Analysis
-
max time kernel
135s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/01/2024, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
3eb0276a9cf9b5a8cfd6dc1eb40e9d0e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3eb0276a9cf9b5a8cfd6dc1eb40e9d0e.exe
Resource
win10v2004-20231215-en
General
-
Target
3eb0276a9cf9b5a8cfd6dc1eb40e9d0e.exe
-
Size
112KB
-
MD5
3eb0276a9cf9b5a8cfd6dc1eb40e9d0e
-
SHA1
b48d3aff019d76ad42f9a1cca05cb6c4c04bb6ab
-
SHA256
165f409d83fa740b9aee823cba0d5842e1362e256bd8d046fba139f0b4dc7290
-
SHA512
8fbb99391bdf3210723c5a27378d5578cfee90714e363e1eef029341276e7bc59175743341bfa0bda6d475edb51db0003885b2f503fe9ffa8bd1c918008b1940
-
SSDEEP
3072:kX7DItrfaocyTgfsqQOlJCeqgKJ+BCeyI1ztTI81j:ksaocyLCWgKiThth1j
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2232 3eb0276a9cf9b5a8cfd6dc1eb40e9d0e.exe 2232 3eb0276a9cf9b5a8cfd6dc1eb40e9d0e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 60642a154b3eda01 iexplore.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50fe06274b3eda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000351d41c240c2a248ae2d3e0881765a0604dde1f59689dadb0c0f34a95f557eec000000000e800000000200002000000016c7ef0b05f26cefcc2902edf0d605176497c602e76196ff8b863b78c83fad8f900000009153db08616e664fd1658baa5d13cd7ff7de217d3ce0deb05543aad0d6873cc1a4d36faca53ecc29345300c2348fe6b98bb6b9adddee0a920edbfe6b757ce3dfc4560e20b2bef18211f7a806ddd63e884f4495e3181f4315bb5c9f587a96d63847bae7c03ee0e10e9991a11af0028d0171e016934651c5e28b66074cb320fd9ee4129c2da133b41acc1994fbe0753b3c40000000bb8ffc2b97dedb5ab52af0c7ba7b4714e6d43668d9cdb6da0434a29540c0f689983d7d3de6f2e979b634fa827f1b32fb9c4b383ea0c6a6c14c77bd69b06ef3e0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410451389" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{51802941-AA3E-11EE-9F2E-4A7F2EE8F0A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000fd4895925515dc0ea9c66f2dc97869452bf83ca27e22c371af7a69098e8cc477000000000e800000000200002000000075c3595308b09322e92cfce99cb388c1b1d35e367e24e53a67073bc4408af7ab20000000925c6fd38dd2ca10304627208621c0daaec1be81c11caea944320e75ce8e25214000000051eebb617414240aac2a0d68e3a619c2dd92e6e9137cf7a6308bc2d9d98df06afd9981743cc89902150451aba40036492cab83e144dee4846312e8554849ec3e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2076 iexplore.exe 2076 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2076 2232 3eb0276a9cf9b5a8cfd6dc1eb40e9d0e.exe 28 PID 2232 wrote to memory of 2076 2232 3eb0276a9cf9b5a8cfd6dc1eb40e9d0e.exe 28 PID 2232 wrote to memory of 2076 2232 3eb0276a9cf9b5a8cfd6dc1eb40e9d0e.exe 28 PID 2232 wrote to memory of 2076 2232 3eb0276a9cf9b5a8cfd6dc1eb40e9d0e.exe 28 PID 2076 wrote to memory of 2748 2076 iexplore.exe 29 PID 2076 wrote to memory of 2748 2076 iexplore.exe 29 PID 2076 wrote to memory of 2748 2076 iexplore.exe 29 PID 2076 wrote to memory of 2748 2076 iexplore.exe 29 PID 2076 wrote to memory of 2748 2076 iexplore.exe 29 PID 2076 wrote to memory of 2748 2076 iexplore.exe 29 PID 2076 wrote to memory of 2748 2076 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3eb0276a9cf9b5a8cfd6dc1eb40e9d0e.exe"C:\Users\Admin\AppData\Local\Temp\3eb0276a9cf9b5a8cfd6dc1eb40e9d0e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://vgrom.com/engine/download.php?id=5262⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa36148c21fdad5c2da0cac2c80cca97
SHA1c0c17ac05ab879f39f45948ae679c30e25c69108
SHA25604c2ec3741a40ed94b2a2032deb2cb19b94e02f70d304e46fba958ac0c8e2121
SHA5123178fe40210d8d9e23b7c530af895e3a3690a9bbabcafd66dd99c8f4e2b45375bd1f49c3f9d550563602c629e4bbe01f0c5f7162a318765d20ec32584aff62cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7ba46c84f0a8b0ad0f0a505332dfcf2
SHA10e563532764ff23a4b776a374af610cb2729f1d5
SHA2566f90565da4ec5fbd9749b2585906545667acf5ddf838a9da5267bbcd8f5d21f7
SHA5122daee2eeed39103b68070079138fae3173eaa0c04cd3aaf20dc00a03562bc60f0a52fec18271f9efc76318e5237d6957924a86089048fdd666d4f586b1ee7d11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6873575d53f85ae0f901cfa5c5eb1c2
SHA1409de519c511f2291009501aa3c739fe624ac6d0
SHA25692dcae671280237f82f6261d7b31c63f1e5aa1a1f92dd0a11e817f341f7ae22c
SHA5127e11c2af67e7590d6ecb9cb4713775b62a625686ee9c52d297fef642402e2f80c26adad6b51af1646c853ca5c6352e0e5d27c10ece8c784e1d31f7f32cfa558a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5733da29e3992e6df3cf50f75cd4f853a
SHA1ee00cbaac9024db73f9386d49269ab1cc5b787f8
SHA2560aabb34edf6b9406198e783ff6479420261918d818c103c63216efe83c810671
SHA5127f1464ca9d49a52eb0e435165ca4438b78a3d56e6c2ff190c4daeab47ab3ec22763610d177f90275c506201ed8203d3e3a9a4eaceb4719e5ca131c636c531d65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3885541949a5d1abcb403b4ba60badf
SHA1ef4f44a815c268809fdf756f8d072869c0414e6d
SHA25650a3cd19ba0736079a4a0e6ae82084049d04728d1dd1641aa247a853f08c3b47
SHA51204f6d9f5d8ca66b4b46d7d1f4e931a154155496822493c0f623963889f46a77c36f859727c303788c1130dfe59d91a746e91768bc8076b164f407cf8dd88ad58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6400fe93b2e303e4a65b0a09e1dce8e
SHA10f0d4949752a9ad741b5dd4f0a5cd99e53c8ea1f
SHA25656980efaeff44761fb247c650c4cb5f42b5f99af0a73344200ead27598e5f621
SHA51280af54f75e2ab21b84c0f2d49905d52388f863c9fe844571e2bc39169c0cf7c067ed597da79db904e947888c9d0b3cd716b1bf4991c1d3a80972fc4d01adfa28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a151dd19f14a4baef46cb891da4241b
SHA198b6e1a651336b9d590e1a8626f6175d4bdb7a95
SHA25613ac1c02a5ce7cd7dd5f7312b5afde6d64ea5f9f204570b83046a724c43b6a92
SHA5127961b54ee14d4b9b9b5a753a69f2f1270eac88c759c37a36328e9d6a5266c8c577e2d3cb54d1f9a8caea95567ab0b854ac291d5c409b9f618cf5e76833202289
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
23KB
MD5a64b9c1f10a5434738f6efec8a1399c9
SHA1a66e15e4125cb358c1e1998ce393f9660e4f65bb
SHA2562d863a8cebd864ce51052984bd2031d37c9b022bb80c80ec0b1ca382160ae57b
SHA51253510079aff46a1b98ff7e0055288af2dce8ec3224fa5869fca4c29b33b26bad7bddecde0ded08a07e162d1bfbcca1120c0717a6156967f944567eeb99f942ee
-
Filesize
11KB
MD551b31092bc19fff637a4b0433b2bd36e
SHA1ed35222ff897af309ce25bd7a215c08e1188c6f2
SHA25604e9d5b91cf9782066ccd043cb1cc2e5eda08b8340cc98ea5786597669f8237c
SHA512c10535cd7a1dcb07eaa4975b329effe6e6563e9946f5ed4dfa42ad50c06f1ef038aeaf62868ebe7c13745328bf3bfd0a7430105683c7fa154a4cee4116df0e7a