Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 09:08
Behavioral task
behavioral1
Sample
531a9df44e228da94c32d332720a175c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
531a9df44e228da94c32d332720a175c.exe
Resource
win10v2004-20231222-en
General
-
Target
531a9df44e228da94c32d332720a175c.exe
-
Size
104KB
-
MD5
531a9df44e228da94c32d332720a175c
-
SHA1
f7a7ce2930b852552c8e3cf6b717eb17012dc795
-
SHA256
7b947eb46d4262a73c6b8d7f2c81396c24ad968a0dd9a766fc8e5954c32e0088
-
SHA512
de1b83115d1e29f91fff37d984aaee0b2d94194c6d839e8c251ebc26bbd258e3e155689aa6e00a2d1b48f0832620b5e91516d65cc83e47edeca500a62f7d9bb0
-
SSDEEP
1536:e/JZqulpodsUitz71NQ9wYHZO3D8DzgJ8r0:e/1wd5ozjQ9wYHZOIs8r0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2352 winlogon.exe -
resource yara_rule behavioral1/memory/2904-0-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/files/0x000b000000012243-7.dat upx behavioral1/memory/2352-12-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2904-15-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2352-295-0x0000000000400000-0x000000000041B000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 531a9df44e228da94c32d332720a175c.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\winlogon.exe 531a9df44e228da94c32d332720a175c.exe File opened for modification C:\Windows\winlogon.exe 531a9df44e228da94c32d332720a175c.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0B990CC1-B061-11EE-8AED-E6629DF8543F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb80000000002000000000010660000000100002000000094a5064cd89dbbceef8f97b1aaea661e02bb46c4bc5572d97729ad011f4db24e000000000e80000000020000200000007ac92de759aa448bf79247fb48796dc52f3f81a5c24fb8bb509a9daec039144120000000e49cd7da9cb8459f79c14e10c03c1c24e86d534f8de486e30151f1b76228eb8f4000000087c22d04abf2e7d1cbeeffe74c1ae2c564120462523e42d7f6dee6cbaffcbb0c9c28c3140f13f73d08eeb55e58ce0c805b22c318b4d564659848f680226ed39d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0e19de36d44da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411126006" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb80000000002000000000010660000000100002000000048201bb76e4c5b337d82fbe2580144c4ee1fa315e0a8d98cfe983c3b95fee52d000000000e8000000002000020000000ebbcda13a7f905973ff9a25b0dc43793be9c25b2bc6275cde604a79d1e533fbb90000000ec14f2c24034c4d358225132ede6a9bcc344691d6e9c9401263a0eab1988395d37e2450bcab0c370fab669c1c1a706046337afb9de704bb53a09f307d8d853645d13a1b6994b232170b4bc984caec5fa512572235aeb3e2a849d2bac3523a10aaa7fab695d0b20c6698e8a447d805fc13e96b9623454f01af5084bc8bc6bb6829f3fb4c92509b523f25bc22db48adddd400000004868b23ed01711b8affb5cb82d70a472297e5a37a4ce0317faf3cefc8d9feb56f8547f84547194dfd0c2167041c8c712ce4cba96000871f1ae82c1345f921ab4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2904 531a9df44e228da94c32d332720a175c.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2836 iexplore.exe 2352 winlogon.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2904 531a9df44e228da94c32d332720a175c.exe 2352 winlogon.exe 2836 iexplore.exe 2836 iexplore.exe 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2352 2904 531a9df44e228da94c32d332720a175c.exe 28 PID 2904 wrote to memory of 2352 2904 531a9df44e228da94c32d332720a175c.exe 28 PID 2904 wrote to memory of 2352 2904 531a9df44e228da94c32d332720a175c.exe 28 PID 2904 wrote to memory of 2352 2904 531a9df44e228da94c32d332720a175c.exe 28 PID 2904 wrote to memory of 2836 2904 531a9df44e228da94c32d332720a175c.exe 29 PID 2904 wrote to memory of 2836 2904 531a9df44e228da94c32d332720a175c.exe 29 PID 2904 wrote to memory of 2836 2904 531a9df44e228da94c32d332720a175c.exe 29 PID 2904 wrote to memory of 2836 2904 531a9df44e228da94c32d332720a175c.exe 29 PID 2836 wrote to memory of 2864 2836 iexplore.exe 30 PID 2836 wrote to memory of 2864 2836 iexplore.exe 30 PID 2836 wrote to memory of 2864 2836 iexplore.exe 30 PID 2836 wrote to memory of 2864 2836 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\531a9df44e228da94c32d332720a175c.exe"C:\Users\Admin\AppData\Local\Temp\531a9df44e228da94c32d332720a175c.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\winlogon.exeC:\Windows\winlogon.exe auto2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2352
-
-
C:\progra~1\Intern~1\iexplore.exeC:\\progra~1\\Intern~1\\iexplore.exe http://houtai168.com:99/AddSetup.asp?id=01&localID=QM00013&isqq=32⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2864
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5115880cfa240c021c31cf1295ef4ef8f
SHA1a698832d9178c78ffc06cbe607605392cb60dd04
SHA256b060d484b61234ea053130b8e44c05dc5aabd8b848b9260fc973f20855698fcc
SHA512161ca4befaf28ff1fe04ce5f06af5ac0ec573256bed51f19a9a699efb877330fb080c2d6bb31a466faf7101d044fff69a58a455a80dab8cfd1f953eb8ff70c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524b2066f3fafa69315fee8465c998a1c
SHA1f9b655f474c6d348e04413f22e8c16bac27b1ac5
SHA2566afe496d63998304d8cab305742746fa4aebb0b09268da625903411c2ec8a3fd
SHA512ce2931375a6348a3ba673050e0f7ebd7b7662b6f3e37a71a915b059a4a3ec2cfb9b47f449ab760b72d9e3dcad837dfe00e008d73b7094affc6438ccebafe3825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53612e361e4d94aa55db51a96ef70c9bd
SHA1a677d7b0f70ea38a9be1cb5188e2d106505dcac9
SHA2561ff2a7761e397fd8b6d1baa4ad9ee33306ed1be58aa18396df0a130af61e6fe9
SHA5126aa76df7350d5e60fc5d30033c23120818ceea65df3434583dac5e69e0e8147386339756b4cd595077355f456dae031f940c28a033c21ab94fe32c529a732985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7b21ca9795a974194682c1de0a51a30
SHA16185310fb2014d53b5f3feb1630228711231acbe
SHA256b9e28ee93d63545bb9b7bda787cbfa4213116e89633faa112e4273fe3b56a61d
SHA5126fe90f13c48a03201dbb6c758a29e448eab221613cfa9a6196357ed736255b8691c38ae15db195e569a5be11a90f17b447008a4b91022236e8b5868688690c19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d7270a8ccd316eb5eda6b9c18331d97
SHA1086a542883a621fe7d8713841bfa8dead50976cc
SHA25698d152e69b95c631bd2f0254c403d355e02a8f4b2eaa17779645816b9e8c736e
SHA5124b9e4932ee161401db33283f9e58509367a2bf3c339118ed7124b883c67911b631140f1fac7e89d3eef8895fe1deaa626b4d2c795fc56e3cc52287847bdcab24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51026bcaddb41aaf8f748efd2777ad93a
SHA13604d62fcc7e54fc77887563db9c0b020021a108
SHA256a2c75d11941e4b45714f1675cdf502731a24639e24e6dc8eb420135ddd77635c
SHA5128528e97bea6ba0b339d86ad5d107432702aa87b6a8c0b7bbca1c18883b20f7a94668773720263197bd538bb095b9aefdc930484aba0079a2f31235263c69fedf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb0938a72a0813db09413b652b49e9f5
SHA10662e22ef357d40c69e5d33b31facbffc4531611
SHA2566295654464db8d0e8bc45334927de396b95fa7514ba3c1cb6d3d5ebc8ad90434
SHA512da3dd3b869c32f8939e746e7a0787a9d9ce09b89a096b37d15312ebcfb5045de38286857bbd29813d54093fadc64ef8f2e99011fae864f72c584d15702bb40e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e0840a3b3d74fe5ba53f984b1a2e1eb
SHA109a9ccdee17b11fe7af2065f84677867947a0712
SHA256f15ea3e563d99ac84833ca511de9d5367749eb7ee3b8975242eb3c0cc7f7d4a9
SHA51241fb71901859e510ea59c36a27f468ad0bc1ed2de81dd0e039036a046343961eae17c7288c0ee0db2000dd57d4588e12f62333b6863dedf48ddf072e5311e9b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510042bd5dd9c7b331008d9374fb59195
SHA1f84f5798a5d6decc12d068752338544cf9abb648
SHA2562c8527a0cfaeaff547a7d4e55a820bbd56f517b7d9e957841e569a93cc375b07
SHA512afb82ade038cd6eef276f989abdb82084398fb6b1c0b11013d5b71f607405293a47386f070a7de2cf6c86177758051bc59bf6bfaf1a67b3ef2552ff14fbb5db2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
104KB
MD5531a9df44e228da94c32d332720a175c
SHA1f7a7ce2930b852552c8e3cf6b717eb17012dc795
SHA2567b947eb46d4262a73c6b8d7f2c81396c24ad968a0dd9a766fc8e5954c32e0088
SHA512de1b83115d1e29f91fff37d984aaee0b2d94194c6d839e8c251ebc26bbd258e3e155689aa6e00a2d1b48f0832620b5e91516d65cc83e47edeca500a62f7d9bb0