Analysis
-
max time kernel
120s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06-01-2024 06:19
Static task
static1
Behavioral task
behavioral1
Sample
4581e3602e92053f685c9c9e4feb2da1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4581e3602e92053f685c9c9e4feb2da1.exe
Resource
win10v2004-20231222-en
General
-
Target
4581e3602e92053f685c9c9e4feb2da1.exe
-
Size
2.8MB
-
MD5
4581e3602e92053f685c9c9e4feb2da1
-
SHA1
3f02318ce3a52dcb797b4f495e81521dcc21b72c
-
SHA256
73b1b78727cb770d3b7e70a89db1b2b2939881ad88ebc672d0d81e306a05e962
-
SHA512
983eae541908a55e09749be088140640ddea3ec3c2e70c631a9c528e0813094411d7eca682e30ba0297959c8cb8b0c11e60e543762a0e0e97f19859a66972f3c
-
SSDEEP
49152:SgQX0ryUR0aXZkXaur+B/b6uEdp2sRRly39pYaC5parHAEohY3Tf76cL:SgK0sIZy+Juu6IskNCyVyY3Tfuc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 4581e3602e92053f685c9c9e4feb2da1.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AFBA3EA1-AC5B-11EE-B754-4A7F2EE8F0A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410683913" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000986ae649303a0370ac17d1aabf5fdc2beef15af838f789c1c6c6d4163a5e8a4e000000000e800000000200002000000017e047a8d9885ca2b7ba809542887ab359473fc1225d7b4d998f06672b09d039200000007007d932da0d4ea0dd1712df7ec4de679b0f9ebfb505932e84fc6041b032d4a940000000a3ceb24bffab240c8f535b4ee5f09568c1a2315f9d65182f49e77ad24619d4b4517b8c2777ddb335e05956175169f581ee157fd69164c03504da6ef8854972b9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main 4581e3602e92053f685c9c9e4feb2da1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 4581e3602e92053f685c9c9e4feb2da1.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0226e7c6840da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1048 4581e3602e92053f685c9c9e4feb2da1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2604 iexplore.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1048 4581e3602e92053f685c9c9e4feb2da1.exe 1048 4581e3602e92053f685c9c9e4feb2da1.exe 1048 4581e3602e92053f685c9c9e4feb2da1.exe 1048 4581e3602e92053f685c9c9e4feb2da1.exe 1048 4581e3602e92053f685c9c9e4feb2da1.exe 2604 iexplore.exe 2604 iexplore.exe 860 IEXPLORE.EXE 860 IEXPLORE.EXE 860 IEXPLORE.EXE 860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2604 1048 4581e3602e92053f685c9c9e4feb2da1.exe 29 PID 1048 wrote to memory of 2604 1048 4581e3602e92053f685c9c9e4feb2da1.exe 29 PID 1048 wrote to memory of 2604 1048 4581e3602e92053f685c9c9e4feb2da1.exe 29 PID 1048 wrote to memory of 2604 1048 4581e3602e92053f685c9c9e4feb2da1.exe 29 PID 2604 wrote to memory of 860 2604 iexplore.exe 30 PID 2604 wrote to memory of 860 2604 iexplore.exe 30 PID 2604 wrote to memory of 860 2604 iexplore.exe 30 PID 2604 wrote to memory of 860 2604 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4581e3602e92053f685c9c9e4feb2da1.exe"C:\Users\Admin\AppData\Local\Temp\4581e3602e92053f685c9c9e4feb2da1.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.x5aa.com/download.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2604 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:860
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a46ecbaa806593d2e5a4abfbceb50d1
SHA16784ec253b0e07728978d49464dfdd8ad72f835f
SHA25654e239311e3318c1f9ffc50f24a5b181627b16ecc5b7ad16c2a3e1ef21e313c6
SHA5122a68574fe6c9dd46703424c45eada44b38d0f5e37137c1745f4d54878054735da6edc9a86fbccdabbcb407722d646b74665dcba720355c3c1f295bfb2f08abfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f4885dbe0269bf8d3c9a7608d97f89b
SHA12265c9a97b492721dd40b8d432f0395e8bc03caa
SHA256429856b38bddf03dba71ce7835d296ccf472f03143aac2eea534eac3b110d778
SHA512881551196a451efd9490c495e3215e8359bb5781945c0a37ff2a6ea30722a15f15d8d7a5714dcc9506ccc893000944b35cf9f4e56d50367a6901d769922f3f0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b6a9a27a3161bc507b20b6f07d1e5a2
SHA1ad54e2fcbba14eea343babd4f4175261b3408105
SHA256782a5617d99964817ad3f7f2745fcd385fd12bbd8baf471d70870820a83bd75d
SHA512734a95013a841436fdf9e7262e72eee1c2a846a9a5def8119500ccd04eecab5cc2ffa74c81c669dc45427b9b0c81c29c599352d29e2291cf0d404b4c9975c636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cc9d6d3dc892fa0d773ceee35edcf3a
SHA1695d5e7377607bb90a65b6cb487457ce4a6515fe
SHA2564171275427ee4367fbf6e2f6d54a648498795b08a130ba4fd28a1e362aeb66e2
SHA5125e3e69bcabab6e423e4a636825f6b2304465cee30a3d9febf715b291877b7e36d41f7c489dd2113084b20387c7986efc6a88edcadb6c55dcc7b5562e72b17085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d72bed51b04d0ffdba6380a43420a43
SHA1d2c5ff5c73bd62b2f27a4f0bfca946cfd8972f2e
SHA25650864bc4ee3dab067599f5659ccc1c6d18da1a851ab7a16cb08b0a729d9c1d61
SHA5121a29cfdf12cb04286abebc69f7680741dc15970afeb24e2c3e3567e6241f4772606ae66ff8f2fb3a6cc25c6f104fe4ceed768b5970b1e34baa587605c44f7e0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5451fdb89e5f53792560930d7bb28c1fd
SHA17ed44164e29db1cd7efc63f0e91dfe68251bd746
SHA2562788616986d3550ac6478c0a4c5cd2457ded27480d1044bc7f6acf702299009c
SHA512da0e2f8dbe9aeb1052f58356a268f89a08ba7f2f3c959a228ed2c23c52b20c373b1c20fed3237c97ca15951dc3f4d98208fb3d6b37f80df4ff3cf76060b0f59d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5533f23557fb0a05f9991699d8136df09
SHA18a92b415a5ac6d653c75d1338ee625353cdbe20e
SHA256ca47ccf1af09517989f49ca4e1715afb1cb677257c582acf243b066d381d0665
SHA512315cad02b02e96c2f72550683a0fac99e711dfde5dd8f0bcc6f18aaa94e448b2bf4941fe5fedc690b715ff391a684d28d9bc0ef3f9d2fc69f0b0361e84537030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52677ca58a60c0b7a3e8ab83c6f95121b
SHA16c500659a3cee53031bd2369e0fd260a33746848
SHA256bb7bd272124b63703a7c79a69312180b050953faf11f8e220e21f58fbbf16f4c
SHA512f86e23ddc6c4c81603e4b843953521b85a0af9033a428e2b132c4ddbaa7b3fa7f8acef8a8a6ff2ce397175cd2f05441c4dd31abc593b33c18d58cd4fbeba7003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5310800269a4e7f4a55c684e483a0e71c
SHA139e4c28afa8ea837736487b7348c6953ec84d467
SHA256118398925314e63b88b46ff24457246827baf21d5a148aab21c2997e625e67cb
SHA512f28d19fd81108278dbec844a937a150914b3d89aaf8fef688102caa3c1f5e93aa08f3076b7c96fd722721a57dc7b38d5a0bdb9dc90385c3d9d7c355ed471c152
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe80b36efc7c8d836cd470378e3b1c6d
SHA1b4a3db8a604876a64a2368ce5c5de6ac6f2fe823
SHA2564b5cd18398bbda374a03a44c7209d0c348e6070cc41548349eb03717a7bbaabe
SHA512766a64c4e7c90c078360395d0deebee46ee3eff1269e781b2cf00b24c36d5a76c8530d986774d64ad1e039d39cc9cf5cce0ad464ea71dade48aa1ef1608471b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e59a31982c2a147ef311af23d910ad0e
SHA1ceb87767a87cacdfca49339b1cc46e0457248b60
SHA2560e58229339345465903abd787bb56ad890c7e3e2d0f1fdd745ba9820a0d49f68
SHA512324031712ebafdaa2f1d58f4c20cb192ddbbc149111af90fe99dc13f91c2dc7e417ab50fc9879127251d875524287f8c9c103f2bab9362414f31183ac89ba4e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b70790eff74b842bf0901ee865c730b4
SHA12b22cbb52a24851295367f2c1cab5013a44bfe45
SHA25606e22e42d3fea7c1c32517eb1528e0b5be5f949b383d6a55e61d644b19c8d667
SHA51277eb22ccdc050a7f67b060d5a5f2c143fa8989b9c7617aeef9c54291587721977a86e92a50fa06a509f7c69d13f3d842f94b2973d2d351f2c587d89978355f6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59744adcbb3e7a1ff8006efd035c766a1
SHA1e5a06eb676fa28cbabe5df8766c3255a01a7b155
SHA25649cbfa919cdb73154f2b4dc566f1bb9dcd9af3bf325bf2f2e4b4c24dc43b2399
SHA512e7302fedca7cbc264a2ec4abb449e920d4354dc757d58764849853645382d4f07f6b77ad7fa8def0909d293e377567a6aa30547ac80d30c6c2426b7d4929537e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06