Analysis
-
max time kernel
152s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 00:32
Static task
static1
Behavioral task
behavioral1
Sample
21cfedb544d49fad5d9e7cc2300ab2fa.exe
Resource
win7-20231215-en
General
-
Target
21cfedb544d49fad5d9e7cc2300ab2fa.exe
-
Size
1.3MB
-
MD5
21cfedb544d49fad5d9e7cc2300ab2fa
-
SHA1
e351461217b84091205e26239e40802472e9f099
-
SHA256
79bbf1f947c3c4c1e8804ececec5dfaa2229c3d65033c0dcf37fd3157a9622cb
-
SHA512
7710f23e42f10adbbc3a1c9fc6f86a02581efc7b2cec879ce38c8957cedfd4912e1b9828103bb78c1dafe674d3b96db7f1aa328376e4e67e3183d223ebc718be
-
SSDEEP
12288:Ch/pCHxW4pbAOeeeZeeeeEhMEr6CX4zistC:U/eDNAuaE6tiJ
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 21cfedb544d49fad5d9e7cc2300ab2fa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1F1CAC01-A8C0-11EE-9E63-EE9A2FAC8CC3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410287231" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa00000000020000000000106600000001000020000000a33ccce2315ccf41270711b589e1a3b67efd9a0061bd7f2a4aeeae169303a2cf000000000e80000000020000200000007013a91ff6e7ad837cf28b23a5f0e1280185041cb18cc282d8980422f6269f232000000099ffd9d1910dba31ce3b7a8f75bcb64b22028d41a0bca3ced30338c8d685e5954000000019099ab90948aca3b0cabdbe0e399fa42ad3667818565e4eec1071061d437ea2a38094a4e7da4cfe31adb2dda203825aeb121bf034b93a2785c8303373cc3e87 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a089ebf5cc3cda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main 21cfedb544d49fad5d9e7cc2300ab2fa.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 3000 21cfedb544d49fad5d9e7cc2300ab2fa.exe 3000 21cfedb544d49fad5d9e7cc2300ab2fa.exe 3000 21cfedb544d49fad5d9e7cc2300ab2fa.exe 2220 iexplore.exe 2220 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2220 3000 21cfedb544d49fad5d9e7cc2300ab2fa.exe 28 PID 3000 wrote to memory of 2220 3000 21cfedb544d49fad5d9e7cc2300ab2fa.exe 28 PID 3000 wrote to memory of 2220 3000 21cfedb544d49fad5d9e7cc2300ab2fa.exe 28 PID 3000 wrote to memory of 2220 3000 21cfedb544d49fad5d9e7cc2300ab2fa.exe 28 PID 2220 wrote to memory of 3012 2220 iexplore.exe 29 PID 2220 wrote to memory of 3012 2220 iexplore.exe 29 PID 2220 wrote to memory of 3012 2220 iexplore.exe 29 PID 2220 wrote to memory of 3012 2220 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\21cfedb544d49fad5d9e7cc2300ab2fa.exe"C:\Users\Admin\AppData\Local\Temp\21cfedb544d49fad5d9e7cc2300ab2fa.exe"1⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.bigfishgames.com/download-games/876/masterofdefense/download.html?afcode=af628d3a27a22⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ab69e196b9d5176b55535de560ad69d
SHA182d2e86449798c8bf02e4051bed9f4db098a3bc4
SHA2565a2c6fa4dea8e3e39dd3557b40cba1d87780a6960a7bd39e52f4a2de571a07b8
SHA51239164ec0c85682b82d10b3d4100321204df7ead13f3fe3b6dd183603d41dd38c76b3c8b74e1c9d09ecaa9a6dfcedb5985ce30b78f46a70d3e9d4835998703c49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e00ef3cd3a42f58439c6c2116495ec09
SHA1cb448ab4847ebd16c894f68b812cc21d5c2a0b69
SHA256450aa131593fbbc2e57050d73e9c00d57bc2e5f1cb22b347a2496528a001afdf
SHA512edabebaea2c8020607cc227490b4af14c56e1d579c7ee1229bea2d095db9e4b239f0346dede0ec91cc5ff02b111460506d204a8da7812bcbec5df53d53137958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a559cb8af137de137fdfe7758e1b50df
SHA1cda14e435bbb8c0971327526be6a9213ccc9bbc5
SHA256e6e046426dfffca7be39eab7e0a1a2d32ddaf3762dfd547e52ea553b2723d910
SHA512853fad190aaaa56eae6b475658121897997f6f07ca88ad562e28d57c757cfa69aaa2b84d21c13d1c1d10118b9141cac93d385f2da63bdae08f47ded778541286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b61e85210d8e8077db2d26af7cae43a1
SHA163247cb294597d27f5c84654ea126cdc838ebb80
SHA2561e19f5c52e959b10c2a9bca335b2fc9510197546aad28bbc8878e01f4eb7b3b4
SHA5128270db92626440a5e70f54a71d862cff094d3588cb61ff824754c1c73423e34bb1a3d1303245796fda0893b971ddc16642d33a106e95d01949a18eb983a7adca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1561a7336387ea5c0dc575e7f78b6ee
SHA1d813e2bc39c9d1839fc34bd897245a9212503a0c
SHA256a5fbb926ca2e450ced0ce081b16eb8fb43361030f541b2be8c878a49ed2a120e
SHA51261573d0039a75f84720752c212b266bc0a3151d70aaabf34375cd59cd191ccfca6d77a269dd2981ae4327a719f866ece651bcf74b9f3c4298cd0d9a8aaf874b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538c5f83c1e112f0d7aa06163246251fa
SHA1cdae89ca51ade06dcbcc9d9cae93433f8034b762
SHA256fff1df137e40ac864337a6d637446a91aa10ebfd8288504a11e0affd6445c1e5
SHA51256f3b3fcaa8de103ba7e0d738ec65eff24172e45e62e0f3b94871e4cbecb30b7fa5985707c6a6c17d124045621054d3e2df93e750dccd0cadc02a3c994e85da3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582ba74cce0031d0edff3afe892797156
SHA1a100bb89d561b227f939862cfcb57de37bb5660a
SHA25676e1e34e6267f3a0da5cbf5f956c28334ec9026c44952b8cb916c1d9650c8a62
SHA512b43d7d5da6693a3418961fb97832acdc7c914e8b9d244aabd2c603996adf931392d3e0522e925be10c8b39e7b4617bd5841358d934a8042c97201f10e8832be8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b05916771b247d2bcff3f4b8118c9a02
SHA17f8014cd8da55ccef0d9abe04d958248560588a5
SHA256b778449d601db833f92fc6a64cf468232ac4eb898f79c3ca5caa40e08d644cdb
SHA512510bd7898557a122c465e28abdd6825b744feec6f03e65b0c7c771f5328c3d81dee0fc2d0e98efaae2a3328042bdd69ed49bf6ee85549969f997ebd6c9406e70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f2d5e756a4f8cfbeb3b48d5d6fc3f50
SHA1cef306a62b205a3c3efc2e734d9a8b63ae890b15
SHA256812dd8fd56b7bdc91461935d44f822bb36cd3c29b85691c6b8ebdc8487d21c00
SHA512078c38b381fcb7df6087b851a0517e355ec58e70119a569d2d793313b38a5fc6f3ae2e92b1adc825ddcd0a157e5d8c31e75a0e280aa7334b2fa3c5ef7d65be24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ec20ca42012805a49e493b22db1d507
SHA1f233a2c29446fc55015f78e74e0992553f48a088
SHA25620c96c04625dfa82ff3ee20a7def5e7b97b6ab38e22615f165a0cb39423de41b
SHA512bbceb376b9a69b746debaf4e5a47649d70715cb9a0ffc72cb75673c7cb8bb65b0267adb1b2c5bf3bd3984b72ab7dfc97d12b23ebff4d5c55487c529f8fdd5404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5557e95c16ee5937ddd28f01c0bb9bbe0
SHA176c6670e2debc35784d182cb35ecb26e0f123967
SHA256a36086854039ca5977f7d8bc89fbfca4fa1b4cd3aca54bcdf2470d4739d3e96d
SHA5122a1c31aa62fd1165a62befdb498cda9ab4f303b5f64606b0d383230a5bfedf09d58ca0d9107323314f96a75407bb1020ad1b543dc57eb87fb01e59d4b2da018b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51404973caf25ef394613df2ea82dc04b
SHA15041045f946d4c837cbab6f1f533c09b0c17ffee
SHA25628d1b4b7d85fe6dce114bf9ff220d883f502f5da28275721282cd58b78f2cf16
SHA5123f72c71ac261697e5c760fcce19e43d76bcf29cdf9d40ab38fa9b655eb67413a3fd2246aec6e9b8eba53ac7df623a6e5659519cecefb1cea6f4a9d007ce30507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fba3ebd33fc002740163849324a7026
SHA1a20e57cfc3a41f041df0d3d8a8cd695a5daa350e
SHA256dfb9d99c2e338b9cf2d8a95ffa85adb5e41f56ba25ee8cadc67523e0ba008de3
SHA512e0e213809c6f353f5e41d85c8281f9d1a047a9bb0368a99503c30139cb4fda8d7757737d83a03b35c317162ff4b4f1815b81275e587fc0b18eba9dc37e7ab7b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510058a5c0d4aba0d8db6f3cb387cff60
SHA1339ba522d849ca1e9fbaac6b70359786c8175717
SHA256508c872638fe6be35cec2ddf9f7f2872a4aae464fff150df4ec2448efb426e76
SHA5127018a50487849dbc6492f795ca116d87ec4b5d6ba8e69bfe0ee24ed9edb30d5580023ff6c832206d24da8ef5b9dc87daf0f0f590578a6f0844bc86dcbbc549c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54de07a01768425973c6141f1b91d29c5
SHA1cf5db5ab0968be76f0df9003f20aa8f38a00e530
SHA256a09664b6e9a4cfe0ad13bcc5698b198baabce58de948f5734d3083b71ed8cb90
SHA512db07917c8cd2e47a3ebf9f10434483764a6429fd96a8cfd3d72980d1c0b80c99394483f57249ee29c97e61a1fdbaf5762782433eaf1b2df328e2986463a8e75e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b106f68d13c81e688dbd5d8d391c028
SHA12f20133dbe9634da26ae371f4b69f8597e3225d2
SHA256f6e825d0c1a09a9d000d43a9086d1bb7ff73a4a2f96147488c2000d46a6656b6
SHA5129298c948f70b594202b14c3f615efa69b82681d3d1aca489193e4c1f1fd25a41da8dc4176eb30d630b1315acaa8bb1c80755906b704a6d8bc588a1bd123999c5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
192B
MD50fcf82b5a915470e8a79d3516f582a36
SHA175f81b41607905b231521243129aff3554a58db0
SHA256076264d4f165cef82f0cb07f6795f1d5ffa74741a943fca42cdeac65823bcae4
SHA512adf69ec56756fe672677b039cb44bb13fc3adfac569f5ea4eda4e7b35de5ebe0229c5825ca8337aa2c623a773bdf775ddd3689e9fae03a7af1f694576d954293
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06