Analysis
-
max time kernel
248s -
max time network
299s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 02:29
Static task
static1
Behavioral task
behavioral1
Sample
3ba801ca866cbfc1773f7f97d8ad2c35.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3ba801ca866cbfc1773f7f97d8ad2c35.exe
Resource
win10v2004-20231222-en
General
-
Target
3ba801ca866cbfc1773f7f97d8ad2c35.exe
-
Size
94KB
-
MD5
3ba801ca866cbfc1773f7f97d8ad2c35
-
SHA1
08ae7746bf93b5d29cbc1885414708bb009b8c04
-
SHA256
224ffb92e8412adf79fa8563359bf33a3143d20ed1562d669a1002297fcced28
-
SHA512
911b2f785af9a2d5e3cadeadc3989108b869ba413f4c737f3b6304137145ae7c60b42b2f8c273139bd234bae414a18bd88bc7b9331b26c78d95d32ba09d4693f
-
SSDEEP
1536:KrqhEnUlXPwKWOgVG9ahmN9kV33RTW6/EMxCRNpzCMhCRVpYcX:X9vW3GSmN9q5WdMxCFuxFYcX
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\svchost.exe" 3ba801ca866cbfc1773f7f97d8ad2c35.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\svchost.exe 3ba801ca866cbfc1773f7f97d8ad2c35.exe File created C:\Windows\uid.dat 3ba801ca866cbfc1773f7f97d8ad2c35.exe File created C:\Windows\svchost.exe 3ba801ca866cbfc1773f7f97d8ad2c35.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0fe8e0b4640da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c193000000000020000000000106600000001000020000000305ec79b7edb9b256163972b12eae7757bc2fc7eae94163b4cef48f5c5b3c0a6000000000e800000000200002000000091438048ecbdc5c4cc73f50a52de6b22c3e7ef8615fa0485f543cff82fab55ee20000000400a2855c5cfc16ffedb3c693a70147fa64b09fe67d39bf8940e774e2a55465e40000000040558cd1bef6bf0c584b84c651e08040a79ead40844ffc637f8bc1ec7a3e303884d21e1e5b05fcab56b80d58ea6240941b7159e5bf6c5f6e5680890ce8739ec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{216D32F1-AC39-11EE-8575-62DD1C0ECF51} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410669060" iexplore.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2892 3ba801ca866cbfc1773f7f97d8ad2c35.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1100 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1100 iexplore.exe 1100 iexplore.exe 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1100 wrote to memory of 1664 1100 iexplore.exe 28 PID 1100 wrote to memory of 1664 1100 iexplore.exe 28 PID 1100 wrote to memory of 1664 1100 iexplore.exe 28 PID 1100 wrote to memory of 1664 1100 iexplore.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ba801ca866cbfc1773f7f97d8ad2c35.exe"C:\Users\Admin\AppData\Local\Temp\3ba801ca866cbfc1773f7f97d8ad2c35.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1100 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d3dc3b9cdc0c8d49f7527987d07d4a9
SHA1456110a41df0bd89a56d624cefdc0b80ee981a42
SHA2568ded7a1fedf36b2e4f6b474e42a14fa4ff18ab5355b7a6c4cd76dfd54154764e
SHA5127c5e865e84303a13b82de883ba7699456817a6d1e1f35a666e3e2af45f7771a0ac4ece923ceb82f52c982cac73a50ad8822b9d86600c6951f0e81796759616a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f5fafd0cd0558da1348f26f8e4c35b4
SHA1a710fc76e411b8aea839ca41d3e90ef41cc69142
SHA256400a562146735340357c19d7361e0d453b0f3cc680317976112b78d8276a16a5
SHA51280da6db2d68616c1959a3c5a817a9f84b6ac92983edf105c64e398176a8ae6dcb738d873db51ad8ec8ceba1af74f4489988471c9aebbf74880e713a7ba863e8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5774a7962b22298d5b0e25df25d4a2628
SHA14ce377b7931536cee3e8d5e99ad66bb8e7d9ea3a
SHA25613726172e714d31084a0bc7ec3a72822ab044f81bee06da25d2c42f2093eb20e
SHA512626b1d7f3edc56bd5e6dbfc91f92afadba7f39fbec4a596068bc71db0d6a5ab621545f85a5acfd70c562f025405cb38bc0f95456fba7e31000e411a4a01daebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cd155bf21f2c762efd06eba1ae0ebf3
SHA1bcad00d159d9c7e68c3fb3522b9b83bbbb18d7e6
SHA2566fe4c6ed6fc198b1189e8ac83e8b48f9699e765a3c1a547694f626dd2022f9e7
SHA5126659db7a1ce32b4feecc01b4e38a2bc43977ebc1675bf487561701f4b4cb2aa0dd74db093ec610dcaec7b046a151649873f696837e42ceb5731aebd6e68b3e6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555d708e57699da01a8f922d30e1397b4
SHA1b7d38071b49099f307acba17ff3112e132ab86e1
SHA2560de0a1489d9a5457681b689289c6978b1595e6d9b9e91af7c76a4f18a963ec7a
SHA512bc68eefb5a7a8df4de0d57794e05b2137badc30d109f537efdda550e3a3be1dbb8e000fa6c86b9d471b3e9e11b4b92be8bf0521346169b209a456fe87c9e51b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdebe0c148b98fe961936c4cd6da8077
SHA1d59a8daa5d9158918c2620424322535b49d39389
SHA25629cd27d4b6f6d187c69ed01a9229d3556028ef0ab34ef1e800fcc2429b95919b
SHA512025bbfef95b3a2aeb8338d96ce06b49bd1d90be290171ddc2f814a864c7e1c12671aeccd70892dc0084b19627e62b07318de78d04c90a32aae6b7929f689cb91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584b54a147889bb102ac68d00ae5ea743
SHA1931deebeb23db4f754d8d86f072c265f8dcbdab4
SHA256cb11a065a1321f3867dbfc656f0dd9f2cda4dc70930ff05e34f7c01e3042a71d
SHA51236a0c6f8c88ba351b5d9c3bfe196509a798635057f93fe8ec7255aaf1ec27586d0c52bbdeb58bd4870ee4d21f354b18b8b5058faf4a2538b257351b520a578a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548338d0b64b133ccf910c9087ce146cd
SHA19d4cdd81a58847277ebbf2f00bce4b68b267ac81
SHA2560023a52b9f828a8422cd07f8003166308bcf4c447ac8e2055c7555d12567732d
SHA5120f14d1c56db7a74d4033eb7266303fc4fc1ffb214f856e5ec237774a9c994c67cc260a703d610e2801cd92c9854f62bda6f953def525a72bb7a7182f90cefb64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9afb66080f82e0c57eea11d79435750
SHA1a08a41d0abdc2ea0f3135295fc714f2a0151d057
SHA25656262250d69d1282a453b4c04d4f0619486c2e0eae7d73f7a5265dc415326220
SHA512d6826fb44cf31d0fdfb49882890e3c2f25b8e1fa18dd6783efacd2e31cb70fb13e1213672aec2f0be6bc0a63902e38fe4718b2488612e5f9df5df6d051e4701e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5add2090a5fc061fc5597151ba56aa10d
SHA1b4f17a55bef1c66239b7dfbcc1295ce1e6c5dfd2
SHA2560b7015b2835c4b5fe884967f34fef8e021928b86fe60f2e47b85803c024d4f22
SHA51246ec2e14f125a354de48f60b441c7927dad5a365975ac336f091d40ea4028b9fef8901699b48096246d78f22e26dafae0e70d3cee76abdd8465ced752768ef9e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06