Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 13:15
Behavioral task
behavioral1
Sample
378fdab2f8bc37f1b762116925e9b5f1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
378fdab2f8bc37f1b762116925e9b5f1.exe
Resource
win10v2004-20231222-en
General
-
Target
378fdab2f8bc37f1b762116925e9b5f1.exe
-
Size
13KB
-
MD5
378fdab2f8bc37f1b762116925e9b5f1
-
SHA1
903e0830443567e68805a82e8f1250cd14e931e9
-
SHA256
fe674821399a38a4d4f14d6902b66cce677c2c66fb3cd542944d6600dbd14efd
-
SHA512
c9df43e8e3203e7d4e4090f957de19bf43ccf38bd17808a974ee1017e809793208995b70f507f2f1f96a2790dd8fe6313b9173d6bfa1822bef02ff589915a240
-
SSDEEP
192:yS4gbgkAN4SJj+bfrJsUwv7E6a5tMeu7Br9ZCspE+TMIr3/bjOg+vtwJr741:yS4uI44aJ+7NaYeLeME/bjw
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2508-0-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2508-1-0x0000000000400000-0x0000000000408000-memory.dmp upx -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1057806a6a3fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa0000000002000000000010660000000100002000000012f8d2ec8eab316225ed125d4ca6529732d61853f28214ec923acf9f415c15bc000000000e80000000020000200000004e4af313056c533f633ef5664a9ad7022bb9914f03b17a9eaed8fbc1beb3d84090000000ae5eb0c3bd34edd18ad469d0c406ccfef180fab913541be9704dfa2021f3148d3d091e44bb2f333325ce83f393d6f4b7cd1aac28a3f543e24c0c650c219c59a8447e88d946bd599b5db75dcf869371681e2c6297c4f51faa7fd4282dd94e01ac6942b64ac18b6e56db9c5786c748c119a1ae08b9740a3f5c67111f5813b478951ae753e8902170b42eac95a5e62758604000000079cab0bbb8bfd6b08657ad7c7762a6c706521f92686b0bf0897cbb48981c7a45e071a45d13eb3782734812eb0b8e070d728cce9f370e0580a23baf3318aa6598 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410574769" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa00000000020000000000106600000001000020000000d88f2773e38d1aef960d2b4f730a5bfe24b50f63b82a0883bc2350dfc9d6001b000000000e80000000020000200000004a461c3971d20f43d134c8e4bf4601ae5070e8ffd04d515b8db28197acd6d1a720000000f56a5a3105d3192c9c38af1beb90b9a0e985bdd610c8462b6b8eae1f383083d2400000003dc0e1bd1714f51843af6c4749fa94b99e290ac5c02eb960a047a4a9d7777bccdc869a719799f2c712cec1d9b7b9803e21ef766024f7199ca290ba0850624139 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{94FE2D51-AB5D-11EE-B383-EED0D7A1BF98} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2796 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2508 378fdab2f8bc37f1b762116925e9b5f1.exe 2796 iexplore.exe 2796 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2796 2508 378fdab2f8bc37f1b762116925e9b5f1.exe 28 PID 2508 wrote to memory of 2796 2508 378fdab2f8bc37f1b762116925e9b5f1.exe 28 PID 2508 wrote to memory of 2796 2508 378fdab2f8bc37f1b762116925e9b5f1.exe 28 PID 2508 wrote to memory of 2796 2508 378fdab2f8bc37f1b762116925e9b5f1.exe 28 PID 2796 wrote to memory of 2176 2796 iexplore.exe 29 PID 2796 wrote to memory of 2176 2796 iexplore.exe 29 PID 2796 wrote to memory of 2176 2796 iexplore.exe 29 PID 2796 wrote to memory of 2176 2796 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\378fdab2f8bc37f1b762116925e9b5f1.exe"C:\Users\Admin\AppData\Local\Temp\378fdab2f8bc37f1b762116925e9b5f1.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://ads.eorezo.com/cgi-bin/advert/getads?did=432⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2796 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c14fe08098f0266f49e98675670b94c7
SHA1962c929111c8a29fb6795e783b43be3b37c4c43d
SHA256462eee1cefaa363797d96ff000cd35b9f21b53ef0794e2f0b096e6194a739fde
SHA512f3b5304b6a64331f11fdca1f25e5d77eddefb19c450f95d6c27e0e1569ca9af7ccb7f16f0ee5acee4775d03678a50885d3abc834ae89488dfed36f704d58b3e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547898cd02c372923a3a0861826f1e0f5
SHA16add1eabbde8259e7538c000f2fd01a48bfdd649
SHA256f9e770ab7ab706dbf8b413483323d23c4fd3a60176a6233deaeb354d47df6f11
SHA51235165a4e0a26ea374fcb9b0018ff4343047575e635d293b0a9132a6e1ab995b1fef56a026fa5ba53eaacdbcad456ce239378229dcf47517ce177efe3a25c9807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d2562f8e7385945bc404dc7c6c8d9a4
SHA1a071348a7b34f041df40587553a4ac08a4785874
SHA256921f44e01ed2deaf73acb2b0c4f92954476fb5a609e87200e6b81398e2ef6820
SHA512bc89ac4eeb5d8c286b990edee36591cda3739d39b55292f6a6c150c99ab3afa47e68601c5c286539a0a2e58fe024b450c77240ea7f37494dbd50b6564de5d467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb448906b78ead4c0d4809c8b5207426
SHA10ace2a9ebef5aa0c7b2f2fcf3db9917a233878e6
SHA2569f8d4536d50a294e7a8ebfa5df3fe9b0ea3d71734887d89a731f5f59d2a7347f
SHA5123fc4ada5455272cf641c654f79f18ecd10a22371e4ccf522497ac33e48945a029063efad2e07b52d2687d6aac645cbf8204d8cac9e6faadc187b4c43148a387e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd7684dbc99191f4aeb97f307856863d
SHA13ac488d68bbda54bc9ee3b90b54aba06b752adbf
SHA256fbb1c6bc7cefa18d2a2530804660e628a0a9fa8759087cd6852ac71db7990859
SHA512a44de4f6ffd01b440812f4651051027cd3213ad6051522074566ad5430eb9b2428595808cba3c06439eb2749b2e509f4338dcf9a11a61b46bd295e8cdf2534cf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06