Analysis
-
max time kernel
119s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10-01-2024 17:49
Static task
static1
Behavioral task
behavioral1
Sample
EXETOOLS.url
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
EXETOOLS.url
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
pm-setup.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
pm-setup.exe
Resource
win10v2004-20231222-en
General
-
Target
EXETOOLS.url
-
Size
50B
-
MD5
69eeba0388f852e3131e781039ed52fc
-
SHA1
dd8e6943da78f7b4b5a9f090de48eb92de10032e
-
SHA256
ea1434dc20cda63db57fa4a6112767a1596407698a06daa65b49aa365c928aaf
-
SHA512
b94cfacb4af372eb7de02e1b7bfab95a644550d4464278cfdf6bb5414f11c76695a74562645d88a2ba2749555e0b9594f2453bbec4f06adfbe1a7730787b4135
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00ad2381ed43da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411070858" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000c4861eecbeac91bd3d217af78cc70b5b1d493362ec7447d87676b8718d891e3c000000000e80000000020000200000008c0b142d1d86e3d4aa39a8f03750f26bfac73dce81b3f5dbc20b2a06e90e60d0200000008689e25f4ef949fa964e907590bb51d35876273cd4366b4afb19bdb272acf7c44000000049085e53a9471bfe4661f8e8b9f244d989303043fdf5a39ee398e16d2d9c8cab97cdf77dd5253f40815a20b94cc443f2f032a0c3749da8cb8caaafcb1dd535fe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A566C941-AFE0-11EE-AC0C-EAAD54D9E991} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2664 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2664 iexplore.exe 2664 iexplore.exe 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2792 2664 iexplore.exe 29 PID 2664 wrote to memory of 2792 2664 iexplore.exe 29 PID 2664 wrote to memory of 2792 2664 iexplore.exe 29 PID 2664 wrote to memory of 2792 2664 iexplore.exe 29
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\EXETOOLS.url1⤵
- Checks whether UAC is enabled
PID:2848
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2664 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50aaf0e685e9099a49f3e4f57b955275f
SHA18ee90911bb9d4b835eadc6695397630f83bfd14c
SHA256db4b5a3b76fb08b39a949b21875a475703feb6dedb8a8d9767e016f6c27189b0
SHA5128188569e5c11854fe3815ca2239d729a0aded236a0b14c5f72c248972722297b6eb34218fb8f5ddfcf5efabc53555cbe66b7f3e7ba7e8e43248671b1a331f8bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590d27bf1772f8dd67ec79b7b97ec2d34
SHA13a6aca7eef591038c235cda5c08f0c3d30e7b7ad
SHA2568110bbf18a3a0af33e5d57cc72a56efd4502cd6c0917e5bc5221197bb74f6527
SHA512400c96d368613b098114f36e99bebe1814caa71ddef5c1b1f176b623c6488e8b9eac3b813806c6aee16a846b9f276c42d02fb1c2643789f34f13b25d1233b7af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b45a815cd8d20cc0978f2bc62095527
SHA124cca4f66949c9af7da41ef85ff80c2f2a80450b
SHA256b2cca75a360a9b06d07c944344c7664a9a0276f04fa4c47634cfd0f27f9b997b
SHA512f3a72e34af1578b3c7c2ed04b8bd7679a2ebd8eaf116f9ceb3e408291e1a0c830eade0c09461feec0b90a33ca52fa67e94a9ded3271fd49bce267e41348e6a45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58802fa0c35037f91855993da869fa8de
SHA11bbeb6d427b0f0102afc0b6db898740763001014
SHA256aab1960b9cbf340d60c1ec9743166196c7dd5d4354f47c7268592d69527f0a84
SHA5129c848228fbebb142c0a7dd18ba582c27a711621456d503031e0ea6e7b6fab955afe91e3e3c7575a96c6ccd0e9a6d354ce0826c1e95b49f6636a5a61cf5984b04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51417d86fb9d590c8d2743e45f0cea9a8
SHA1337b5bd2997de03219a93b0bb93ae78fe9f30bfb
SHA2569fd62c4a937fcfab8e1add16c6435a253482052a84278912b147d06662ca63c9
SHA512a52ef0f08c76f5acce46f43e66496eaa5feb21f15eeb958ed29013ec301898d63bed7a555dcfa633dd9d4bed72a4597e3401786912e596ea48f2a9a2966107ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3415a2710185a2ac5b0252eb2124e1d
SHA1567fde3c3be095a29c4ab8ceb87ed31e9a8be3ac
SHA256171565c1d11e3de617790332a9f90375e93bd3d0d6323e7d4d09817fa7284f1e
SHA5124f3ce7bb41278915008bed800dfc7abdd9fc8b522becc4458b3ceb68779243a107dbd2041983a66b9963319f0eafa3f35e50a2760f389cdbb0a696b6266679be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5733a367eacc5947a2547ce479352486d
SHA170435ca166687a62afe74a2ecc12a946ede0bb4d
SHA2563857c0577978c734d83404032d8c8c93fed780dd32df89656699009e8a7886a0
SHA512c6e3cb213a2e9f0ba5622e8e8d9b9360fcfb4482c3dc59c95803325af710ea0151f5eeac9342efef85169e9b8df0db647650b585b438f5fcacc066b104d3e037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532e9b8275064328b569bfd342157a6df
SHA1e4b768933f2f9f9d235befe284f9065a0c2d901e
SHA256577af126074e63dbd5c15a33e7cc90991ae074a8744000398a378c9fb1896917
SHA512fc8b178e30458c2b39b60f724bbd71ee52d4fb3cced5bcd2fee2bab84051be2af6475e453ae29d87adb4586fc234e658c69b40182f86620075982b8ba872fb5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2af47d36629515a56c90eaae7fe5ef3
SHA13e8001bfe6d14f3f8f93f6f478f4e911b62b5cf1
SHA2564b66b8d81e80afff9ad7bbfb3c8be3e97882ebeaaf9c54e6fac52f6ba2deac25
SHA512037580be9b9f1d663d2db42dabccca9af3b3764de19b4b36a26568ecda6ec7f5b92b2208e084b6bb6c41f63f3ea3b6fc31871dc190ceece055b931084c2fe6bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56455c19a6cb9bf5d97620710b4b890a5
SHA18bc77e090869eaf91c2c72de802d0ca5a5215b0d
SHA256f396fde5b4baf89fca5dda022a3993e0b21b0b39f395a216eb77becf08ea0e5e
SHA5123575611432f22e63f6354536b94f4cc9318b62ade701961d7c5a3103712ad11c1f03c80c24971bf85fdf3dbc86060c1fe4bde5e4ab1a5ddf928ad1fb6f1dea45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514d09f001b401bb652cfeab3b87ed353
SHA166f7c9dd78b635b572522d05fb8d3f0a55ec6844
SHA256efd01e00716e198c939f8d1bc039153452b176114228c32ed004be6be75ccc2e
SHA51207a2f1c9f166103c5aa65dfb60ff34d2ff42cb2575a2e09481020832b04cd094a13f5f5a982d82dbf7b42a9bfcaf7f30f7a78972431d20bde3979065abd0448d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ec452b669a3c7ff1f86d230b7bebf94
SHA12bd5b9948398f3397b2a15cf878eadf6226067b1
SHA256dfaaccc978ffb1088104c24765afd696aa98f6c44c212deb1d435437c5ec7ce6
SHA5125ccb7c9d513ccef0b762f9f4d340381856ceaffa2daabbc653b27fd00a30266e98776a31d11468152dd22ebda665fd45784e540a142199037023aa05912af0c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595af9ad34e4cbe9a7d7a6e5dc02b9220
SHA15a1ce8f18db066fb4bc8cff103762602a6f4f0da
SHA2560b1a83e827d387681a1abe12942233dbedf45fda648e775f991556ac75fbe605
SHA5126655cba06cc233dad8dfdc3140f2a40ea654bcffb73a24462efaccdd9611f5ba5eb38faf5ab084843af1fbf603dfd53ce3713caa314a623fb6bac0d9d7af01cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5babc3bc75cd3c4c1da022b119464ed1a
SHA1368db1745042859c92cc0cbaddc1a848fc0fed7b
SHA256bda9e876a1119138f1aa4d671dc712398dd6adf0bd9c014bfff2cfb13c0db4e6
SHA512da1f81559712f5a3807a7e18bfd81643dbe2b3fcce3ffffb8268e837e91e0e166e7af6bd52985b54e96a5270062b92cb5cd6fa91539ab9d74b0bf4930645bffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ecf2a8e9ef17d7279720d488889361d
SHA14d6ddfcc44ef8fe5d01354aeefeba693b66e0c55
SHA256bf0e3764d2429c5c7ad4e07f1d821fdef2cb789691df51bd0932ae4f1db9ebff
SHA51202c1a8a80269e152a75fe60ce1888c781dc9244fccdc8005678ab224d64831267b89705e359e854fdeb35d2717a952d7b731640e977e2a3b5526a2fad2cb175d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06