Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-01-2024 00:53
Static task
static1
Behavioral task
behavioral1
Sample
3f7b4c01239047c92683eeb9ebcdec7c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3f7b4c01239047c92683eeb9ebcdec7c.exe
Resource
win10v2004-20231215-en
General
-
Target
3f7b4c01239047c92683eeb9ebcdec7c.exe
-
Size
12KB
-
MD5
3f7b4c01239047c92683eeb9ebcdec7c
-
SHA1
6bd9c986a84a19c41d2803eb4a7f00c2cf3aa5af
-
SHA256
86cc2e04de9e817ba03bc2355240b6893720903725ce10bd4b863b71d774cace
-
SHA512
6378b7fc2d8237265a8da3392092f8283f0fe97abe07f76d826cb84ef288c20d9f93edd5a021ff9fa2c72e7dca156a522e08f86c3f4b606e574186e323f81a4b
-
SSDEEP
96:nPtOteWbaZWpWud9SKM4+xbOdNW5UANp/tYgZEFhKH3ppde2:n8IWbSb/xxbO7qEqpde
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\hosts 3f7b4c01239047c92683eeb9ebcdec7c.exe File created C:\Windows\hosts 3f7b4c01239047c92683eeb9ebcdec7c.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B43C5E21-AA9B-11EE-9FFF-CEEF1DCBEAFA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410491495" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e087c488a83eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.searchmeup.net" 3f7b4c01239047c92683eeb9ebcdec7c.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000d440d10617ac1597712be4aef7c38804426e2d662b2e2fafac0fb9c75789f7e4000000000e8000000002000020000000a0ca3f7b161541923d7aa7bff91dda501095c0f5f45ab2640d90261d304c669b20000000def74b4067fd4ba90e1e7c87d7215166c5b742f7d69a0978169b842f17004d6f40000000cf1f153d3167ba1e893601baa39312ebcb22da0c3d07751dc68d0fd21205fd96cbdbce2dc729701204dd1c93c5f82d127efcb4a4b05c9c3a23b22ce35a8dae31 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.searchmeup.net" 3f7b4c01239047c92683eeb9ebcdec7c.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2744 iexplore.exe 2744 iexplore.exe 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2928 wrote to memory of 1812 2928 3f7b4c01239047c92683eeb9ebcdec7c.exe 28 PID 2928 wrote to memory of 1812 2928 3f7b4c01239047c92683eeb9ebcdec7c.exe 28 PID 2928 wrote to memory of 1812 2928 3f7b4c01239047c92683eeb9ebcdec7c.exe 28 PID 2928 wrote to memory of 1812 2928 3f7b4c01239047c92683eeb9ebcdec7c.exe 28 PID 2480 wrote to memory of 2744 2480 explorer.exe 30 PID 2480 wrote to memory of 2744 2480 explorer.exe 30 PID 2480 wrote to memory of 2744 2480 explorer.exe 30 PID 2744 wrote to memory of 2904 2744 iexplore.exe 31 PID 2744 wrote to memory of 2904 2744 iexplore.exe 31 PID 2744 wrote to memory of 2904 2744 iexplore.exe 31 PID 2744 wrote to memory of 2904 2744 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f7b4c01239047c92683eeb9ebcdec7c.exe"C:\Users\Admin\AppData\Local\Temp\3f7b4c01239047c92683eeb9ebcdec7c.exe"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe http://www.searchmeup.net2⤵PID:1812
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.searchmeup.net/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2744 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2904
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54724d9544cb51655d62b83743e29f4ee
SHA1c1efbab6d3294d2615164d8e97141736f3f0addc
SHA2569660a78917cd7c0f22efc8fb0f26af0e3aa2f4791af74a8209f985bb41b92e98
SHA51287f759af40228514f72c17dda6adf8addb6eddce3a9b2fb52437026fdc8fef3f897d9223a8719c520d21093d662ac3805407ff63bea6767c80a125633be68484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3a10a3590f57a3a5dd293a98370dc62
SHA1d2e35457b618c4c4c2d11f5cb7d373c0816a5b89
SHA256bce31295d28e95a87425ffd55054fedaf45cb58026f579e38e55e91d67630e17
SHA5120c3a2dabcc9d8fa0bbd4e984847c9880cc2a73489323de53aaccaac331d281fcd4fc16e0f195cdecbc9a925aec65b600282ece34cb5dd563143bacffafca741b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
24B
MD536a5fde038596401fe55597cdd9b1f0d
SHA1f40494bf8d7e3b3a66e58d7759056e02d74567f8
SHA25681ba18b814958303ba4721ce7b2985a9bc9fdded6d55d9d56ecd773be99faff8
SHA512bc00ecdd891c69c200c33f4e5891ee78b9b8588305399284f6f9bcfa558ccfec81649eb1a011a79a98498d997a1a77ab09a8c5eb98c95eb86825d1d5d43eea55