dba69c8a02a982b0a1095271d3e2cf89514cf84fe3f86e4b344922ff651b25f0c79c732035809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e534e62ab484261f9fa292ef82f89dc2
SHA1372b60b6c4938e272cdd04c63708ff0bdf380be2
SHA256002572a345743d90e1d779e7ab6f909d598fe739ef0b2bc2db65a75f80da6583
SHA5126a7612d2d06659fb4a55e4dc1a473c62dc2c5e922e0df8b54467360eb23a4bee2bded30de42534cf8b2255c4c1a4eaf92b0041f3376d422f87a40ec0f239a94d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580164f52ea09d3497685513b2362b663
SHA11df66b16af375c8baf3c5e0a0642e452b85728b7
SHA25651ed8e9ede0affb24ae186fb2ec58cda1abed1fc959c7bfcdab2b6e3b8acd5e7
SHA5129dbe1ae66ccee4200b1477b42f50f2f8bb458332f8dc7a5713c23835603ca364d162ce33fa622eb23db2e4af24d2fb1678cba1a34a91055b275978a6504dec24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b769cd4b51da9bcf3969d58d2f69b81
SHA1d47bb377123ddf191ba7d12a689c70c78e167fee
SHA256fac4cb70c928037497b8bad130e003917a05fe4f2e87d513bd67a7625f0bbc6e
SHA512772d1759444e84bb2202fd6f118f0a445c00fc43088d000e3456b2b19b501148dab423668317ef475340bd143051ececfd904464b70ca4bb6c7518db01a41e0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5217b4c902079401523d21268f6d64c44
SHA1516311151a0ab845088c5de53931c5d0230eb4b3
SHA256a77f41862f035a6be75ecb4563616498fb4677ba86fb9cf3caf2f59857783b8a
SHA51286f7c5d9ccac50caddeda6dc6da1c5c959f89dbc80417923116cb7466bae8cf5a0d936494e5d886dda9e552d702a2d7a5cf6132ec5cfa46ff5725f283abf768f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be8a019d337b819186c9806b44033cc7
SHA104dfe375c0f50d60781ca355cb3fcaf7839e3ac6
SHA256766747e100b2f3f768719dbb89e90bee3f05b3a1a850934d5fe833e458825dcf
SHA5120f05b653a079a2b98f6546fa68d0b0b83c3b24dd30f63e8d990ca75464405559a11f354d48706499096c792ff339fbce95915ef51963a851b3cb56501ff7f1aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7f6f627a3eb462e8483ec27fee18211
SHA17859ca786b1251048da16cf8deb6dc4ac0663063
SHA2563d342afd519ed4ef5bf5c58cfb807fd1c6cf0c880f45194f3c48c2fb6618fa01
SHA512b7017a704958365d1583482ebf10662b8d789f89e41e8c87a100b45c62e3803fda9a7524ce0a6f27c86b9cfd8dbe248d8e770af056fe4982a26b95741909423a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dc0bfa28c43fde21965772b1d5557d4
SHA1e0137e0bd097b4ed516174d845342ed0979670b2
SHA256319c92456a67c38de33a69888b528800a55c7a2f77ae1728c5b6d1e0563bc55c
SHA51268fbb1d0f2e9ae0d5276c73d3c85c2826f47325d411ec7d4fd2c53b178ff485ef8dc27b6b48e4b2b65a2661a60aad846c2b705940a25e0c1683140f28f6d3622
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
87KB
MD591f544fe7f9703cad0e8eb2e1863e056
SHA1c1de2693b678f7ca390f081fd633c86f3786ea79
SHA256dbc2dc69d3edf8954f107511280bd0261772d1f16b4fa6320d95edeb57021ef0
SHA512499c02c2d38b0b9ea76e65aa151baa3d805f024ce89116c630da730b3aca5bc18400c26b7b5b6934f072248a400078b9ca8493ba0b6826ef4469182d939b70c6