Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 13:21
Behavioral task
behavioral1
Sample
19ce6877bff14c4b14b31fa51e549306.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
19ce6877bff14c4b14b31fa51e549306.exe
Resource
win10v2004-20231215-en
General
-
Target
19ce6877bff14c4b14b31fa51e549306.exe
-
Size
75KB
-
MD5
19ce6877bff14c4b14b31fa51e549306
-
SHA1
a9ef9684cc2f083cd26203f1a22941aa7d2060d3
-
SHA256
bb1978ffd6f8ae12bf3616147e317560734371fc1323245d2a1ddd07bfc6a3d7
-
SHA512
bfc0b4fa4e3bad635504bd777bca2a4b60c5247acef2a3fb30af6c1af7f572fdbf9d2fbbbe7d8c8d072ad2e027f67a419ca73062f99f26de19b47cb61aa1fb74
-
SSDEEP
1536:D6fA/kpnDfhqdGLUdTEf+wP/c7T6ee3PsVKNfRYbBiDo2Yk:WDf42UdIf+wP07be0VKN3L
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2184 cmd.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\2a9492dcf1.dll 19ce6877bff14c4b14b31fa51e549306.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410462991" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{523E83C1-AA59-11EE-8FC2-4A7F2EE8F0A9} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2744 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2744 2896 19ce6877bff14c4b14b31fa51e549306.exe 30 PID 2896 wrote to memory of 2744 2896 19ce6877bff14c4b14b31fa51e549306.exe 30 PID 2896 wrote to memory of 2744 2896 19ce6877bff14c4b14b31fa51e549306.exe 30 PID 2896 wrote to memory of 2744 2896 19ce6877bff14c4b14b31fa51e549306.exe 30 PID 2896 wrote to memory of 2744 2896 19ce6877bff14c4b14b31fa51e549306.exe 30 PID 2896 wrote to memory of 2184 2896 19ce6877bff14c4b14b31fa51e549306.exe 31 PID 2896 wrote to memory of 2184 2896 19ce6877bff14c4b14b31fa51e549306.exe 31 PID 2896 wrote to memory of 2184 2896 19ce6877bff14c4b14b31fa51e549306.exe 31 PID 2896 wrote to memory of 2184 2896 19ce6877bff14c4b14b31fa51e549306.exe 31 PID 2744 wrote to memory of 2752 2744 IEXPLORE.EXE 32 PID 2744 wrote to memory of 2752 2744 IEXPLORE.EXE 32 PID 2744 wrote to memory of 2752 2744 IEXPLORE.EXE 32 PID 2744 wrote to memory of 2752 2744 IEXPLORE.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\19ce6877bff14c4b14b31fa51e549306.exe"C:\Users\Admin\AppData\Local\Temp\19ce6877bff14c4b14b31fa51e549306.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2744 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$30689.bat2⤵
- Deletes itself
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50af4f28bc0f3a179c69436f388ae4668
SHA1a292d53dbb315570814a469cb219319b51af9bc6
SHA2564db9028b7e1b577cc5c1bc0a2a0c1e6b4061afb5f93d0572dfebc38a1590ba16
SHA512a8b6fa7e46aa8a1136174df4c93e75aa623e3c1e905db8291463e02ee669290315fd0d44f7183f5f5278062795ee79f47a32652d9c8a87397c123f634c4c11d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d71afdeb0d1ea4ecb1e5542dcb0e1ef3
SHA1daa0c39f3ebead0462745a9521f802bae6c22f19
SHA2565017a4de0d7cd5000b15bc9e15e2c58e849b809d2467ac79cdd4402ec7179f3f
SHA5124d385901552ef1718380d84310f702e87b480a40081c432821aa52386766112b186b6a5e0f52c7e0023ab954babe70b6f62a637698e9f358d97159d0e7472469
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bb1942ce9bc5ac9e047fe7f3ff723f2
SHA19cf9061cf2d898a17e1db82f629837a5ab18a995
SHA256e5fcd5cf4f17644f88db9db51b899c5ccc22c144eef130f66f4607dbeecf5f03
SHA512b1dd98a3adbcd992a03bfd76599ba02bf008f3206bbd2327c2544ef0594d2fd90e2b03a727f6c2b14bd497b37d3e0621fd9eec2104ab18883438cd9b72fc55b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5761ee21da9cde077100171ef0e1c940f
SHA1b107a5cbf63ec3c9d759f6ad56cd305c782dbe26
SHA256fa32e07dc5345bbf901bb614c9abc117c450b9f4d8170e61666169fb00bd671d
SHA512a1aec22372bebcf04dfa4fcf038c38eacdc60bc22308a5da0e2c8869a92f1765eb96058bdc6b237b6d5847204b6c0c2ef1044d19ee1ecf526ecea16f13b08de1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fe784ca871c11d3e6b52824d6da9e05
SHA1099cca81670680d7e3c348c456399243b0c51ffe
SHA2562c646c5d39265d9939f67793cad3ba3164f95a1b80546f2d31fbb389dcb415f2
SHA51259915eb3b8f289ae0961ac4eeda610dc47082ae39a267f74a536f6b217142a7ca406675edf81b002678b71ed774d4d359a0c2d1719612c41bc358e5c28293673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6ae4ead38f67081154dc04a63650863
SHA166f38f19404d3945a6e5071c4d8b39e6029306a8
SHA2562cad13bab645016c83de2dcb42370e015ceb198690b3330f5dae269f37636772
SHA512830095f0084c3d0ecebebeea988576bdce50925e2bf4e21fad0e511c21f5556c22f05aff37c4f85ac4361f97955d52123ae25ddacc42dc54955289ab348562b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c019ec7a0ea5f36c063c9e3e6751462c
SHA1a0e226f0156cb518ab10de40af343cb0a380004f
SHA2566a17fd98178cb2a95b53fc02d96bf8a408493dfee4ba6d00bf257cc9400a7abf
SHA512e73504b97cff73211ea59f847a2ed22cbf2ec4953b95cabe040a54a402e30efade6bea86f34210b62ce37cf913848f8a221299c843e8b611cd6aedac09969dd5
-
Filesize
181B
MD540436786d2a352ded26983a24b70d240
SHA1c9c05c6ee18a15d0f6eb62ba4bdc4e37c563a8e5
SHA256c31b6db79f746100394b9e4497663c20323043909b8d40eb2e71ae813065efc5
SHA51202392bcdec8ec893a8cae3ec2f28b1c4d5a7b7c0874ac91c477675026fc4c8d06152d1ee8bc067ff7b996fc0c14ffa45db0e256bec87e5271543a6c6f3a38868
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06