Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10-01-2024 22:20
Static task
static1
Behavioral task
behavioral1
Sample
51c479b8497f7a4e927525b08bff3597.exe
Resource
win7-20231215-en
General
-
Target
51c479b8497f7a4e927525b08bff3597.exe
-
Size
1.3MB
-
MD5
51c479b8497f7a4e927525b08bff3597
-
SHA1
431c99b9e88535d899ad4d7ec1d0caf70ac2ff11
-
SHA256
50b8aabaa708185f96293ef04268a4fdef80ac67c96aa7a93563a316658abee0
-
SHA512
d14e82ca5192d5f7fb67f4050bdcea5b4fd8c11d31337f847e976064d0b833bc0912c7fa7164ae3977b3dc100877468ad4eefb920c887a79683d6e7a5b0e093a
-
SSDEEP
12288:Ch/pCHxW4pbAOeeeZeeeeEhMEr6CX4zistF:U/eDNAuaE6tiI
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 51c479b8497f7a4e927525b08bff3597.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main 51c479b8497f7a4e927525b08bff3597.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411087153" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c00000000020000000000106600000001000020000000f009f079758f7e237db98a8e77c2c77283b02e3f8aa78b0e53421d6f2ce0eb71000000000e80000000020000200000008c38cc8363718f366afbbb9465bf63eae423a0b56f718798e11a7851c965cc6220000000eddc3d7cbe31d882b756c09ec50ede183cde9c24837a7c6b09252da059d90466400000000802ff823a7ff69b1a096a67aaa1b3e127ea6d0bc64fa7bb29557d9f796482f45ceecfeba94fc7a38f6a4b5c3d88b035e0b72941489c9583810e1ea5944568f7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{95C62FF1-B006-11EE-83C2-FA7D6BB1EAA3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30f12f851344da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3040 iexplore.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2080 51c479b8497f7a4e927525b08bff3597.exe 2080 51c479b8497f7a4e927525b08bff3597.exe 2080 51c479b8497f7a4e927525b08bff3597.exe 3040 iexplore.exe 3040 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2080 wrote to memory of 3040 2080 51c479b8497f7a4e927525b08bff3597.exe 30 PID 2080 wrote to memory of 3040 2080 51c479b8497f7a4e927525b08bff3597.exe 30 PID 2080 wrote to memory of 3040 2080 51c479b8497f7a4e927525b08bff3597.exe 30 PID 2080 wrote to memory of 3040 2080 51c479b8497f7a4e927525b08bff3597.exe 30 PID 3040 wrote to memory of 2560 3040 iexplore.exe 31 PID 3040 wrote to memory of 2560 3040 iexplore.exe 31 PID 3040 wrote to memory of 2560 3040 iexplore.exe 31 PID 3040 wrote to memory of 2560 3040 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\51c479b8497f7a4e927525b08bff3597.exe"C:\Users\Admin\AppData\Local\Temp\51c479b8497f7a4e927525b08bff3597.exe"1⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.gamecentersolution.com/downloadgame.aspx?CID=21157&AID=10452⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a9f11ed675c2299eace7be45ee0ea81
SHA1ac997e52de6960077325c3a77603c4c3876e05df
SHA2562146e67a8429da13a48b0ac9d18f325250ff6bd2405e4e02d32632e106514b6f
SHA512eff513c5bc898d14f63a829629e06d3a857223ae69c7e6156bb7bc0eea4de0939dc9533979ffe719e158bb331852b931a8237ea30b92d8eba51433f6740afd19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac8be06a7f32b67f653ab987f702bd4a
SHA10f67e8b146b377cac87b82be3a32b9247e502a2d
SHA2566d08e622a8834fcd442a1710d9bdb9f5d1a2f80138dbc90a55e0206152f2fdf3
SHA51291f7c06d7cb6c35c8cfe86e8636dcb7394ef92fa3e6cf0d8a00b7bc1537491b7412333ca961720f15557c54f06e19a0aa707dd1bacbee8c7adb3696f4922bcdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6b11e20fcabb317b38fe4492e4ccb40
SHA148310fce3cff1b7462e8690b6d5ffb6b814771a1
SHA256461873572b0243da752a2d6fe4affcafe4d3991641d9b57a9ee0a736fc3387be
SHA5127f38edc94409dbc4758ef569a6e621241cb6dfc96fb8cde332f8b2447e8ce903914a7a77c86c06564d9a197a2b1484cf1579f5f9bb44f4ae06cb4dfd909f2c0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508034439e8de1c418c3cca9d44bf4cac
SHA153edacfa69b52475816b6cef980798dbd873fada
SHA256c98e13e41d550464b443c394d3fc517ed7b64bdc475bc4ebcfd2e272d844e9ae
SHA5126d7e88f428306a57477378ef91fc33b1c92c4c569c3e3a1f89ad4936a92c75df0abd27cb8caf83f6300625fd8611d49e9ca80086412bc81c393baf7c6373bfb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a990134f83feedceb55c5bb16a38776
SHA1cf93d8e3cf5d3dd6d2022a3df7859d578e4d94c3
SHA256dd144a5817595be65f9c5e8d2727e62e212fb40d941182484cffdea435f1eae1
SHA512ff1744ce400be00327e7e9bd9c8d3d10db61ec23ca7d0cb6cb49337f8a8bdb2d0ba7aacea5e406edd49d77f2a867c1edff4b9e98508f39a60e20a9ccae851263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d45e55fa4bbb1d8f7bb1ce1c43aba40
SHA18cfb0f8752dc8a0a50b2ccdc73205b2915c1e9b5
SHA256d29485ed3231a30a56a8d7da2ce829b4387628206e0573b66744fa893c70b344
SHA51217407fa1d0dacff11ba3cf9342ba69a30a635ae74e26f2eb611d04556332b8ba034f809b4ffeedaf085db86f75845d28dc6f9f5f5c6aafcb72c768da68372e22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540c0c18614bc9d9823017ef528005624
SHA1ab4c3b3e32c5e92728744d35d003d9935abd3ba8
SHA256050d058427dcb147d92b244568e6560d48b8d3022b48c11935141ffae9a4ec95
SHA512d5b1dde9d36078786aba302386ab6189c835406e639ed872e38e399b326224cec0fe5a3ccb627ac206e14a48bddda52758f4279c6a2d8854e3b8e89d52ed28e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589a25ca9da7277dfe02a6101bcfe58ed
SHA19b549682fffc3312b4e34b2eb10859205b68f641
SHA256435e166c76c25c4f8e3f0ee030357c680af3b4da3b87e7457d6a0582d020ea55
SHA512f29d194626dfbfcf5a3ca4dbfcaefcfac0c86dc0c6287a6b9907d110d335349fa203684159b6d88bc0f0cd54d72a00265570ee36dc2c74193bd359b398771ebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e88143eb697d157aee76f76d19e2686e
SHA1b06964caf7dab653986dff810690bc7b878d82b8
SHA2568747df4f4efeb0f1781c7bde570614c5fa8873fd116e96b991e71ce9e8f13f05
SHA5125eb26852a477fe4a85aa57cc5605404f3c7380ecccfb73d827d849086c8fb7edc640ff3daf4d017e3d5c325b0ba5e8c66cd46711aca236f3c7a85c1ad0190516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbc97e6f474eec0ceb2699993d24e0b3
SHA18627d6d6c76e4c1fbf466eed4ee3b7df06c3018e
SHA2561282370c3f5b418cd14a9bb7adb10bc8e9ebf2c98c6e0906c492c26a41df265f
SHA512c8a8b454153a83bee2115678613ff1e8d10497198a5314fbd2d3660dceb07284746441f497590d0881d23edbdacc41d7076180027444aa948dccec8ef4800adf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb11f17ca367d60b397df48cb3cf4110
SHA1f53aa5315b91f1c9be8b935b7a2c767da82ac572
SHA256774031ea1c9a37b733de1b0f98f84a01854b574f094d275fed90c9928278f702
SHA5122a15910623aeb233f34a3fed1a98eec4b7e6eff93e963d5d1be9f33143055087ee218321a4135cb7fbec1bad523535e630af1e2bbb45b402a16d60c06cdbe0b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6fa8e2047425cb6734003920b12e24c
SHA1c53ac1b2dd811da0d0bc5b7da7b44892080ebb57
SHA25624ea34dc4e9026214ed748774e4521dffd935072307efd04e4fa3fa8f74ad3f3
SHA5124f406770d484223cd22aa3ad1f581e40e1e55e823c6ea9050926d50279c4df1e6cd0c08bc1b42ba75783530bc27a71dbd5b065e62cd99423e1f0fa1b7b6dda65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dec8e88760e9ac093591fca93e584ce2
SHA10dd29c4a53b79b145e479063c16d92db68c4d3c2
SHA256c54a6c1ab37c35d0ef37b8aba223ea4d1ba0a03651aa444fd7ab7d61ccae5b08
SHA512446734c1ed25813941921c9d47b0ab002ba723bde65ebaf7aa4dac7d2e2893d16cc41a5e8e2320543a6006aeaccb47612f1d992abb7b6592d78748b2776a2b02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f323a04a2b29f1f83e8dd10e3ca1f951
SHA17d351dcf2f2eb964977c392d5724bf81cde8fa72
SHA25682a327e0133c7e6487005e80f6359931ad21ce5102c9f2e88d706207b077a908
SHA512ccddcf12b62da2071c76931b9445b75f508f9f3af65a666d1f3cb2b961f7c698f7411236f532a264a144c24fe8cce29b27270b53e44a5a30d5d8b651f7c4e082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ca1b3e8f354996991c26fcda529532f
SHA123f87c320816a3180e72a333ace131a834191950
SHA256c755fd3e27a1659f34794528024f98064c1652d8f12fc559b560c4b6f6433b9a
SHA512b4e2b7fa4d933658e799bc952bd65839f8d60a5120c6444fa06314ebe804bcb0d864bbf0b7e9ff4127463d3b10ae9caf9fea8c16fef33f2069a817a3ed3b02c3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
192B
MD50fcf82b5a915470e8a79d3516f582a36
SHA175f81b41607905b231521243129aff3554a58db0
SHA256076264d4f165cef82f0cb07f6795f1d5ffa74741a943fca42cdeac65823bcae4
SHA512adf69ec56756fe672677b039cb44bb13fc3adfac569f5ea4eda4e7b35de5ebe0229c5825ca8337aa2c623a773bdf775ddd3689e9fae03a7af1f694576d954293
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06