Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 09:38
Static task
static1
Behavioral task
behavioral1
Sample
14b61900603e45577de0509fa06344f9.exe
Resource
win7-20231215-en
General
-
Target
14b61900603e45577de0509fa06344f9.exe
-
Size
1.3MB
-
MD5
14b61900603e45577de0509fa06344f9
-
SHA1
aaf25a159077456bf5aae61dcd164cb1d00419bf
-
SHA256
aefaf92e65d551431c91671f8052aeec9c65be0e6f71fc69e6729c50119e87ad
-
SHA512
730564bdc7cde0de884fae3c22c21747e64b887a52dc39e635f6735c3c731723f073df2bb249329c4666c58901ee85c8ace14227d2b5af5068243334c722c30d
-
SSDEEP
12288:Ch/pCHxW4pbAOeeeZeeeeEhMEr6CX4zistD:U/eDNAuaE6tim
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 14b61900603e45577de0509fa06344f9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410181450" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C4C6A591-A7C9-11EE-89A8-464D43A133DD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0550db9d63bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e917866400000000020000000000106600000001000020000000dc80f536e28386d85850b92af521fb1f2d00e1c994756328cbe1ea5e22b0978a000000000e8000000002000020000000c638cfe01a8896bed5767e5cdaad7884af046e81ccefb0d62d5b84cc84ab48bc9000000005275a1bf19e959a2e2636042181140274f94cf5af7ca2e68ba8bad21b2864e25cf4aad1c3dda6e25e14db8e8ca033e6317bac673c16c39d9b1a4510ed754ebfc0185117e5d2623e0fc84daae56db4406dc0b7e98e4c494bc63317aed7573336c4d2f25ac7d21b99d7d499c1b3ce4fae47584b8f51f783a981772dea2d804b32da71e9dd2171db40f0bb5e7ff7632f894000000061975cd330a38c3c6ae429313823516db7eb04785dace40afd7bff355f182d43b9b1407cfda84fd872484cdb88c42c235f3841a590d44a88ea124c1736609721 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e9178664000000000200000000001066000000010000200000005aa6dd7887ba8b2a847da85f15b7d39cdeffa42410905942ca61e73e09ec56a5000000000e8000000002000020000000f2a880c9bdbfdd6325f3e8da2335996330060bbda145faa439233fe29ce2f98b20000000dc1a5072b87c15589a1e18887a74a12c118a7cac56f4167c6ad866cd9e4a585540000000fb2a54c4741ef768f69893e47e0b343da07334ad3d5f48532f8d192bffd915ff6e5ae499e0ad46770a957a1f36aadb853d802a5dd12721e8668e65b6121b7782 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main 14b61900603e45577de0509fa06344f9.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2664 iexplore.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 1040 14b61900603e45577de0509fa06344f9.exe 1040 14b61900603e45577de0509fa06344f9.exe 1040 14b61900603e45577de0509fa06344f9.exe 2664 iexplore.exe 2664 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1040 wrote to memory of 2664 1040 14b61900603e45577de0509fa06344f9.exe 30 PID 1040 wrote to memory of 2664 1040 14b61900603e45577de0509fa06344f9.exe 30 PID 1040 wrote to memory of 2664 1040 14b61900603e45577de0509fa06344f9.exe 30 PID 1040 wrote to memory of 2664 1040 14b61900603e45577de0509fa06344f9.exe 30 PID 2664 wrote to memory of 2524 2664 iexplore.exe 31 PID 2664 wrote to memory of 2524 2664 iexplore.exe 31 PID 2664 wrote to memory of 2524 2664 iexplore.exe 31 PID 2664 wrote to memory of 2524 2664 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\14b61900603e45577de0509fa06344f9.exe"C:\Users\Admin\AppData\Local\Temp\14b61900603e45577de0509fa06344f9.exe"1⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.gamecentersolution.com/downloadgame.aspx?CID=21157&AID=7752⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2664 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b5f8af835d8b7cc32e5f17ea5b1e9dd
SHA1ea50b9a5c5c0bb7e7feb6ff2411ab8984bfd3c00
SHA256bd04c280b9d23ff5cb77fdb3df672ff096e2018fd63a28eb90ca5105f2d37c20
SHA512700484001f87bb1dd07a5530b56abd01624192632e5af58b781b2598d2298bc8e6fc0640b1dceca7ae4f083be5787aba6b8112ed4950e56d3729e09d53c685c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be70767722993dadbd427688285e11fa
SHA1412136aa470dea5782e97619ea8bb1f326e40ee1
SHA256c7c4baba19d2f03a3c52093a4d0278aff9b3a622f2ce3511a22c902e150004e0
SHA5125efacb42f87e962056ed587c351807d20dd3a26e31e19ba35b8bcc616da8ea3ec6b98c055eddfaeedcc215df545ee09caa473ac932be743f250dcebbca45f81a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e699ffd00e44da146a22dc8cdb24a733
SHA1d9f955601ca027649391a1f02e5ba27558e6099a
SHA256f126f38fc90840a6ae9dac35156ea4c59e49f212be9ffb01020db41ae5a53d5d
SHA512b3c9b9ce7cc9d222c166252746c08bfc509dac68ca4bcd3e2895ba9976e6bc707010f332870de8275262360d5d9cc6332e417aa3430b14300f0e4f37bb2669cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bce7c6c949ca01c991bcdcd4cff59dd
SHA1d87c245038769105e86d969dce06b1f5297e9745
SHA25674c1165f1db484a9e7fdd532ee675f3fea4fa92d39cba9d5899ce95c0107ce85
SHA512928afb5ea9519b353013c38dae54ff42b9e21fa30e3c724e9a37efe81f85d66a536adf2d2aa5fa05481b4a317c3525027871e18740f782fd4dae1fdd06a36cf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ac9fa722568bb43b45864354db18209
SHA181438cd4fa0bfdf4eb3a951baef2b141e053dced
SHA25653dda3918dad94182374b13c5b33d8acacc17997578afa3d8b76cb3b2d6756ba
SHA5122fa8ba94a58595f4dbf85bdcef3b84fabb028d06c749717309b6e04abba9483bbed40a2d174d8b8148c8beb869ae08f9314184ecf4fd90efb24aefbce614f36f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f37374b872b34198655b731f1a96868e
SHA1252460e85012b6f54edf63cf30832a1d7734ad68
SHA2569b13c1f6fe918073514196e66e0e7726badd8216aacf2a84ed3e006ac7e2d4d5
SHA5120d6b84f334d44b463d0c2a08e501de0de8733797b60d4aaa2ecd71a47f1c615d488e3fd06f1b25c672c6ad0f3685dd7248b7fbc93b471249fdd403f371afffe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5431c28f20a5726119bcfbe15b7731a09
SHA1fe97991de30875b2e78984e6a4b4dc20a51ee008
SHA25685df02f233a1cb05e3bf145f1a878671e5640dfef83b108723c3bc5f8dbf9494
SHA5124022ff64c8f25deb13fdde693e57b2b54baf314a968c31ad1b6ca32e8a9c3890f44ba4d3c2be89f66ceb1642c98bb908b5a3381e4d1c554bd35df569db797c3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4e3e3b59ef2abf1affdaa1e9f7ea671
SHA1985a1bc21d190d912388971bd06396bc31cdf7f7
SHA25602db6e4e943772e8e53a2d2b4f6d44e518f09b1fbae8604afe0013ba1fd323c6
SHA512d0010a8a42007ce4879c1b8cf276acdf0094d4d90ed17d6a8ba2c28d7e70c4bd2f962fd9814bbbb6c048c60bf129649db081d9e7ad2d609f21f2867e458334ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519c0a6e78710eee3589b87d7877ea791
SHA1269503756b95a3393507d5b54fe4163ea4783a94
SHA256dbf646dc594d81a3beb70ffaea304db274291ea831066eda96db7f168348e4a0
SHA5129a604c8da06c313ea34edfb8debbccb2bdb43c16a53b590b5ef710600b733cb6379fcfc814585e480578aa48bf277328ab6962e775d9883e66d4a1454c196c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f9fba24d98306b83b59e1290761a1a4
SHA175582e71a983400346445f30eb8903196cb43ac6
SHA256de0b51f7c2bdee0c220b17a508777666f5bb8f86d3385a3055a14e64e980e193
SHA5129410be217ad80a1a20c3ac83e22a585de0f5d01c6e9d0fc46cf905a1e739e20bda2ce0126b335284a2e45b2eff2272d89aa3c787e3af4a84a4286593e165d712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8007eee8fd21c3314219fda4af9b893
SHA1fb5d8119009f52ced9d332f0eae7fd531eefff2b
SHA256dcea0815538ceda97c029c350061186017c4260b82204ee60222451efb3d6d20
SHA5128f35e4799b1f39ad2cd14c0d94e5b748960c78d6068f91362dc84af5e0144f8118ec651691bda1a04367a5943fc3c504ddb367f8005d76fb88230049fa412417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581731bd70f613641ad47786f169ecabc
SHA191323a5998f8ca1bc2dfecd0552483878ac48c61
SHA2563ff41726b730577abe7640ae87d1d5bf5a122ac30b4b828f66b8e93571a69abb
SHA512b272922394fa97f103f2f889cce1ff8efb770ec575fda5167f7b639f735d262fc246fb2cd3f04056728b4b21b0272dd477b91877fc47dbfe29e51486962dbf68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5627e4845c64686f9d966f43c412a5e9b
SHA17531310f280e08cb7e8fe5ae1654c15b807a88d6
SHA256eabafd4b7772a94f71afa9a630b3ffba327752528d8f170f6e72754217ccb36a
SHA5123e66dcf6be201ed8f532c28d724da16ef65b8030771a339302802c26673c0bac9e2bfff9bab7df02deb77f674c8dbb94d408bd50bc3e0c578f9856775b08559b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526e9395cdd21a52cb5f6eb6c794f274d
SHA1b68c91d62fca4910f342c6972b7002256b38561e
SHA2560dc3b6bb16a30b84e76e58d6c335dc6236d01d9da68c4b8e5fb7b8dae6124c97
SHA5128890977fa02f2896ec6f85001c811add16698b7d311d3903b761affb0e8a853b6f268291f5dbf6993ed3b6ea6b635d73edfdd6d1c54d53955ce2b73ee6d9fe7b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06