Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 12:27
Behavioral task
behavioral1
Sample
58e9ffc475d99007cb3fabea82f2f7fe.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
58e9ffc475d99007cb3fabea82f2f7fe.exe
Resource
win10v2004-20231215-en
General
-
Target
58e9ffc475d99007cb3fabea82f2f7fe.exe
-
Size
13KB
-
MD5
58e9ffc475d99007cb3fabea82f2f7fe
-
SHA1
940749671e685b146f7941df6129a686d5457ca7
-
SHA256
45f722e067af9cda05729dbb84d95d10a3bb9f7e33fd95861bde07a37a8b19b0
-
SHA512
7ef57efde79156a58e00a7e9bb9173d1e83b9d4ffcb416c1d48f6be621c42dc3e01e351552996459bb3f11c566433d131a334da415f86610f57f123bb782be09
-
SSDEEP
192:CS4gbgkAN4SJj+bfrJsUwv7E6ERGmkLtr9ZCspE+TMwrRmK+vhOrLws8+:CS4uI44aJ+7NzAeM4m/6
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2928-0-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2928-1-0x0000000000400000-0x0000000000408000-memory.dmp upx -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f1200000000002000000000010660000000100002000000072927f4fff775b1f956c7f0eb31c477d8b4afd73f23a832834bfe1d833a6ab73000000000e8000000002000020000000746800e836b3884a1f72860cc9107c68cf79fa5dfb6800a57d0700ed35f3d0e520000000d070a3d5922d717d33d44ba58ba162185f378187e6fe1a4676ef3d9fe2cfe16a40000000968eeac503368be70f38b754fe1f9e3102229d1b476d7d41d9738788b37f933f86764d2d62822f3c0b3e6efbf5418f034648aeadefaaa10e67ebb6f0b8c93ae0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f1200000000002000000000010660000000100002000000094204a8f5e3d6b2505564fb9faac3efecb299e734b7f0830db4a9188440cb8fe000000000e8000000002000020000000d8db90ce14f75c11b205be4dd894731f5781c8ae91f7d5634c150e4bef55afc5900000007d2736d2c01e3a59d9b2a455059c94b77138c4b40b28b06202aed0739be1aa6970317063d945fc72831367505f5d4f69146cf0dab2cd915a156a080f68bd530a67c1a065930ea873ccf36f848f5e590cb3c6375c8251997f488bc3733ecc13e85ff418c60cd5aef4f4f2ac6fc3d37c0d7eca03839d8c0b2a33755b3e19e618cb64b5ff7c96b2fd7092e54a307fb608e54000000021f70d63be77af4d4d1d441cf6104f9710d2887803b34af634c672fe28721bc2334f767f0e1d954203834815b402e4ab2c87a1e50754f1a6fb5e612a2450a0d4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 102dcde91b46da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{151C8421-B20F-11EE-ACD1-56A82BE80DF6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411310702" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2928 58e9ffc475d99007cb3fabea82f2f7fe.exe 1680 iexplore.exe 1680 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2928 wrote to memory of 1680 2928 58e9ffc475d99007cb3fabea82f2f7fe.exe 28 PID 2928 wrote to memory of 1680 2928 58e9ffc475d99007cb3fabea82f2f7fe.exe 28 PID 2928 wrote to memory of 1680 2928 58e9ffc475d99007cb3fabea82f2f7fe.exe 28 PID 2928 wrote to memory of 1680 2928 58e9ffc475d99007cb3fabea82f2f7fe.exe 28 PID 1680 wrote to memory of 2376 1680 iexplore.exe 29 PID 1680 wrote to memory of 2376 1680 iexplore.exe 29 PID 1680 wrote to memory of 2376 1680 iexplore.exe 29 PID 1680 wrote to memory of 2376 1680 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\58e9ffc475d99007cb3fabea82f2f7fe.exe"C:\Users\Admin\AppData\Local\Temp\58e9ffc475d99007cb3fabea82f2f7fe.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://ads.eorezo.com/cgi-bin/advert/getads?did=432⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD58f3e4c7316192229b22ccdb4641a33ed
SHA10656a47ce2352f693b1867fbed8ec0a6946bf6e2
SHA2565e8f3686107ccd029efe3ddfac2881f9a5524ff6c1e8295cceed88d60147c172
SHA51239215ef29058764a5034830320c7a965697587fd309dba734a2a72b5799ed5ceb7b80bed77dd94187af39358e4acf28a23511e3c3244efa6f2b847e5804b2c32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c69cd4062bd54af54bfc251bd5f362d9
SHA18bec1889d6fdeb3387d0783638608ee783c674aa
SHA25684be3c40be6c93054e46a1fd435a3428dfe4e0be198628baa1294c204e781fdb
SHA5123a995fb747c866f3f5fd02deb43868cf09bc38c2c6138cde24dc2fcfb87238d111b29e6ff0257c61a33748ef98b5d4b09bd93df28410d23fbd09d8f739f1b4e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e18924cbd50d5cfd0d6cbd3e9d1426d
SHA1d8bceb1f289349da9b1f54d9deba3d52f91959dc
SHA2562c42011f2f62f96b453a9adb06537470297ea1f6b07e8ef24f02df7ee66640c6
SHA512a24ebaa3e26b974ff013afcc2cc8b143be0af9ad5a4937699b8f0f57ccb641d0aae4b16f11477c3844179fc683cd02d057cd32f9b51551b890932cde8e311944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52731730a859934f5f95568f6ca88c510
SHA1752aac3551f196461f2cfb18f4a6d5009339e786
SHA2569a84d4cde3f941673772e9db2c9795737ef34e5d8d551910d69e34c80bb58fb7
SHA5127c913da445352079df8f9bd98de454f4070dccb2af1f09747f236502e21f0baddb4dee7a2f265eecd901f964d4f3471bfd6948724abece8e7b6d9c95bc4981e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580edf897ecee2425e2d0d49cb0800a84
SHA152efa3e0bac94eb95727df00cc12ccbb2fd1bcc3
SHA2569ec5d4d6b7cc6075a43981ea30e314fc824e46aecbfdf93ace49dfac603e3754
SHA51252376ae115c4bf1117208331bccce352fc61280503ed644a5e8049c6c147571c2d1281b514fd2cc4ac25feb15ea0ef3c8e3321c2bd9e82a69ba792ccd32b7f64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59821cd28884693dbd9cf120e7e89a401
SHA16b9f539dc21ef0ab06b494a37f931525c622b79f
SHA256e092a64220d3e19b025953373f58b54bdfd818fc588ce14202a113fe75a3fd4f
SHA51222875377184d77d02eda30b1767f9bc0da50840c1e15588266f241dbb5b439851c302e1e714f49ed748df2264ba99d358c78fd7ac4f0cb4a6f6b3ae47fe25f33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a48bd56d2d615dce75ded741c77e036
SHA16006f74561d6e996f7bebb48fc42ccc1d16d326c
SHA25672a804c6accdf6fdc3b186091f0ed703a044686b702af93ff530362683fe32b0
SHA5128c34e71775bb6181b2a0868b79bfece145799a93ba2b0c44d30bd3850e3abf048850f330392748a24370ee6a4807269b6276cb9f10e5ba29aa18942817cb6bea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531915bbf62be2f1554f534bd8fceb461
SHA12be3c721ff56fe54f6f6c5eedb61206bed197b08
SHA256935fe5c303aa9aaa5f474e7896a65351fc7b6f37befc8a014292420e7881c33e
SHA512d4b9f0695d9a39ff662310b2d798fd5c72c2c76c0caebe33aa25bad3356945303790cca81113d774c461dc44c09001cb6d8c8e69c649508cd0d8fedbbfa62671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e5e8af55032c544b396c1268c2d5960
SHA1a48ac2bdd34e19fd18eb12318c67849e724432f9
SHA2560a90a0ffb8466adb8362a9319f44473c9cece356e8dbe24678abb7efc6d83777
SHA5129b02dffec9db34eee025fdddf84165bcc84c14cacb54b7f4412b485f117685a75f6c81fee9b6dc9c42c760b19e8d3d26c3aec9a0b6bc0da5aa3807b57971caa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD518ab95e2ac780f749d60d7fc98354695
SHA105781e0f245a74d54fbbc0b28a17ed3a0655303a
SHA2565449f51f635d188a4da972d6b8541b3191fdc16502655c1512927ece51134985
SHA512ac405a94c2186b92baa44ff0a833f1999a81cc8a742ba85311376636ea2e0ba7bdfc3933fd884959b6c88a6a69ab8e0df5d1434b815ea960829b0f52cdf5be7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06