Analysis
-
max time kernel
121s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 12:54
Static task
static1
Behavioral task
behavioral1
Sample
5393432e826b15fb8cdc1824d29e535c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5393432e826b15fb8cdc1824d29e535c.exe
Resource
win10v2004-20231222-en
General
-
Target
5393432e826b15fb8cdc1824d29e535c.exe
-
Size
40KB
-
MD5
5393432e826b15fb8cdc1824d29e535c
-
SHA1
c55eaa54e87e0d4c5fe7eacf148e7c80bb641711
-
SHA256
f9dec0eced7162e3f19fd45ada870078e955b758e2364b97c19c41bb7405c881
-
SHA512
f101521b38125a1e643e54e6ba0edce52754eac515657eb2fe062f85784815e557e642518a7ea8c682364afe7468e3513ff422c1b72ff117899235b7c8933f9b
-
SSDEEP
768:GUdc8DoPnnDEQC1gyYxFGMlOMywGvwftEWpc7L1sGaXY0F2kG0TZiBI:lDOB5lOnjWid58EQZ0I
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1972 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411139554" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{96C530C1-B080-11EE-B696-EAAD54D9E991} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60a3966c8d44da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c00000000020000000000106600000001000020000000bf1fc6366cf40f45b8a4f7e1d6c0104254dd449ac46c954919947cf739b4941c000000000e8000000002000020000000c0b1d5cd7b970bbaa01371a9cf85f334e2f5084de5211910007f860fc3df91f220000000e6beb11ae0aa6330c991f5ef5f91495e2acb76aaf4a3ed41c21bc7d5b9075cdd40000000b46bfcd6e185302d0eb40f35f652a11c0d12cd245d16f4b70c3ab5457f3478bb090a745854e0c46688be57e99ced4283912962ca1248dbf2f338a324aead0fa4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2864 iexplore.exe 2864 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2864 2392 5393432e826b15fb8cdc1824d29e535c.exe 28 PID 2392 wrote to memory of 2864 2392 5393432e826b15fb8cdc1824d29e535c.exe 28 PID 2392 wrote to memory of 2864 2392 5393432e826b15fb8cdc1824d29e535c.exe 28 PID 2392 wrote to memory of 2864 2392 5393432e826b15fb8cdc1824d29e535c.exe 28 PID 2864 wrote to memory of 2824 2864 iexplore.exe 29 PID 2864 wrote to memory of 2824 2864 iexplore.exe 29 PID 2864 wrote to memory of 2824 2864 iexplore.exe 29 PID 2864 wrote to memory of 2824 2864 iexplore.exe 29 PID 2392 wrote to memory of 1972 2392 5393432e826b15fb8cdc1824d29e535c.exe 32 PID 2392 wrote to memory of 1972 2392 5393432e826b15fb8cdc1824d29e535c.exe 32 PID 2392 wrote to memory of 1972 2392 5393432e826b15fb8cdc1824d29e535c.exe 32 PID 2392 wrote to memory of 1972 2392 5393432e826b15fb8cdc1824d29e535c.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\5393432e826b15fb8cdc1824d29e535c.exe"C:\Users\Admin\AppData\Local\Temp\5393432e826b15fb8cdc1824d29e535c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.orkut.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\5393432e826b15fb8cdc1824d29e535c.bat2⤵
- Deletes itself
PID:1972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d216a11e73923ed0d29d17822eda4233
SHA1766d6c87fae839ddf0f0c0f4c4245ac5d21e8710
SHA256d45d25978ee02d8cae9e55aa5e972498e86351439d6fcbc20fc4e2bb41c7610c
SHA512a77400b0e8b1b5480c7ce9f269218bfbf53bf34e266f340b139144fb1caa125554aac74caa6b6ec6ff09baafe85de0b047d1d0431bae51c9a087104e334dc2d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad22d989972dd6301fa06f70f87da616
SHA114201755c2200a6c9d17ad6c903efff6ddb7e207
SHA256c8c45d196b21b064bf8fb8f9b41efebcb708c24dbdedf2fdefab0c6cbb3da746
SHA512b94908af1e3c1a0e609deb74ae2cf314b1ea16f9d5ae2fd9f28daa470d0f2379cd6fa22a97c66cd9637426119dc23c860d848427a666473c39e1d3182ce31a6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57847287c8a472c326a460f0bab3d19b4
SHA13d1fa3a60276b6de442966e9bc14e45397cb3e7b
SHA256d52d34a3294c9c7329f26fb8effa2d3a22f08a30daee2f767804613b674cdb88
SHA512e822cec254f1eb91226ad526bec1505757b263ff65f3e24b08d7b9d4084813a32cce8fd40c632fbcb35a3d68ecc8d1f77584a4dda1ab1faa3d3c19e426f14a3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b62d4e95888fea4520b42de69779d014
SHA124145243a004aa01235cc9afc62ffdd29be376b4
SHA2569568b319641c067d8e86a56170b1a99f9eb03a69bc649d2ed8afa6d0ddfa54ee
SHA5128b4e586df06c9651e248f1aa44c4fd24078f6ff896f0c5d54302ee79081a89d12a2ecbe817b8ba82815766b9ce571b7d4ac53cf9548cf7965d8f13f1b8a68c37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6870cc86536ed54739efb5a5915f2e7
SHA139dacb12e6ffa5108c0726b37f5465664a746c4e
SHA2562bfc17edcb20b1ad1cb45e8e955b1095f7b20c07aa4d432b9e9ce5c09db96030
SHA51223768d1a9bbb7615510ceaa009da0d3ab88f7f56ebd58ebd0789a408eff0550a4d1313ef6c473d0f579386f153ee8ffff63648693d5f9cd8a08c91a419bf959c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b95d03ac7d8e6306c6ff95b61bbb59ba
SHA1a21394b9fc877fad9e331f7043a3d00a4a88e9c6
SHA25644091defe73d488515ca6598fa6d5f9536a9e70f10b91a8acdac78fa8ea1ddf6
SHA512de675ec5e91b129a008833fdb3798e4a4c6347503fb58d7dba5b98fc4586182ca6484de3960b60fb1bed77a90d7354a5e97693cbafb8e04d708bbfbc9cce2949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51378912c18d47a61ed3a8f5e9c8e9f0a
SHA1e381fbfdae2c075086e8cf5d8032e502670658ae
SHA256fbaf48af8f8dd667359567c79b460c674573711d142e856f7913bd9ecf3e1152
SHA512e284576c496ec8a0b2c768aae0242b287ac479969f4911cf09d63f1a82f235f5c76c0d703b7efc39d7108d662e8f2bc5de9ed3f5f2554b87d516c130dc16c7ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d47655be3b2240133e6e3deeb05acf41
SHA1f14cd503972d210b07aa92d9af4e69f1e0f290cf
SHA256ceb8057a3973cfcb943f601d0cec7f5b399dabbbc6516d3a2fde023c98de2252
SHA51241e53cdf5dceb98957f3c486d92a63cc7deff931c7dd875b636c8c5fffc5d8161a555934870e57a64511ee534c1594b182e69f4b9f3b0451cc798aacc2310c97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b464a0f8fccf30e6dd39fbc4242b4d4
SHA158a03092d71b2b41add2fde56000d1561f954ab9
SHA25684529b91b994d9baa59030fcf62d2b8745c8fdfad1bdbe35df2172cc9b2cfdb2
SHA5129ad30d9af4d54ac8ecfb35f496d45a1bc172fd517bc9ffb1d62cfdb1f187df686b45ea25c4cdf1053e019eaffb6e71fea1231f7387ca5e7a042734e6c073c794
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581d96c055bc5fb73394dc73674ad5c6f
SHA16e12447dbcd8506e92efaa4ca5d0830ea22a1c42
SHA2562237cef4149bdccd845c1b3fa1a1ed2913e0f1f5d25e0942a548fb16002f162d
SHA5121f29625693835cb0b0905bddabd8f4bccf4194ec556709737686e590657a4a51fdcac6ce41a88d397623345be8c03207c90f455a93b2e0fef53a4e589294ab2b
-
Filesize
99KB
MD543eecdcdcd29e246407659af29b9640e
SHA1d136d4bf37fc6fda73794850e9a7bcd47e62fbb0
SHA256da71b81ac0250641af5224608b24b7b43b78b0dbbb17235d3c62f0b37537b3c5
SHA5122fb12da2c50494d8072af2183389707d90098c6480cfdb8f8aa908aadcc5c6051929d0fa37a27ceb5fc3ca7d8d3a0144e09c87d8521bc6727fec083b3d871067
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R1EBDLS6\favicon[2].ico
Filesize99KB
MD5562fe6b5bc02c09537b054ba674740f3
SHA1082f9d8d488f49c3085384009e9700b207dbd8c4
SHA25629b906ce83796e0f46ff07dffbb9cd63278bace576d063fe3d888ab41c76e0d3
SHA512c1a82e9104b03fc145aa8df7146b316e737d60cbacf6ec5221e0b7ccec4ef8f0bb9267f950363c84d3f67e916d728f36ca79f9d244400f8bcf3ff14a909a20ad
-
Filesize
254B
MD529bc5f9bb28f7e68359a7ed0c2884f75
SHA1726f95c55bf2b76a204d42446d58dde41797e61c
SHA256f332de54b9c3b2d0d052470ad9d0c3536f897b04914f602604c9a7dc615bc4c9
SHA5128d2ff7ba0a46e2842c76f5a4ee113b528d304f99cb64fdd0a3980e01a98d307ff71d65505dba649f58c9583341e6eec26df187aa7a83e7b8050ae268e3c3f965
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06