Analysis
-
max time kernel
122s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-01-2024 14:26
Static task
static1
Behavioral task
behavioral1
Sample
49383a314b93ec21c9fc0d5f4d592fa6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49383a314b93ec21c9fc0d5f4d592fa6.exe
Resource
win10v2004-20231215-en
General
-
Target
49383a314b93ec21c9fc0d5f4d592fa6.exe
-
Size
36KB
-
MD5
49383a314b93ec21c9fc0d5f4d592fa6
-
SHA1
b056c2f65c85ce70ead1be288eb122896e53999c
-
SHA256
882459fb825fd97543f2cff0110e7fa1c716efc2b47d0ef84c3bdc5ac31c6982
-
SHA512
1c804af2c551250a286b0294965cbeb0ff46ccc0a4f59bbc3f8cb6c5ee75fdafeb42d09188208d61ff6d96919f26154ec2d62bb76dca59407b4e0ca0f3b3a63c
-
SSDEEP
768:MX7tjZBRJdd0cuDUBbMn0Jbjj46Peu/W:MXtNd0cu+Mn0Jbjj469W
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1040 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2632 49383a314b93ec21c9fc0d5f4d592fa6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D0A3D551-AD68-11EE-B930-EAAD54D9E991} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410799493" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2632 49383a314b93ec21c9fc0d5f4d592fa6.exe Token: SeIncBasePriorityPrivilege 2632 49383a314b93ec21c9fc0d5f4d592fa6.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2780 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2780 iexplore.exe 2780 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2464 2632 49383a314b93ec21c9fc0d5f4d592fa6.exe 28 PID 2632 wrote to memory of 2464 2632 49383a314b93ec21c9fc0d5f4d592fa6.exe 28 PID 2632 wrote to memory of 2464 2632 49383a314b93ec21c9fc0d5f4d592fa6.exe 28 PID 2632 wrote to memory of 2464 2632 49383a314b93ec21c9fc0d5f4d592fa6.exe 28 PID 2464 wrote to memory of 2780 2464 cmd.exe 30 PID 2464 wrote to memory of 2780 2464 cmd.exe 30 PID 2464 wrote to memory of 2780 2464 cmd.exe 30 PID 2464 wrote to memory of 2780 2464 cmd.exe 30 PID 2780 wrote to memory of 2348 2780 iexplore.exe 31 PID 2780 wrote to memory of 2348 2780 iexplore.exe 31 PID 2780 wrote to memory of 2348 2780 iexplore.exe 31 PID 2780 wrote to memory of 2348 2780 iexplore.exe 31 PID 2632 wrote to memory of 2780 2632 49383a314b93ec21c9fc0d5f4d592fa6.exe 30 PID 2632 wrote to memory of 2780 2632 49383a314b93ec21c9fc0d5f4d592fa6.exe 30 PID 2632 wrote to memory of 2780 2632 49383a314b93ec21c9fc0d5f4d592fa6.exe 30 PID 2632 wrote to memory of 2780 2632 49383a314b93ec21c9fc0d5f4d592fa6.exe 30 PID 2632 wrote to memory of 2780 2632 49383a314b93ec21c9fc0d5f4d592fa6.exe 30 PID 2632 wrote to memory of 2780 2632 49383a314b93ec21c9fc0d5f4d592fa6.exe 30 PID 2632 wrote to memory of 1916 2632 49383a314b93ec21c9fc0d5f4d592fa6.exe 32 PID 2632 wrote to memory of 1916 2632 49383a314b93ec21c9fc0d5f4d592fa6.exe 32 PID 2632 wrote to memory of 1916 2632 49383a314b93ec21c9fc0d5f4d592fa6.exe 32 PID 2632 wrote to memory of 1916 2632 49383a314b93ec21c9fc0d5f4d592fa6.exe 32 PID 2632 wrote to memory of 1040 2632 49383a314b93ec21c9fc0d5f4d592fa6.exe 34 PID 2632 wrote to memory of 1040 2632 49383a314b93ec21c9fc0d5f4d592fa6.exe 34 PID 2632 wrote to memory of 1040 2632 49383a314b93ec21c9fc0d5f4d592fa6.exe 34 PID 2632 wrote to memory of 1040 2632 49383a314b93ec21c9fc0d5f4d592fa6.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\49383a314b93ec21c9fc0d5f4d592fa6.exe"C:\Users\Admin\AppData\Local\Temp\49383a314b93ec21c9fc0d5f4d592fa6.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding2⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2780 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\gos4BEE.bat"2⤵PID:1916
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\49383a314b93ec21c9fc0d5f4d592fa6.bat"2⤵
- Deletes itself
PID:1040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3d1f9396a1abe3db08e17a1f01994c3
SHA1926c8d74dfcaf8dff89380418584da12d78525bd
SHA256f3b0452f2c5f12cf92bf28ab5b7c06ea365a6c985616d6ff8545da96b73e38a3
SHA512cc03367b55f992c57a76006e41a7e643f3c1a6f030f90ac85d1610091f11bfdf2e0a4ca0deb7000bd262279707e745ce86f94aa944c6baa79ddcbf07748d99d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55120f4c9f600bf25c031bb9a1b1dc293
SHA1f9d70728d7f4f4c06e0039056e7816fde816520d
SHA2569505c68c0dc1b491d70604f2259cd9eebca2cf9d939a7877de52debd7c36affe
SHA5127194570d653568ab3be60feeb5c8e0474c7429dd697139da419b74a9d8645a120504b2b58ca2cc8b525f46fd0842ea1296b6691479d2c781d53c474f2bd58c61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a84e29f4d7427e5a3373f483c7aee45
SHA17ecd8f0f2c4e86f99e5ef08024c5fccc192ab987
SHA256042e898183cb6b38fdccd2cacac057fa105d11a6bef5a154552b37d3ebd72fa5
SHA512b7e558e3af1b8702f5cb9a8bc85f8bed0d894d9beb326343250924dc6f38db84e2a371e8b15153e27f6863e4d4e487d4c1e7bed37cd169b3575913ee47cff265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ada1b4d624c8dd1401b8db669b5ea0e
SHA15930f7db82158870fec2017fbbfe706145a5be1a
SHA256c603cf13d890bc09c73fea05b7850e7df9a900f02de8234b81955c04b2168dd3
SHA5124b516703bab754a07f6984c7636993ff92baa3e8e1dbd070622a1dfcfeba4b67371f73240af445224a22595553e127b2daa04968e8182a99223002107e9c0e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db6bd186ae777ca8705078941bb96f77
SHA1772587c23e5b0dba268b11e1bbfab171b74bba12
SHA256f0fcdca96b32ac429fe81c82ec45a02997e8fd5c31cce3ef4066b314a6ba6d7d
SHA512506f42c01d840db310ca17a343649321c083fde518eaa621087e7f075949d98b264504c0207c414c23be81d31e67c0cfd5b94561933d040ba9aca076566b7cc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f7e41490b0e9e6e1c6472f66c7e4d29
SHA17f34f3cab386abdecad8b16c60c5f14bc75caa42
SHA25658d3da2faca8b899811d7bbc237829006fd123659e2537d44d942332e236726c
SHA512b6eb527d581cf46b8bd0324ec85d4f23ed7d4f6effa27e04b1935d7a0b8b69f04542a1e7c387f5dcc072a88a6e41737b2dded73edcaae1d646bd43f679d59cd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b59841299408ab33cefaf222549fc0dc
SHA1d5beefe8070cc0a5d5d0e1d8c3c570e818c4a195
SHA25668d5927890afb8a879738327557da0979d39a072c73f5a2e7af2688859ea2fca
SHA512269f6c1fc45259646e37a0aa0cdb251c6c86704971420b74b1cb3a9d3b44c14a5ea331e930e7410690836447f401dc66b27ea6276c2614e3c9506cc1578add07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe92a9616989a1341c3c6ec5e803ae6c
SHA1785cd9813ded7cadb793821e6051319cd8efa343
SHA2567477c4242c2d1155c44e38d1b69f4e406ba9c7cf7aafa031605396cbe1288628
SHA512cf361a0c6ff603e0e3cbacd0e8005420974c712108382100420c2e5c61633049cc032c5f882dc1bfeca9c865d5ef5a616f31a20b995600b8015e3dfb41addddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecf0ba35c36e7745ae1b9d689852cd06
SHA1ea7460c950ac8cec45fa36d302d63bbd9aabb998
SHA256ec2db2cdbe7f86afb85db8edf4cc7fd9d3a39f22f9e66f0a62481350e65e56ca
SHA512311ec2cdc0131f9c5eb91a23cad7b1c35b3553147675f32a22ad615fcd0bd2f44edcd57738fb83e6373d78016eacf1cd6e89de6b8185483bc100c834cee4b08b
-
Filesize
265B
MD56b1b8fd976d99f59996e12fe6d39e285
SHA1f0a70b828aabc4dc2ac63938633356a4e6894686
SHA256381dd89a6bc8496b46aa71d5ff9a61e702d0c371738e501724bd77c0c732c482
SHA5128f955deabd47fc145db7e3ef1129154cdb00e8c9c8a006d3e8ec7b16bf6fe6d240bae008fd0a7adb13932f60046190eaef44b067afd77d6307a571e8fa2f3c85
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
190B
MD5a8c1d730f702c4bf5e0e76fc5eaf17a7
SHA15f0a0ea13b5e4656a4482eca14ee7e828f43bf8a
SHA25672a11e902bf421658c67fc538e9a3e816b841eeebe27af9629e086e075aa1370
SHA5126167c38f5050db3addd7234fa0fd4af1714615c532b4d8e3650a3cfc5cdc11dbb9c2e3820bbc606b524b664a623b5b4a4c54b18bb5defe061e22593d712bbbf5
-
Filesize
25KB
MD534ba5f8edff785677c09f14d42fe37a3
SHA1736d14aa51db22c916829e2b83d2bb208417cbe9
SHA256be31a372fce318cee44d7a681bb943bc4fcf8d959a7a2ce00774cf14aa42646b
SHA512bdde21d6cbd2bd5a51ee09ba94f4d6878c84b2150dc64c7b7fd8a42dfec8c2f686741ad5bdf44d1d85cc7637e6fd78e7cd370c453d723a5f9296a52f86eff419