Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-01-2024 16:50
Behavioral task
behavioral1
Sample
41651db34032111d91ab4b2fee8d38c4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
41651db34032111d91ab4b2fee8d38c4.exe
Resource
win10v2004-20231215-en
General
-
Target
41651db34032111d91ab4b2fee8d38c4.exe
-
Size
183KB
-
MD5
41651db34032111d91ab4b2fee8d38c4
-
SHA1
a9395a9269f2bb8e1ea5160de3622fdff5d752b9
-
SHA256
2da3965a34f2612b726d6ace2d56e29d955a456464e1aeb4e136f74e5b69bb03
-
SHA512
0ee2e327385a5e53e36fbeff53c512b8ec49b35dc5a5b7953ffb12f3aa6cc9d1bd001e16d47a5204b0ef2ae85a4df61e130f45c09da6a27ae66664f6675cf911
-
SSDEEP
3072:QbcQQbs0ge/c3NLBuRutnugxCGLNut/g5xkbN9Q7aisbhcEIYfSwoE:QbeY7eU3NLcu9xCGLNuY5xkb7iYcEnSy
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "21" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "21" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000b1588bd89e45a27139632f40b43d60ef91cd5999f6c69f882aa8e07b6e0143e0000000000e8000000002000020000000311ef6dc1c9763ad0890d547fc98624372002da80dd65c50cefb9372bd5b80fe200000008befa438b98eeeb9674f93479cec6d7ee6c7f6f1fd1f5b0a2fe05c6a4e01e90a400000001da86905a3159c39504eba40bcb3bbb854d65da290a44cd0217d81547238e76808d5a2bec3d0cb6598732a47adcf0c63b43549395c3066d4badc60bf74ead87f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5A6E4A81-AB21-11EE-9D0D-D2016227024C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "21" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0af8e352e3fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410548895" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2416 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2416 iexplore.exe 2416 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2416 2856 41651db34032111d91ab4b2fee8d38c4.exe 28 PID 2856 wrote to memory of 2416 2856 41651db34032111d91ab4b2fee8d38c4.exe 28 PID 2856 wrote to memory of 2416 2856 41651db34032111d91ab4b2fee8d38c4.exe 28 PID 2856 wrote to memory of 2416 2856 41651db34032111d91ab4b2fee8d38c4.exe 28 PID 2416 wrote to memory of 2780 2416 iexplore.exe 29 PID 2416 wrote to memory of 2780 2416 iexplore.exe 29 PID 2416 wrote to memory of 2780 2416 iexplore.exe 29 PID 2416 wrote to memory of 2780 2416 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\41651db34032111d91ab4b2fee8d38c4.exe"C:\Users\Admin\AppData\Local\Temp\41651db34032111d91ab4b2fee8d38c4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.flogao.com.br/gatascari0cas2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c775d465df760234a7420572d7f5e6c7
SHA1cdbefbc3060aebd465cfa920f737e82a454f0e43
SHA256c01afc7e5d38338c7799e7ff1a31d386fcc7ea1f1666703c5a9076ad91e616ba
SHA512e0dd875dd8ad7e26fc2b6481c4e7edd4661094d9e332121929f8609c3604e4c815d61ead2a52c2aabe4da22e9007dd61acac9fbbf92cae25f595b04538fd8c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d29a877df683bee19f5432fff6680abc
SHA15f2bca5b1ae7f1a2f97c81058ed0afda2d2577f4
SHA256daec24bd7e940f9bd01995af5ee541341a28fa73d4ec5b4ad6b39bcde6aa0a12
SHA512267518a8ebcd0cd7ca1b3190ab7f65480000eefdb8de16bfe664d319f277bd219213857f2e57b1ffc923effcb906533e16ca5c4b46e048ae32b62507a7482b76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52863b8fa28d087f8e9fd77f401f9b17e
SHA174c72e77772289f5cd3209812a4ea46332b874d4
SHA2563c453a970d2b08f6a0453849ae439545209d906e4b173ada801faef9c1bde4a3
SHA512aef97597d203e5d2007c52bd5ce3e7574c4b9a276af6901791ca8dbe146294c4df8d687ad1a902a3bdddd532ff72340f06a54e87dbc13448df97a8421ba2e378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b275c44a7559ec81a37b13e0ff3bc02
SHA1d8448d56603165244d7be415ad6a4132c547804f
SHA256d5f0e1cf9c3a491ff0a2fbfb6c33710dbe25cfd72a5b3b2826a0708df7906802
SHA5123a6f3c0b46969a70a9acb892f7e08fc022103df0035dfb46fa28562f8ea3f5460e6a300d7ca55e231c6a1b7497338301edc6acd74ffe9a7a5262835d39d8419d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5ba25b6eab45701ec73a1eea6496331
SHA15f632f8b3462d8f7e80077fe6767474c2825d124
SHA2560897c2f72f7781bfa4ead6b75647fcf0ac5122828c88d1ea1703ffd467956305
SHA5124ab6b8aeabee2c522950d363183827cef0dd4eaa0da87a8c32821c0e3d454ca4a48aa06b8356f493d2c720af96f108394d7847e4cab660930d9b72ff1c97a626
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5120b4e9e03d3d5a1fcda11a0c39774cf
SHA1fe44a4fcb469b9d169885ae9145d00812642cdeb
SHA25690cfd6cf91d4787ff116273ebda82cae1f4b74b790b9e0d1a79eace2d5ec8118
SHA5126d68566a95bf8363f94abba9cc54fbf675d39913c8c72dddd3918ac156b33c220423e85653855ded71337e16dbf00b05b93cb0c001d14c693ea0eed64ad1ffa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e570379935f1e13c86c9cbb788f29a1f
SHA164d508a1d2ba2e5e243ceef599ff7928c99a6449
SHA2567def9d39e850fb7b784226ab56981c60d477396f15429057f683de3c1b803ae1
SHA51210d4ea961d713694d7636f997c2760b9834c326d282c498c7ba390de383e6f2d899de57a7a12d601080b3effea95f22a43b0d54d10291d20c86a77856e082265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e567cf7afcdefdfdfb823f3049c2aa21
SHA1e0b05cc2e4a749fff006677872bbae318be7d2aa
SHA25688f76b020137971a2aecbdd3fed76d8c0721acc0538fdaba37f37e7dd12700e9
SHA5120ba19180a677b878e61f74686001508aa1bbf4dedb38b3e1f15ba66fd9e4f097835852dab21030ae5b9ab612e98ea5959379a4710ed77ea8d92cb1532d9ec7d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f85cc6aa9d5f18445244ea52dcd39821
SHA1363a1102ffedffed2d0b208c60e63bd976f7063a
SHA2560f54389dfdab79d1e8f4c5b3b51d8e5b1ea5f0c2901fcfbcd6bc6e4847637be8
SHA512f8847c8172b1fa7aba27b7088a91e9ff70f4cd3f703f15341cd3556401485bcd604cba3ccfb7b0ceabd2abc3f2d5ae0cd7c8b754faebab694f7ecfa4afdf6b15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a92be35e8c95ef0efe112f2976a58c4f
SHA165c063e5696bfedb16073d373733ce4c6ec6136a
SHA256a7367e033e54be8c8e032be414c66ba8f25cdf5604d1fc7f711f13b145c15bbb
SHA512fc60c25e2659f99abc7c4156aa7c0aa17249a3a27dfd97dc2a21362ded08289b5afed17282c1b095d4f94dfd6b36df1e79184fa10db70e64821a121a6d7df262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c94e33a0aa33291886422e48e2c46019
SHA1333a627fe8c4a4fd6ae720bcbd699425e37c4a9d
SHA256adce0a0b26ff02f234cfa22925ed650b3e69a5cd533475674a7947e882d2da01
SHA512be7d06ba23766336630184a5c2bcc16ce2875de8649c5bbadca5ffc45a01bc8ff9c5008a4eb8287083e6f0c62b7df374e9af4fede88bcbf1329b764986a72b8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5953981cfc267b4626fea01f17ab19443
SHA129c2b7ef55934afef2d3a965f0f4cbe8edc8cef9
SHA256c06f65cba65c28f1d6b5e794ffb11963683a6deaa3a3e61d73b4c2fd3b1f3c8d
SHA512184cbfc6d5053d8482d6a9633fcb11a5f598098df35aaafd8755b57e20e285d3c475ed5ff9ea0191b45536200b39cf746b334acb74927d36b4ea7c8c4226f6a2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\53STNJLW\styles__ltr[1].css
Filesize55KB
MD5eb4bc511f79f7a1573b45f5775b3a99b
SHA1d910fb51ad7316aa54f055079374574698e74b35
SHA2567859a62e04b0acb06516eb12454de6673883ecfaeaed6c254659bca7cd59c050
SHA512ec9bdf1c91b6262b183fd23f640eac22016d1f42db631380676ed34b962e01badda91f9cbdfa189b42fe3182a992f1b95a7353af41e41b2d6e1dab17e87637a0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\W79VKSP8\recaptcha__en[1].js
Filesize502KB
MD537c6af40dd48a63fcc1be84eaaf44f05
SHA11d708ace806d9e78a21f2a5f89424372e249f718
SHA256daf20b4dbc2ee9cc700e99c7be570105ecaf649d9c044adb62a2098cf4662d24
SHA512a159bf35fc7f6efdbe911b2f24019dca5907db8cf9ba516bf18e3a228009055bcd9b26a3486823d56eacc391a3e0cc4ae917607bd95a3ad2f02676430de03e07
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06