Analysis
-
max time kernel
119s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 14:30
Static task
static1
Behavioral task
behavioral1
Sample
1b79dcfe6bb57806118b4bbc64ee5b74.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1b79dcfe6bb57806118b4bbc64ee5b74.exe
Resource
win10v2004-20231215-en
General
-
Target
1b79dcfe6bb57806118b4bbc64ee5b74.exe
-
Size
54KB
-
MD5
1b79dcfe6bb57806118b4bbc64ee5b74
-
SHA1
cfd38e17c12a4688f4dcb261e6b1ec8a056e51b5
-
SHA256
3a11364d677271335d3b019f332241491c943f8cc195a913b0b5ac1c70e0fffb
-
SHA512
d5fb6d5de7cb956ee68e0d14fc632c2fc03a2c1649949f5cc6151779dc7b5b71aa0c013d81852b192a33f77eefa857d68e1bb083e510c94160aa12c0e9c83cf6
-
SSDEEP
1536:w5qZQF7Rp6LTE9WiAbOpBlJfG8uPbWYZ:PojqTCPfG8UaYZ
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 1b79dcfe6bb57806118b4bbc64ee5b74.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00c2cae5a43eda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd7691733418900000000020000000000106600000001000020000000b13b641625f435bea53adb160fe8110bf09598f9a85ac099b982f71ea3ea21bc000000000e80000000020000200000006c2dff80cd8357833a8cea9ca9c56a950a2dfb82debc514bf629e23e0c7e9b8c20000000e766a70a17038870a657fcefdeb8d8081cec4d4d8e4084db5aaaeab7dbada95b400000001d62e94e9450a3dc430da8ced1530f9e836d5d178fb002f34b7007bd9062f1d71455af307b937aa69aa09936891d85e6f1f04c8042e1b44774365118c99d150a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F7E75A71-AA97-11EE-966D-76D8C56D161B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410489898" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2356 iexplore.exe 2356 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2356 2676 1b79dcfe6bb57806118b4bbc64ee5b74.exe 29 PID 2676 wrote to memory of 2356 2676 1b79dcfe6bb57806118b4bbc64ee5b74.exe 29 PID 2676 wrote to memory of 2356 2676 1b79dcfe6bb57806118b4bbc64ee5b74.exe 29 PID 2676 wrote to memory of 2356 2676 1b79dcfe6bb57806118b4bbc64ee5b74.exe 29 PID 2356 wrote to memory of 2728 2356 iexplore.exe 30 PID 2356 wrote to memory of 2728 2356 iexplore.exe 30 PID 2356 wrote to memory of 2728 2356 iexplore.exe 30 PID 2356 wrote to memory of 2728 2356 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b79dcfe6bb57806118b4bbc64ee5b74.exe"C:\Users\Admin\AppData\Local\Temp\1b79dcfe6bb57806118b4bbc64ee5b74.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://bbs.liba.com/active_hd.php?op=active&id=f5ea51da667ecd6b5f2b9d06e4a3fc5219c6fa3cf51a33f0fe152d6acace7ee1d553d49ba87fa8138665e646771fbe4c&check=3fa63ad79a7ed87b39fee0b5877825dd&r=040026572⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a1f02734430fe8206571a97ae5e95ba
SHA1289e4a884760e7162e518e4d43bc4c857cc91e0d
SHA2562e3819865e75cec0be68eebbd762f191031da4fc7b98dfa500b0c6e250af13df
SHA512168d6554aa390da607fa5f00f5cc7b12eb5601f9985f03888b34fb064c83fad2e6d65c4dff4539801aed50c6e30ad28e7aae02809054f3c93950aa3bd67b45dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e597f28a14ce82d376b98c4ebddd304
SHA1da5097ad884e9fdde2859fb460c148c67ecb8476
SHA256094ba8a5cd059ee8f3301fc04ca294a0b70fd9d87f3fb952b156ef999c2960bb
SHA51295ca5d77a7eb66d4829119d68b847a3381e3ddd23ca50c958ad6ed61a4d8761186bdf20d6b5717df5a538998f37b6b44b24f553398306e0b1b95f49d7c7a72ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bccad875c1ce3ea48ec69a74691b059
SHA1913db55eed5504a0d6d2dbd1616d79855fdd837f
SHA2565090328b0f2ab588050dc1f86a2a8e5eaacef58412bf9c360bb352134630684b
SHA512e2c60d54dde812442b8b28553702b68b6f7e5a718eebeaa99d211bb1e51722145f61ea1c1edad730012d2859c8ef5cbc8e0565b9cecd19e13fdfd03cf5a13f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5635bcc0d4480c2202ee3e5ed2e9be03a
SHA16c8fff402edafc52b4d620e0d34d0cb6bb8371f6
SHA2565a67d8886163709d470c63f8b12a1e61756f4e72355b49c52e9f3f6392d31f41
SHA512af74a7ac167c9b94abf1453d9c032fb064818ad3461eaa42384785c9ea3330f7976ae0abe804ac6450d90c477f23fd17c78ba3b2c2442a6db71d108866db650a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511db2bfeb4bb6793d770020d2ba28069
SHA1c3e013776b0f06fc205661ad07b88842a7cb64f2
SHA256c6fa62d8664287a411daf577e1790d267ae31b668af76e6f3f15897a301150cf
SHA512bfa109c19328dcb91b52397d6bbeede6f512e5c7769efaa8078ba4928a3a5d7d01a36d6cef8ee8df5d1f368b8fb44ee062d81b91096126dd3b248bc564380919
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac78b0712921e83ba54a2ec4db488e89
SHA17787eef7326b340fe748a3a5142ef8fa2ebbe5b8
SHA256332643bfdca2a718c3c3209a1475911ce62765507cc19ee46c59a38b24f36ea0
SHA512ece0def92c2e109f39067b889334a776d7c5a766779f2f894d2e01ac6e257b0fee7d2eb7b2575ccba7e4e50d5ff1225ff52c2471386dc04c53e1ed7c403ef9a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9293d8af892ac2fbaa51cb58ec39c69
SHA11f76dc1dbfe5ae3ee8a615e6a783f69bcc12a715
SHA256f286e7baada34738b2046e09ca9aad3126ac72309865f57c5435d33fc6ce844b
SHA512d4180fb610d1e346e0c7aac64ee29c233ce706dd5f8bc218bd3f391cf3844416012af9d64dc6699828f9c63455a9a24732f0eb410877a58a4e7f53d3aa4625ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538234b945f7dc51b16ef694b10423ecd
SHA1a2bf77f21b3f6a101eb5e4ec15187f7b0146e24e
SHA25661133ee2bca68c76ce26a7085db5c93aa520fbb83e5cd96161d55fe1d583dba5
SHA5122079bbff336ec54ed4cbcc33f6bd2e18c55f93ea76bf1c5f4ab0f6a0b625c8c5f730f3804d862b5b1b34c940cea555723cfc061a11df661ed23a8468b6f894e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58539bccd8f0e6f0ce40aa03c15b6e203
SHA10e127103fbe4175c0855b295c7a66ca5c8ffc56e
SHA256e614a51d04490c29cd581a3786baa9d73f84509fdb8ba1a6c8338929ec2c458b
SHA512f9c02feddb78a9c0e12f553bb58ead98301d0b0835dcaee28398e70ccf2df68e417056a38d43e8cbae94a6eeb33d29a948a5723c1568b49b1b686b1813176eaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56596991b25393acad046077546551961
SHA1069829f3999f64ab0247bd9f2ad278090c2205a0
SHA256b24e4ea6218613ceff673df86dbf37770ea9473909218084a2d944882d9c1e35
SHA5128841a1680d79cc3242ff10c279fa295a3e952e5d09a900e0e3133cd297ede889dc2428a5e122737cb59ebc2e0858fe410e01fa205b14d5eb055e5b4534013725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527aab91503acaa8000db8a050515781c
SHA19b0a2410c78b48509467ec910738cddabdf6abde
SHA256e5c402b5a4df4727ca2120077db0743102ff3f53b5d2e07a13cce0053a5f8240
SHA51238fc1c3d52cb136313da990c643b29f0f3211a7848cde797f5f384d1291874c9ab37570b7f7a2ef1af5236947c95086819283c44db245001190c31501b467e4f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06