Analysis
-
max time kernel
41s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 00:20
Static task
static1
Behavioral task
behavioral1
Sample
217f4aa690f7dbec5b2573d11542f046.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
217f4aa690f7dbec5b2573d11542f046.exe
Resource
win10v2004-20231222-en
General
-
Target
217f4aa690f7dbec5b2573d11542f046.exe
-
Size
20KB
-
MD5
217f4aa690f7dbec5b2573d11542f046
-
SHA1
364fef95f3173f91d14f105b73be598432babc77
-
SHA256
fdfb6b386b331b9f3af3d5712f465254d70074358e081a06218efc0fff6e7901
-
SHA512
cdf749cd2c3dae81c1fac10b23e4a9328cc1b233325e8c05a086bae9fb094c6dd88fbea4b0fbdc86c01431c7cc407f44bc0c53fb21840edf7df21e1b68b94508
-
SSDEEP
96:/lxg3sPaxvI1rhsrvBbC2nDYwzUdrtVQnCTh+hWVThKjI2:/THaS1ruZ7UVyCTh0WbeI
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\217f4aa690f7dbec5b2573d11542f046.exe" 217f4aa690f7dbec5b2573d11542f046.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{778CFA41-A8B9-11EE-AE81-EAAD54D9E991} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DOMStorage\outwar.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c00000000000000010000000083ffff0083ffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DOMStorage\outwar.com IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1012 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2436 217f4aa690f7dbec5b2573d11542f046.exe 1012 iexplore.exe 1012 iexplore.exe 1312 IEXPLORE.EXE 1312 IEXPLORE.EXE 1312 IEXPLORE.EXE 1312 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2436 wrote to memory of 1012 2436 217f4aa690f7dbec5b2573d11542f046.exe 17 PID 2436 wrote to memory of 1012 2436 217f4aa690f7dbec5b2573d11542f046.exe 17 PID 2436 wrote to memory of 1012 2436 217f4aa690f7dbec5b2573d11542f046.exe 17 PID 2436 wrote to memory of 1012 2436 217f4aa690f7dbec5b2573d11542f046.exe 17 PID 1012 wrote to memory of 1312 1012 iexplore.exe 18 PID 1012 wrote to memory of 1312 1012 iexplore.exe 18 PID 1012 wrote to memory of 1312 1012 iexplore.exe 18 PID 1012 wrote to memory of 1312 1012 iexplore.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\217f4aa690f7dbec5b2573d11542f046.exe"C:\Users\Admin\AppData\Local\Temp\217f4aa690f7dbec5b2573d11542f046.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.outwar.com/page.php?x=7979982⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1012 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1312
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5080fcca0b5e703b99acb8e5cfb9bc21a
SHA13731de3230c16b8cb5373df228fc8018582c3c2c
SHA25638dab09c235d09ec7fde6b306e381840985139092b561b1357fd60950c28a237
SHA512b3631f3ae44ce8ad3a9046f770107b628d56c3593351fd2c075370ccdefe36a87617fcc9b6c82c386f0363fb020a774cecb02cc0a45ff19c5d908fbe0f912922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b458540d3f4c3f7366be95d1dcda0f9
SHA1a5dc5716ba947b6623d8c9f51f9647077676d9d2
SHA2564f701f06c3a2d9efc045b68b5c29d0f8cc6260a2e28eb798f0b359d5b92e84f5
SHA5124771f75a16d85cf3a14fe7f80b5f743827c1f783e2c35fa79de7cf83f86cca90465684cae73612c30cb494929dc11e411be4010eb63122bb4da03713ab36dfa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5e5b9f53e4bf254d4db61ac67203bf6
SHA1d0c9489a21de564dc6eb2697172be8ebfee1ed58
SHA2565e0877b14edaa143777fb8a058384cf760affa4f9f6d905114b8b0a1a5b908e0
SHA512f8c7f02c0ea324707bc47a17751de878ba974fb1590d18ea610dc9550fc77112f37e8595c9575dcc2a491c4684f0acf3aa1472af3335abd4a02c092800dcded4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b35359d86c447b9695a4dcfdecc41a9
SHA1f3509e2c16b43fd4d4822e6b494e7f85e5630520
SHA25697c8c0c5009243530ab278e6b5ea4edd743c8cafec8adf161b6bd176ab9f3726
SHA5129577f4844558b254e2c15ba4d20a81b805bac12d473feac0b52ff06ef57c6b7d8b3f1cc29819cebb49c886e544769cbc2fb25e4de9f85bf2792021da44e8044d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ec0c81cccd64b84f4dca20bb3eabfbc
SHA154c8e9649e570184b9c5b5eec85438abb556b214
SHA25627a1f5660ce8f6917325f5f95af88ac08d1e20025e7f27ecf0aa769a3d21b654
SHA512fa597e7f17a18cb6c2b8935e9b94df348b7e5635484c0c4b2e4c18aa5780f873bd7f88d8cb0da20bb07b9cebc83e22552e2c4fcdab010f26fa4c6056cef72876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5332dd47121dfd4572ade0def3f036f37
SHA1efeeffff69e0d9f0da6bd361678b7a91cbd2cba7
SHA2562ef6b3d0ff2b8b789a1ca1dcad1646b294bc1e0004a81c7731a3e27c0b85cf91
SHA5121a4440111d3db07842b6e44662fcb0dd9cbcb0fe0a2fa3dd27f496dee87591d386a0a4d6a5cdce93a42e21cb0c16f59d779c1f9a36f92baa969afeb49bbf3266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530461fddb2a54e6e9466e9acd6c7e353
SHA1aa49143c44df2e60d76185136523bfacbfbdf677
SHA256f18284f0e773a7942128ed9b16c5cb77d6b6a2e24019edc87c1c800d9511526c
SHA51230ef3774848581a1e70f2994ffdbb1b6061d8260e6061d318899a3e2ca8d5685f360b4fd8c2565cce85662fb79e0a0a2f753fa4b474cd2b0fee7f858ca8f4e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb77ff6c2572b883cf05e6a8a65064ad
SHA16f347597223cf37aa77358af071019e9cbfbee00
SHA256373f58c1761b29079de2b4a256c1dac12d03fb961497f4456b61d5f308d60fb9
SHA512c9e12514ee6caf712e3616f3fae380d0d63777119986e273bd641c8b6448bf0c610627b0761ce7c41e14ae7e77c48e7997eb8186ef5ee4e03162587b701208c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b1308e2cb096794eb2a281e694aad35
SHA19044ea752b0157544f05900f08ecaaf8fa1108b7
SHA256b63227147589a10e76e0f4c03b2f6dd25e5f22325a8fbb874c63633cbad5ecec
SHA512e766b5de34e62f41237c1f5145434200703cbf1f41411dff068563ecd55c7940f77847001285cda244e8b87086ccd91936c86e466151afa43c2a87b30e359622