Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
787d5cd69c7b68f9ca244ca4cefe63b9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
787d5cd69c7b68f9ca244ca4cefe63b9.exe
Resource
win10v2004-20231215-en
General
-
Target
787d5cd69c7b68f9ca244ca4cefe63b9.exe
-
Size
95KB
-
MD5
787d5cd69c7b68f9ca244ca4cefe63b9
-
SHA1
57c069dbf9d01b2da21607d2daa59c6a679265ed
-
SHA256
50ff285fae4d8d665822b66f835b81dac1a4767ab843ffdf44aed55ce01f6794
-
SHA512
2de94285cc1cbf59b4c4fc7ea4a2aed24ead4e61acd03ae0b0260b0e0021fa846780f560d022df76469ff59538a560972b7c6300bfa677416312d8cf70e3022a
-
SSDEEP
1536:hKDqJvz2xyM40DSmJEKEFXvx52/DVTW1qfc:hKDAfCDSmJEXc/Ri1q
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\787d5cd69c7b68f9ca244ca4cefe63b9.exe 787d5cd69c7b68f9ca244ca4cefe63b9.exe File opened for modification C:\Windows\SysWOW64\drivers\787d5cd69c7b68f9ca244ca4cefe63b9.exe 787d5cd69c7b68f9ca244ca4cefe63b9.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation 787d5cd69c7b68f9ca244ca4cefe63b9.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\787d5cd69c7b68f9ca244ca4cefe63b9.lnk 787d5cd69c7b68f9ca244ca4cefe63b9.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\787d5cd69c7b68f9ca244ca4cefe63b9.lnk 787d5cd69c7b68f9ca244ca4cefe63b9.exe -
Loads dropped DLL 18 IoCs
pid Process 1044 787d5cd69c7b68f9ca244ca4cefe63b9.exe 1044 787d5cd69c7b68f9ca244ca4cefe63b9.exe 1044 787d5cd69c7b68f9ca244ca4cefe63b9.exe 1044 787d5cd69c7b68f9ca244ca4cefe63b9.exe 1044 787d5cd69c7b68f9ca244ca4cefe63b9.exe 1044 787d5cd69c7b68f9ca244ca4cefe63b9.exe 1044 787d5cd69c7b68f9ca244ca4cefe63b9.exe 1044 787d5cd69c7b68f9ca244ca4cefe63b9.exe 1044 787d5cd69c7b68f9ca244ca4cefe63b9.exe 1044 787d5cd69c7b68f9ca244ca4cefe63b9.exe 1044 787d5cd69c7b68f9ca244ca4cefe63b9.exe 1044 787d5cd69c7b68f9ca244ca4cefe63b9.exe 1044 787d5cd69c7b68f9ca244ca4cefe63b9.exe 1044 787d5cd69c7b68f9ca244ca4cefe63b9.exe 1044 787d5cd69c7b68f9ca244ca4cefe63b9.exe 1044 787d5cd69c7b68f9ca244ca4cefe63b9.exe 1044 787d5cd69c7b68f9ca244ca4cefe63b9.exe 1044 787d5cd69c7b68f9ca244ca4cefe63b9.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Windows\\System32\\drivers\\787d5cd69c7b68f9ca244ca4cefe63b9" 787d5cd69c7b68f9ca244ca4cefe63b9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90fe8dcda250da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{F8255967-BC95-11EE-9A4E-42E20219F0C2} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31084706" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c47f1af20644814589e7a32def35942f000000000200000000001066000000010000200000008c23b9009a13fc03d8274e91af1077ceeb9822e950347cbca678887423164d55000000000e80000000020000200000008760a476b6155e89b425e8de5e17aba30dbdb9a62e22c615a6d84bfed1b420b920000000c4034697c68b233104931214e198e968f590bf0790ebf03346c83a1c29a5713b40000000b408c72193b4845a2e9f27acc81d84a248a3d0c994ba240b49e320dd0317a0f08da493d92ea7b3d2152e9a819f579c3875b46bd8826d7cd4d9388ad080a01cea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3432700058" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31084706" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3432700058" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31084706" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c47f1af20644814589e7a32def35942f00000000020000000000106600000001000020000000dd00dc021c44f6a219e5fcbc0189c51cb0cd3fdefddf3fda50a1fcd2679095fc000000000e8000000002000020000000e5d8322779da8ca57e62f914a8f42bc40782f163ca1306ef0bb8c3787c685bea200000004325509bc9f27bcf9731408deb4c422addad0f93210e960cdcc4aab4b1d1545e400000000c6aaa6676deec34a78cb66084d59d811cc597f1d71cafc2228d70aac76c05817853f713523e2cda12bee9a5c143bfd09e777ae0917f1c6665aaa04393e3b4a9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 602f9ccda250da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "413071254" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3438480868" IEXPLORE.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000_Classes\Local Settings 787d5cd69c7b68f9ca244ca4cefe63b9.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4144 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4144 iexplore.exe 4144 iexplore.exe 3296 IEXPLORE.EXE 3296 IEXPLORE.EXE 3296 IEXPLORE.EXE 3296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1044 wrote to memory of 4144 1044 787d5cd69c7b68f9ca244ca4cefe63b9.exe 88 PID 1044 wrote to memory of 4144 1044 787d5cd69c7b68f9ca244ca4cefe63b9.exe 88 PID 4144 wrote to memory of 3296 4144 iexplore.exe 89 PID 4144 wrote to memory of 3296 4144 iexplore.exe 89 PID 4144 wrote to memory of 3296 4144 iexplore.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\787d5cd69c7b68f9ca244ca4cefe63b9.exe"C:\Users\Admin\AppData\Local\Temp\787d5cd69c7b68f9ca244ca4cefe63b9.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\Raila Odinga.gif2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4144 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3296
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5b610bd5c61e2121914699e4b6cb9f7f4
SHA1514f5ad7770f18e1c5b62253d95d6aa3c63c83ee
SHA2563a418958f81aae04aa13719238c42d24adc5258b95246b3df0b32a1bf7676b51
SHA5129ebb50a5b4942dfbf1a037e8a1b6308502d5bd337abaf90cca0d44f3a88001b25c6f82787f13b2d5a6f2bcb81209f831c16422d4c1a6cb6e07d55e8dccd7b3b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD506e81e900188ab13952672166a8329d0
SHA1829a366ba96c1dfa4ac615d6165bddab55118aa4
SHA256c8d2217a9913d9d421c11c770f21610bd159d08ef86a1342da744f4c9c08deb2
SHA5129cf298d7d064d13894a2c375144046b4d0d1f071032e25faf216d342fd31f08f2c53c9ae73a2a09bd276b7f84affd3a2def050857eb0a4e17c06aa044c305928
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
10KB
MD5ed228603bf5d6ba382b59274dba35a0a
SHA1037d40e0399902b5119d48995dfd2e96bc6de9a4
SHA256a1bada98dffbe23a96af2ce3f4df7d7927cec6ea0a1d2d1f77862fb117a74f37
SHA5129dabf495eaeb979235b7626c0619bb8eaab61c158e66799b1afdb1500952c789b7ea645a358c8961876e06a9ec168159ef405b6238ec692f1f89fc1ccb1e9ae9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\787d5cd69c7b68f9ca244ca4cefe63b9.lnk
Filesize986B
MD57b9cb69075959432524c51828ce11a3d
SHA1ad5bcf34cbd0017ba1bf6518e7fac381a69f2cfc
SHA2563e8f1f1842a709e33fe6393a8e696dcf53b1bfa9554d7b0635b96217584db708
SHA51249e2e2cee77148a6c91edd17f518cfa1a72e735a5f8d6d277f7aabd302532e286621d6a58d010644fcf936a54623dbcf1f94a064fdc17b02504007137a58d96c
-
Filesize
50KB
MD5dbcfb7e87fe308929500b077e23078b2
SHA156f29cfe2222e16c3d269dbbce2e70e3771e1a60
SHA2569f235a13641392a8cc26b7ac6cc20c5f1513e23195e156e52158c10dbff8bfd5
SHA512edf57526cf65a8aa97ffbc4d6a80b13048d46ff8fed43fb49c14d15b465edfb8e178302fb002c59a837dc86bbab9949336b224f5419acfe397dcd7661e854bf5
-
Filesize
95KB
MD5787d5cd69c7b68f9ca244ca4cefe63b9
SHA157c069dbf9d01b2da21607d2daa59c6a679265ed
SHA25650ff285fae4d8d665822b66f835b81dac1a4767ab843ffdf44aed55ce01f6794
SHA5122de94285cc1cbf59b4c4fc7ea4a2aed24ead4e61acd03ae0b0260b0e0021fa846780f560d022df76469ff59538a560972b7c6300bfa677416312d8cf70e3022a