Analysis
-
max time kernel
121s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/01/2024, 06:29
Static task
static1
Behavioral task
behavioral1
Sample
5a8634b706c802467361854c968dd703.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a8634b706c802467361854c968dd703.exe
Resource
win10v2004-20231215-en
General
-
Target
5a8634b706c802467361854c968dd703.exe
-
Size
196KB
-
MD5
5a8634b706c802467361854c968dd703
-
SHA1
24697c6e63e68f97da1de9c6dc955112825e0f4e
-
SHA256
f798445364c29f495dae9bca2fc2d9a5594ebd80d34dec86675e8f184838637c
-
SHA512
c00eb4b99bbc86ebed580a2333a31e7ddce9a17b30e22061fabf4e79778c64e8d63396620dd09d8a8346827fcc172e7a92e34b5b143e4e7f5c2d85d5518e6221
-
SSDEEP
3072:ofi7UDetEwxjpOWVP8C2s4weorsBmZctlTkMdAtMw:oo8Wky8C2s69oi3bWtMw
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1040 set thread context of 856 1040 5a8634b706c802467361854c968dd703.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411375664" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54803661-B2A6-11EE-89A8-464D43A133DD} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 856 5a8634b706c802467361854c968dd703.exe 856 5a8634b706c802467361854c968dd703.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 856 5a8634b706c802467361854c968dd703.exe Token: SeDebugPrivilege 2748 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1040 wrote to memory of 856 1040 5a8634b706c802467361854c968dd703.exe 28 PID 1040 wrote to memory of 856 1040 5a8634b706c802467361854c968dd703.exe 28 PID 1040 wrote to memory of 856 1040 5a8634b706c802467361854c968dd703.exe 28 PID 1040 wrote to memory of 856 1040 5a8634b706c802467361854c968dd703.exe 28 PID 1040 wrote to memory of 856 1040 5a8634b706c802467361854c968dd703.exe 28 PID 1040 wrote to memory of 856 1040 5a8634b706c802467361854c968dd703.exe 28 PID 1040 wrote to memory of 856 1040 5a8634b706c802467361854c968dd703.exe 28 PID 1040 wrote to memory of 856 1040 5a8634b706c802467361854c968dd703.exe 28 PID 1040 wrote to memory of 856 1040 5a8634b706c802467361854c968dd703.exe 28 PID 1040 wrote to memory of 856 1040 5a8634b706c802467361854c968dd703.exe 28 PID 856 wrote to memory of 2288 856 5a8634b706c802467361854c968dd703.exe 29 PID 856 wrote to memory of 2288 856 5a8634b706c802467361854c968dd703.exe 29 PID 856 wrote to memory of 2288 856 5a8634b706c802467361854c968dd703.exe 29 PID 856 wrote to memory of 2288 856 5a8634b706c802467361854c968dd703.exe 29 PID 2288 wrote to memory of 2336 2288 iexplore.exe 30 PID 2288 wrote to memory of 2336 2288 iexplore.exe 30 PID 2288 wrote to memory of 2336 2288 iexplore.exe 30 PID 2288 wrote to memory of 2336 2288 iexplore.exe 30 PID 2336 wrote to memory of 2748 2336 IEXPLORE.EXE 31 PID 2336 wrote to memory of 2748 2336 IEXPLORE.EXE 31 PID 2336 wrote to memory of 2748 2336 IEXPLORE.EXE 31 PID 2336 wrote to memory of 2748 2336 IEXPLORE.EXE 31 PID 856 wrote to memory of 2748 856 5a8634b706c802467361854c968dd703.exe 31 PID 856 wrote to memory of 2748 856 5a8634b706c802467361854c968dd703.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a8634b706c802467361854c968dd703.exe"C:\Users\Admin\AppData\Local\Temp\5a8634b706c802467361854c968dd703.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\5a8634b706c802467361854c968dd703.exe"C:\Users\Admin\AppData\Local\Temp\5a8634b706c802467361854c968dd703.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2748
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8b7a89df243a4fc4883758bf70ef941
SHA173f864556257dcfeacf3c2b74e0913650ab3627c
SHA2568e5c6e90543fccb72ea6730986f3f11b2295371dd2532ed49508a62e705c101f
SHA512e8c9eef6bd9e5a245d49f757c7e17cc4c061e80544bb453d2dc789136314436432f85ba342cd53034d19b24a2fb0ab33fdb5ad4ce95364bdcf6dfa674fbf9779
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b921e4413e8cf9d62174365c9a9e2c7b
SHA10d6ba18bf328c8cd7657d641b5e2eb38b5ead82f
SHA2560634320531c81ee23d6856cd185fb72765771049d1cba6c1361fb3aea036f865
SHA512e7105b77aa343b8e76074f21c05b4d427b6010341a4e2a88fae855a1e41245a7593d093778bd080f7ec3d4282e63018100d34b980e1e9eeac9588d80939ac22b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bac7de976a1f3d112293b4b0ae09c728
SHA1cd10bfe172552d1afab285215b0ebee88d7c4426
SHA25654bf55506562bff9352aa8e3c129eadfd07fc7ac39f22c6720831144d3956489
SHA512587cd068e10af77f6932152437e3358bc2fdf51ca17dcb12933782c2455619ad3aa11dcd83f7033e441eb914ba3874c89678090a0d5e010cbf2760a833c61232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5788d49f003d7760b73db16eec23c31ac
SHA1ea41bbb6d174fa87aa5a637e565111b6deb2dc7b
SHA256c62a52637f583d958cf4555f0c8fd92df1b4e1f1e50f03f283311a921ecb3515
SHA5121c65548d0c0283f367647b1561ac7a9c42d13e94b511029a41248fcc5eede5c3a3da7136af0bfb54dab93b25a10ac1fc40cadc921027c823602a4f846efee765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a3ee4c1115fe2b8a31fba41e1a4bf4b
SHA1521dd642e6aee897a483134f4e9487f963c59877
SHA256f36292c4d0a5b595cd9405ce2042e2fa743114d2da851d50da43ad7034210c5c
SHA5127de95424fe2a8790c6f9d1821c474987a02b9370b96b0e4c4df9c1fc0f83c2c381ad06ce3a9e25145cfe65e1a2fd86b0cdffae1b5d3ce7ceb24e57086002bfda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b06803d3b291c9a2aaf8d59fdce1202
SHA17d8ec260ae509c8d41782fb93dfcf3a8b799ee72
SHA256c0e4d0928aec64b0949d9178e9381a63546ad8e379453f63bd7a55d2eed080c0
SHA5129d80f7219f3bf1bd5f94658ca0e685909e42c353bfbbdf0cfa9ae1c944c00e272b79342308c49436f9764f43b50c49382a48753365210fffaf5a6ca67c8fe491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b896837f64732cc4d8aabf0759eb19a
SHA12394e9397528b28d8032e2ae3c711e976d877581
SHA2560e5f4bca1367aeb3a0c1a63b9356a510f1a1a5cda1d84c4b9a965868e5ddad0c
SHA512ef8ff85cfa9939c2dc5c9ad1e1f6ff5365c73aab336d28f03fb944e3a2c19199ee1a700ad0b1b27f6221648736105e4e55e5b3c7568200a5ceb5a4f5d6e9578f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae8f1f7594d17917353a1eaf9f590213
SHA19528b6e3e23e204036cedab8a979f0a88561f78b
SHA256003b69255c3e9f2a2ae17fac51079fa57dd33a41059c713d20ff699b1879aa24
SHA512d4e27bf3a3bc269ed409c4d66143f54cef89b95586433f9d43c58874edf6a148983a1c28cac8931ea831a5a061dcbc0e0b75aca1e8afaeee6dcdcb1f4878bc12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c8791f33e91b539ed535c306cf8ab5b
SHA19b856544762363002bbcb4fb21ac89329b3e6207
SHA25612be8cf8260e96d09578b47a698e5b64247f7feb56ec94ae2302664a538e378a
SHA512a55af105154fc006937d9d3443159021661d7d3d076ee9b463897350a0efb0d8fe2b9730aecf306e01d290678137fac2069a3880775b39a8d2e438f5a6ec3e67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c8768f37dfad1d1b7126daa40d5c5a5
SHA103a7a422554b98b2dcae43f617ece1a702f1c3da
SHA25603d1c4256f2a3feec30e8e9b9fff68bc61577879c381a12b1b77d518dae17696
SHA5120340461726b0197a61139c9e8265fb76ae77d514a29ba2c1932d66a01d96fbf9adc45b41247cc8080b8d62fd7512a193650442d5a84132cfdcb5d8fd52d9763f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5191beb916dd41ef8255e0acb971bff
SHA17be6abc2fc7c00590ad59c33c7574c30db3efa72
SHA2568d8b5e453c2df095ba9ba4def61beb1c38ae645d0ef463588dfbcfd89da65f86
SHA512833004e667f18c796f85e19423708e1c208df7c155dcd36f1cf5c3e440e063ec8eeaed9dce8e090258b8c8761de5aa1eb1a70929d78fb9c5462fc441760a4410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55779e0b5831b2610c51495f9ca70456d
SHA18b10f33db358a72b357ff9b60235ac8481f23c36
SHA2569da318d85b6c3edbbc137f058d381b9a34c092fc4cde2a58d9553e641a6044d5
SHA5120b735d6ce1966546a6029e93501b61593bb8c61dfd4210de82ef2968073e03c193c1a1d74768afd037fc3ff797af804677fb2707aee5bc36fc474ebb15f9275f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598aed59cf659790017f0d2f30b65659c
SHA1e2a54672fc6768f813259bda1a0e260c4ec33073
SHA256655f67273614bc159f0c46756bf1706a09b8a03cc06f666e44f7b37bc17025b4
SHA5126ec1b95c76078ba1e5a19431cd6ae2ac673faa68e0de174b07a728866b0c3a52b3c33d277a30cbd705e8fcff82645dd39112bb0c22588d0dede65588e32accfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ade6f25e220d8cc84bb122dc413ac41
SHA1f19f3a897cdda971f07885b8c4ccc774712cfffc
SHA256f9cf6bd0451481ca0afebe2de80c9294034881099e65c40b1ba6604ec6c74f4f
SHA512956b0f6b97f64381dbd2e2ac179d0b144c01ca9967aefb6530017185417262c56135ea6058d9ef94c7022cf6dd1aa19c29d73b826ce84c941965d26088d3f2db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5764dbdb88a62981e4f6d821981a1e23b
SHA15db344941e69b651d05a25d0ece485b939a479d5
SHA256174acd80fe77e3fa509c32d569af30f8168d6219a7e37172dc035fa8cecdd5fc
SHA51256614a51871077002b5d40213ab77d9af612f5ebbe30f31361da05d8a6d2581dd42c9cceef77749a551f959896fc30adc2521ee7cd101a62abf971f739629e89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584c0ab6983664d6db3aebe59025597bf
SHA1fed26ca47e16588f5b16fb70a9db7c5534f97f8c
SHA2566b415da8301c2abf27e8b42bbc3856a9cac76ee9dbf3780daef35fb8bf19ae22
SHA512d6d1631a9839509b2127ab250e288258f2ea8c1c431ffe17f847e3f2c59c0df33d4c2c68bf6af5272437220394c8391d9b4c1288268c241d5c243078a78c28b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519aa2edcb706901576c82db6a57b5e32
SHA1dc3ace34d3e5f6af7280ad2ccab12890f990b3f8
SHA256c1bd2dc5d856b35a0337dfe4add42bf7d849e3973bdbc133832942130378b2c6
SHA5122f3e9dc3b65e416beb4f55475e505f5fef57c67a7c6d6aa94d170c99446386c3a87f38daf2df8fc40d31f46d6b3471c57d4c75d1586337f8bb1fd50cd0a14958
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06