Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11-01-2024 09:57
Static task
static1
Behavioral task
behavioral1
Sample
53355228c4829303ec76c3ec1ca1cc7e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53355228c4829303ec76c3ec1ca1cc7e.exe
Resource
win10v2004-20231215-en
General
-
Target
53355228c4829303ec76c3ec1ca1cc7e.exe
-
Size
60KB
-
MD5
53355228c4829303ec76c3ec1ca1cc7e
-
SHA1
246d1e81a32b3a9d5877089162930521f7ba4747
-
SHA256
8d584ddf272a70167c6e82490b88b5262138a350f0461a3ad45f604cad317b68
-
SHA512
97b121b8544010c3a46e95ceb9fc5e0fba9c66fa2b63167baea0d54541297d689cefe5d9fde9cbe798e5032418bf1602a4251b7756f2d1d3a39a80b410e10bce
-
SSDEEP
1536:vqayPvEhzEXt7/rzrfEqDG7q9PubDY8x8c:AvEho9Pzrc77OWw8x8c
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CCB74151-B067-11EE-8DA8-6E3D54FB2439} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411128906" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000cf752253135104941513d6292e6188626fe9f502fb6fc543e97edd3edf5ceb53000000000e8000000002000020000000759a4ec90ad873383359ea570c372fb95c47213366786ca190f2d59a78ad3a8320000000146b6c8b619e6a7c3b93bc507b53c7e86c3b8e0a277db49a80c5d6a5969265ba400000004bc20cd55eb5702871fa46936e105b2c6ae51bb24dc0eadb6a3d2c64c7d09ded21a0b18e9001e5652689e5988f7230bc93d8e042011f4b2e8507b0e24da7ba99 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 703d44a17444da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2512 53355228c4829303ec76c3ec1ca1cc7e.exe 2512 53355228c4829303ec76c3ec1ca1cc7e.exe 2876 iexplore.exe 2876 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2876 2512 53355228c4829303ec76c3ec1ca1cc7e.exe 28 PID 2512 wrote to memory of 2876 2512 53355228c4829303ec76c3ec1ca1cc7e.exe 28 PID 2512 wrote to memory of 2876 2512 53355228c4829303ec76c3ec1ca1cc7e.exe 28 PID 2512 wrote to memory of 2876 2512 53355228c4829303ec76c3ec1ca1cc7e.exe 28 PID 2876 wrote to memory of 2824 2876 iexplore.exe 30 PID 2876 wrote to memory of 2824 2876 iexplore.exe 30 PID 2876 wrote to memory of 2824 2876 iexplore.exe 30 PID 2876 wrote to memory of 2824 2876 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\53355228c4829303ec76c3ec1ca1cc7e.exe"C:\Users\Admin\AppData\Local\Temp\53355228c4829303ec76c3ec1ca1cc7e.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ipfreport.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f122ced5170ee8600fb25c9e4a8993f
SHA18ef991d44f7360ca4b235d6c19a3f7c697c0e573
SHA2561a31e174d4ad8d3d09ee269de2b7d1ac5ebd7212c3bf82928f38841318b66db6
SHA5128491108d2d54a461538fb02d193f88e756de6b1ed6b5bad15a1ad102a9456051454b9d3e28bb6c17178c6ba3477ec79aaab420df16957fdca1b64bd603fbd616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5006090800f4a51d67f7cc47b94956a27
SHA109bbe7e3db5bd6b359b51168d6b408b0d34fa0f9
SHA2560c98b40c1c972957efb3935e767824693dfa8bcb0841b7f3ad1f867c617501fa
SHA51266ba8987baec38a0307012145d270446d00cc01effbf0cf3db2084774c9061edcec2a8c6adbd09b827449de9c3b6ed7317281c9a20fb810c43d45fb66418da3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1f3d135becf0ccbcf1beb6747b5aeeb
SHA10040c734cecea10e3cff3e5ee3814a758ec72222
SHA256cea1bc02b7ea7f535f709bc241c5a357bce5f389d1a0f2766186c66e0bc861e7
SHA512f1473012513053de7b3146b8e6c170cf05bd62fc9a0f352fc67331d1ccf902f23c4634bc512f9d7bf5e9da39c5095a2c7548e0c62be2d1fc087f3db81db68b19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517de8a0544fc012bc229fb005ae32fda
SHA16ab62fdbbf920825cf39bdbddf9d9191fee17080
SHA2566a841d9f41afdcf7065b1f650f689dae3ba6bebdc7ebda9b847ef254c5428ef4
SHA512659ef29c81941dcf63e11b877860784ec68280f5896440486b535c090dad599b030b482bc40f3ea2196f1fa279026f934d42005db495608f79d52f251a8ad21f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509792aa4b4b718ceb23362b047b51dcd
SHA1c2f7f7f50d64f75be1e4ab476d48525374eea27f
SHA2564fd14b9c681e1f4b83bf4c9b2c4febaca9679cdbae0749bbf69e9babe2ddc5ef
SHA512198f46a31df836d291f018ee8659f5254fb9cdb511daf4cc217a69c06aeb30f0eae40c1aedfa1f8fb7513ff502f02d8b76c7081d7b520d71b9ef31c21155a210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a49408bbfa26760946d3bc1d1fd6346f
SHA1f93c6ec2a600b602b63d7f2745446e1c4ba7aaa4
SHA256bfda37ddc83682b87ee6b0e82b7c9f86c07ccd29c63a8d2efc8a23e79afdc8be
SHA5128fece8851a1b93287b59b88b4b5d266089101501446b0ea40e73592180fabf330c33474b33e9f1ea4d51edf81c77265eb02c973322bd423424197837010e9d9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b73e20e11c9994f69764f65a5964b784
SHA151549b7184bab77024359ca69dda1ad353396afb
SHA256a75f50989bf49b7860e461572678afac439bb0d4e2e709b29b645e822da3b2f5
SHA51221bb407e05a0de648cc39902df82d260eb2f56d4ca496b13860ef3dd9e542360a6d04b78f6e958efb5a60255ef27d7e95578664d2da38325d69aa4d963331140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5737d2348607040beee9b6f99bea3676c
SHA1200d42cf95513f93ba1e2b7bcfaec7c8236ceb96
SHA256663f286c4c6e18c55c6775ebb72648136160738d8612ac69c785d315edc4a8d2
SHA512ccc60c726c02f3f2131b8d07f192ccbac20f7776b0b5b01fee7293997e5a3d1d105fb87b0c581c6879890b6a51199a8d7c5c8be1db0a0591b54ceeb3d7f54bff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c64080226afdbc26f45399fe1e4ece8b
SHA132167458cd147afa502357eeec32d57f71627f75
SHA256d0dda183796636455eda376e4d189927037b6e4664e67c69f9827d393869ee94
SHA51289e3b308a68528ef23f11cc85385bb2248742a4bd0961793b229b7779a8feef064c567cdb512f91d25e1ca42b15433edb4bdafc0856e08095862d42f18a3e70f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556f29d77d075dd507a9b6e90648ef3a4
SHA10f1ec123e019f315ae195c83eb725b78534c6eb3
SHA256af7efcd741e2e72b96540217fe50124f0147f4df7254651266d0b40e7fa28aff
SHA5127a7a4e4aa93113434c85285262936347ed1f99ccedefa0f52f9a71167285f341b7f93d0bbfcb40cb9da8465724c9e108bec594da2e192b948b799079b81230f6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
1KB
MD5a1e8787734934b3d5bfff524f3dd778a
SHA1e0836cd4c2a27c1df6e4306edb7b04daf3aa4871
SHA256376ecee8e3967a3ce1b2064e36e0b2e6ef3bf1cefc23361a475534101505d182
SHA51241cd8b068a7d7a72fba40b7a24c4ca346c466cafe6978c1930544df881299e840d743b2f8faf230219be1f924572f14f0fc2512100833b08786265adfc2dbcef