Analysis
-
max time kernel
151s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 22:09
Static task
static1
Behavioral task
behavioral1
Sample
474989eaebe85c9c6001dacc38b4dfbd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
474989eaebe85c9c6001dacc38b4dfbd.exe
Resource
win10v2004-20231215-en
General
-
Target
474989eaebe85c9c6001dacc38b4dfbd.exe
-
Size
2.0MB
-
MD5
474989eaebe85c9c6001dacc38b4dfbd
-
SHA1
6efd741dd1c9732459db974c92c9b586f9a33b4d
-
SHA256
7bfe0a6ad74dbff91ee347bf8fb9d565dbe83f46edefeacc1af1c68b37a1aea7
-
SHA512
39c55d6257f9b006279bcf493826fd7bc5acedc0072ea7a7c20595d4974fcd3d23560d355c05f4acfb8814198e5a575f59a273ba1697958b9c10fa46cb831ba3
-
SSDEEP
3072:2pZp75DchnX/eJuaBD1YOEe5hyZx3R6KZjwA/pWpliQCIntmjOkh5:2vp75c/ecaDIECkmWplcIntmjOkh
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 474989eaebe85c9c6001dacc38b4dfbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\recovery = "C:\\Windows\\system32\\urlippptp.exe" 474989eaebe85c9c6001dacc38b4dfbd.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{22d7f312-b0f6-11d2-94ab-0080c33c7e95}\StubPath = "rundll32.exe C:\\Windows\\system32\\themeuichk.dll,ThemesSetupInstallCheck" 474989eaebe85c9c6001dacc38b4dfbd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{22d7f312-b0f6-11d2-94ab-0080c33c7e95}\IconsBinary = 43003a005c00570069006e0064006f00770073005c00730079007300740065006d00330032005c0069006400750069007500640066002e006500780065000000 474989eaebe85c9c6001dacc38b4dfbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{22d7f312-b0f6-11d2-94ab-0080c33c7e95}\Version = "1,1,1,2" 474989eaebe85c9c6001dacc38b4dfbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{22d7f312-b0f6-11d2-94ab-0080c33c7e95}\ComponentID = "DOTNETFRAMEWORKS" 474989eaebe85c9c6001dacc38b4dfbd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{22d7f312-b0f6-11d2-94ab-0080c33c7e95}\DontAsk = "2" 474989eaebe85c9c6001dacc38b4dfbd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{22d7f312-b0f6-11d2-94ab-0080c33c7e95}\IsInstalled = "1" 474989eaebe85c9c6001dacc38b4dfbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{22d7f312-b0f6-11d2-94ab-0080c33c7e95}\ = "Themes Setup" 474989eaebe85c9c6001dacc38b4dfbd.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{22d7f312-b0f6-11d2-94ab-0080c33c7e95} 474989eaebe85c9c6001dacc38b4dfbd.exe -
Executes dropped EXE 9 IoCs
pid Process 3824 monudflsa.exe 5072 smss.exe 2748 smss.exe 2216 smss.exe 3768 smss.exe 2508 smss.exe 4832 smss.exe 4268 smss.exe 2348 smss.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\recovery = "C:\\Windows\\system32\\urlippptp.exe" 474989eaebe85c9c6001dacc38b4dfbd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\ = "AcroIEHelperStub" 474989eaebe85c9c6001dacc38b4dfbd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\NoExplorer = "1" 474989eaebe85c9c6001dacc38b4dfbd.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} 474989eaebe85c9c6001dacc38b4dfbd.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\urlippptp.exe 474989eaebe85c9c6001dacc38b4dfbd.exe File opened for modification C:\Windows\SysWOW64\uiapisys.exe 474989eaebe85c9c6001dacc38b4dfbd.exe File created C:\Windows\SysWOW64\engenvlib.exe 474989eaebe85c9c6001dacc38b4dfbd.exe File opened for modification C:\Windows\SysWOW64\monpdbdns.ocx 474989eaebe85c9c6001dacc38b4dfbd.exe File created C:\Windows\SysWOW64\monpdbdns.ocx 474989eaebe85c9c6001dacc38b4dfbd.exe File opened for modification C:\Windows\SysWOW64\udftapiras.exe 474989eaebe85c9c6001dacc38b4dfbd.exe File opened for modification C:\Windows\SysWOW64\engenvlib.exe 474989eaebe85c9c6001dacc38b4dfbd.exe File created C:\Windows\SysWOW64\iduiudf.exe 474989eaebe85c9c6001dacc38b4dfbd.exe File created C:\Windows\SysWOW64\uiapisys.exe 474989eaebe85c9c6001dacc38b4dfbd.exe File opened for modification C:\Windows\SysWOW64\ctfsrvnet.exe 474989eaebe85c9c6001dacc38b4dfbd.exe File created C:\Windows\SysWOW64\udftapiras.exe 474989eaebe85c9c6001dacc38b4dfbd.exe File created C:\Windows\SysWOW64\urlippptp.exe 474989eaebe85c9c6001dacc38b4dfbd.exe File created C:\Windows\SysWOW64\ctfsrvnet.exe 474989eaebe85c9c6001dacc38b4dfbd.exe File opened for modification C:\Windows\SysWOW64\iduiudf.exe 474989eaebe85c9c6001dacc38b4dfbd.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 624 3824 WerFault.exe 102 -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\ = "Adobe PDF Link Helper" 474989eaebe85c9c6001dacc38b4dfbd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\InprocServer32 474989eaebe85c9c6001dacc38b4dfbd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\ProgID 474989eaebe85c9c6001dacc38b4dfbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\VersionIndependentProgID\ = "AcroIEHelperShim.AcroIEHelperShimObj" 474989eaebe85c9c6001dacc38b4dfbd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} 474989eaebe85c9c6001dacc38b4dfbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\InprocServer32\ = "C:\\Windows\\SysWow64\\monpdbdns.ocx" 474989eaebe85c9c6001dacc38b4dfbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\InprocServer32\ThreadingModel = "Apartment" 474989eaebe85c9c6001dacc38b4dfbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\ProgID\ = "AcroIEHelperShim.AcroIEHelperShimObj.1" 474989eaebe85c9c6001dacc38b4dfbd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\VersionIndependentProgID 474989eaebe85c9c6001dacc38b4dfbd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3336 474989eaebe85c9c6001dacc38b4dfbd.exe 3336 474989eaebe85c9c6001dacc38b4dfbd.exe 3824 monudflsa.exe 3824 monudflsa.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3336 474989eaebe85c9c6001dacc38b4dfbd.exe Token: SeDebugPrivilege 3824 monudflsa.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 3336 wrote to memory of 3824 3336 474989eaebe85c9c6001dacc38b4dfbd.exe 102 PID 3336 wrote to memory of 3824 3336 474989eaebe85c9c6001dacc38b4dfbd.exe 102 PID 3336 wrote to memory of 3824 3336 474989eaebe85c9c6001dacc38b4dfbd.exe 102 PID 3824 wrote to memory of 1968 3824 monudflsa.exe 107 PID 3824 wrote to memory of 1968 3824 monudflsa.exe 107 PID 3824 wrote to memory of 1968 3824 monudflsa.exe 107 PID 1968 wrote to memory of 5072 1968 cmd.exe 109 PID 1968 wrote to memory of 5072 1968 cmd.exe 109 PID 1968 wrote to memory of 5072 1968 cmd.exe 109 PID 1968 wrote to memory of 1160 1968 cmd.exe 110 PID 1968 wrote to memory of 1160 1968 cmd.exe 110 PID 1968 wrote to memory of 1160 1968 cmd.exe 110 PID 1968 wrote to memory of 2748 1968 cmd.exe 111 PID 1968 wrote to memory of 2748 1968 cmd.exe 111 PID 1968 wrote to memory of 2748 1968 cmd.exe 111 PID 1968 wrote to memory of 2860 1968 cmd.exe 115 PID 1968 wrote to memory of 2860 1968 cmd.exe 115 PID 1968 wrote to memory of 2860 1968 cmd.exe 115 PID 1968 wrote to memory of 2216 1968 cmd.exe 116 PID 1968 wrote to memory of 2216 1968 cmd.exe 116 PID 1968 wrote to memory of 2216 1968 cmd.exe 116 PID 1968 wrote to memory of 4928 1968 cmd.exe 119 PID 1968 wrote to memory of 4928 1968 cmd.exe 119 PID 1968 wrote to memory of 4928 1968 cmd.exe 119 PID 1968 wrote to memory of 3768 1968 cmd.exe 120 PID 1968 wrote to memory of 3768 1968 cmd.exe 120 PID 1968 wrote to memory of 3768 1968 cmd.exe 120 PID 1968 wrote to memory of 1664 1968 cmd.exe 121 PID 1968 wrote to memory of 1664 1968 cmd.exe 121 PID 1968 wrote to memory of 1664 1968 cmd.exe 121 PID 1968 wrote to memory of 2508 1968 cmd.exe 122 PID 1968 wrote to memory of 2508 1968 cmd.exe 122 PID 1968 wrote to memory of 2508 1968 cmd.exe 122 PID 1968 wrote to memory of 4652 1968 cmd.exe 123 PID 1968 wrote to memory of 4652 1968 cmd.exe 123 PID 1968 wrote to memory of 4652 1968 cmd.exe 123 PID 1968 wrote to memory of 4832 1968 cmd.exe 124 PID 1968 wrote to memory of 4832 1968 cmd.exe 124 PID 1968 wrote to memory of 4832 1968 cmd.exe 124 PID 1968 wrote to memory of 2996 1968 cmd.exe 125 PID 1968 wrote to memory of 2996 1968 cmd.exe 125 PID 1968 wrote to memory of 2996 1968 cmd.exe 125 PID 1968 wrote to memory of 4268 1968 cmd.exe 126 PID 1968 wrote to memory of 4268 1968 cmd.exe 126 PID 1968 wrote to memory of 4268 1968 cmd.exe 126 PID 1968 wrote to memory of 3208 1968 cmd.exe 127 PID 1968 wrote to memory of 3208 1968 cmd.exe 127 PID 1968 wrote to memory of 3208 1968 cmd.exe 127 PID 1968 wrote to memory of 2348 1968 cmd.exe 128 PID 1968 wrote to memory of 2348 1968 cmd.exe 128 PID 1968 wrote to memory of 2348 1968 cmd.exe 128 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 3208 attrib.exe 1160 attrib.exe 2860 attrib.exe 4928 attrib.exe 1664 attrib.exe 4652 attrib.exe 2996 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\474989eaebe85c9c6001dacc38b4dfbd.exe"C:\Users\Admin\AppData\Local\Temp\474989eaebe85c9c6001dacc38b4dfbd.exe"1⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\monudflsa.exe"C:\Users\Admin\AppData\Local\Temp\monudflsa.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4675.tmp.cmd "C:\Users\Admin\AppData\Local\Temp\MONUDF~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\smss.exe"C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 54⤵
- Executes dropped EXE
PID:5072
-
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h "C:\Users\Admin\AppData\Local\Temp\MONUDF~1.EXE"4⤵
- Views/modifies file attributes
PID:1160
-
-
C:\Users\Admin\AppData\Local\Temp\smss.exe"C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 54⤵
- Executes dropped EXE
PID:2748
-
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h "C:\Users\Admin\AppData\Local\Temp\MONUDF~1.EXE"4⤵
- Views/modifies file attributes
PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\smss.exe"C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 54⤵
- Executes dropped EXE
PID:2216
-
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h "C:\Users\Admin\AppData\Local\Temp\MONUDF~1.EXE"4⤵
- Views/modifies file attributes
PID:4928
-
-
C:\Users\Admin\AppData\Local\Temp\smss.exe"C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 54⤵
- Executes dropped EXE
PID:3768
-
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h "C:\Users\Admin\AppData\Local\Temp\MONUDF~1.EXE"4⤵
- Views/modifies file attributes
PID:1664
-
-
C:\Users\Admin\AppData\Local\Temp\smss.exe"C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 54⤵
- Executes dropped EXE
PID:2508
-
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h "C:\Users\Admin\AppData\Local\Temp\MONUDF~1.EXE"4⤵
- Views/modifies file attributes
PID:4652
-
-
C:\Users\Admin\AppData\Local\Temp\smss.exe"C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 54⤵
- Executes dropped EXE
PID:4832
-
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h "C:\Users\Admin\AppData\Local\Temp\MONUDF~1.EXE"4⤵
- Views/modifies file attributes
PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\smss.exe"C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 54⤵
- Executes dropped EXE
PID:4268
-
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h "C:\Users\Admin\AppData\Local\Temp\MONUDF~1.EXE"4⤵
- Views/modifies file attributes
PID:3208
-
-
C:\Users\Admin\AppData\Local\Temp\smss.exe"C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 54⤵
- Executes dropped EXE
PID:2348
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3824 -s 5323⤵
- Program crash
PID:624
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3824 -ip 38241⤵PID:3628
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5e7efc2c945a798b4dab3fe50f1524592
SHA10bb937ccd89e40c91c0e58b376873ef909fe805b
SHA256624acac79fdcfe30592f5321b4ab73d360f393dbcdbe8daa50fcce63c710f5dc
SHA512e75840979404587aa15fd4d1e46707c33e32dca086ca72c7666045e14191e29857d06dc8ba737e69925c71b2e2d6a5ee3b63c36ecd2f32ae515f85a985d8f257
-
Filesize
4KB
MD53adea70969f52d365c119b3d25619de9
SHA1d303a6ddd63ce993a8432f4daab5132732748843
SHA256c9f5a19c7b11fd866483adc93aa5bc4bd3515bd995ca79297b227e3e5ef1a665
SHA512c4d836fcbdab4c859a6fc0f849d1e41e98c7e23fc0fe0fe0a09cb68e9a57d60b2ae9ad46762d7a5e05db28d6179bd431ef179ee1f9ff016db74cc3b1d74ed7f8
-
Filesize
88KB
MD52bd46a980dde8eaa13e3defffb87e1e0
SHA1926046f0c727358d1a6fbdd6ff3e28bc67d5e2f6
SHA256f6af08e31471c98adcc26f9916e26d41aa0c47ff94949d3174d55c320032be26
SHA51245dcd587a63c6c01077d1afe27af8942b4944a11247dafe4df48150f808dd46df032d2dbf3fd9ace39d656671a7db52d8a5a9d14c2aa64ec5d6caee5a1d6d04b
-
Filesize
18KB
MD5b3624dd758ccecf93a1226cef252ca12
SHA1fcf4dad8c4ad101504b1bf47cbbddbac36b558a7
SHA2564aaa74f294c15aeb37ada8185d0dead58bd87276a01a814abc0c4b40545bf2ef
SHA512c613d18511b00fa25fc7b1bdde10d96debb42a99b5aaab9e9826538d0e229085bb371f0197f6b1086c4f9c605f01e71287ffc5442f701a95d67c232a5f031838
-
Filesize
2.0MB
MD5474989eaebe85c9c6001dacc38b4dfbd
SHA16efd741dd1c9732459db974c92c9b586f9a33b4d
SHA2567bfe0a6ad74dbff91ee347bf8fb9d565dbe83f46edefeacc1af1c68b37a1aea7
SHA51239c55d6257f9b006279bcf493826fd7bc5acedc0072ea7a7c20595d4974fcd3d23560d355c05f4acfb8814198e5a575f59a273ba1697958b9c10fa46cb831ba3