Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28-01-2024 16:10
Behavioral task
behavioral1
Sample
7d68cf9aaafca54d7ed1dfc114787cda.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7d68cf9aaafca54d7ed1dfc114787cda.exe
Resource
win10v2004-20231215-en
General
-
Target
7d68cf9aaafca54d7ed1dfc114787cda.exe
-
Size
1.2MB
-
MD5
7d68cf9aaafca54d7ed1dfc114787cda
-
SHA1
1353dcd76c24afc32532754011eba7f8a18edc25
-
SHA256
2b02458d23349a94539ab53cc2bb8922bc6022a46d6351d7b93c510fcae1ba08
-
SHA512
1709b741a32fba218c5cb190607f887f80955728f4306b415c1ad45e6f5120c83c0c9c8c1ac5abdd5affeef0f0d3ad28fb8900c9b2a13f3497240c83aa697f90
-
SSDEEP
24576:HvcTUYMxqssWkH8VtA5ddGwb3/c8x2CPXGm5bHuS6gKZDzb:iU3qsstH88ddzE8vGSHuzD
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3016-2-0x0000000000400000-0x000000000065C000-memory.dmp themida behavioral1/memory/3016-123-0x0000000000400000-0x000000000065C000-memory.dmp themida behavioral1/memory/3016-259-0x0000000000400000-0x000000000065C000-memory.dmp themida -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa000000000200000000001066000000010000200000006e9e5cf5174f3ff784a1bce466f15741d36710016cc090b54d432f09afcb120a000000000e800000000200002000000041122a1a531eb625219e0626f861d26358daa4bcf79e9e951b29794468d7944d20000000c1cdea71dd6bcfd5ee674d965adf9d7a6a98d3df446dadc41040b77624cd0a11400000000ad67478428b2b427130688559be00bbe4a0c658538434ca1e129669d93d20fe03814ae5d17bb2bf7ec089f22855a7ec3bdcea8a6211b34986db17cfcaab8dfe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f01d218f0452da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA113631-BDF7-11EE-A29D-C2500A176F17} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412620086" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3016 7d68cf9aaafca54d7ed1dfc114787cda.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2648 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3016 7d68cf9aaafca54d7ed1dfc114787cda.exe 2648 iexplore.exe 2648 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2648 3016 7d68cf9aaafca54d7ed1dfc114787cda.exe 28 PID 3016 wrote to memory of 2648 3016 7d68cf9aaafca54d7ed1dfc114787cda.exe 28 PID 3016 wrote to memory of 2648 3016 7d68cf9aaafca54d7ed1dfc114787cda.exe 28 PID 3016 wrote to memory of 2648 3016 7d68cf9aaafca54d7ed1dfc114787cda.exe 28 PID 2648 wrote to memory of 2688 2648 iexplore.exe 29 PID 2648 wrote to memory of 2688 2648 iexplore.exe 29 PID 2648 wrote to memory of 2688 2648 iexplore.exe 29 PID 2648 wrote to memory of 2688 2648 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d68cf9aaafca54d7ed1dfc114787cda.exe"C:\Users\Admin\AppData\Local\Temp\7d68cf9aaafca54d7ed1dfc114787cda.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.freetravelfriends.com/banners/index.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5440f08b3db373db6e0d5276aa7bd574f
SHA1947971c9fa209c3bbf7be8df1073ebcf1e6c0108
SHA25623120515da36a716e05797d9f234bd34ef7a73b71fd709257d73fa04dc5ac5a7
SHA51251a582b479c7e30fe90094bfcee7e04557c68f2022be08f5203736664c7925d9754ca04182a6dd294e417aa2b11f143122446fa82c0a6f5830112e187e7ba686
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560cd3c1fe8881333709eea418e9e2495
SHA121b213839c9bfe4ce18dc9f6212c70f9768d25e3
SHA2560a1a049c568bfacaa2db252da31f5cd48eae193cc6242aae94f0ed51d77100af
SHA512e6c974d589ad5496f31425725ebba4230f845fb492338f7a4a2229c0d6d7f4520a85fd891c2e4023f0122981bd6c221d2a96b9cc5e64e86b57863fab73cd02f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5911f1c47aad24714fc32576d6af05895
SHA1688dac62a11922e6a69bb15d431b668f7efaab6c
SHA2569c2daadf75f54f6df3cf9c2c697788e164e17ffb854c65a8011089e24d407b35
SHA512e9d3bb4a22171d0fb88be66c1a305876ddecea968392c23c9f3f74651cf269b77c2b7897a73d920d9961bd76fefe93c800d285b7275e4aa187a1f95ab4a2af37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf606cf6a093f6ce2a5b0a8c1e37132c
SHA106aff271bc88c1090b4dcc924d8ac3a543b0c208
SHA2561bd79852136dc965ffe9ffc9301b4da86970e1e13f09c3f0e8ab0de8fc2020de
SHA512294c28ea09e3cc093d033126a207c6df95fc5aabeb6bb9057a55fe3796f161808308842e5494731d240b76506b7b28133b429ccfffae89e288a07a56b6279cef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52390ebe69847755b251de8f5ede67283
SHA17af668cc7094f4822cc49755282d3217575a997e
SHA256783f73d7f88d587727d56bf7687858d59a0b480b3e22fed3ad4fc91ea470ece7
SHA51235311683b5395e7dad058ec76431b64437da08ef6c742ae54630254d479c17b3843b2eb96193d453fae081f85fba117ccfa713d2f26e3869b18d1bbbee96a964
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534f8163e337522b33ea294ca8ccd948b
SHA1acf6575ae1bfb0c6bf2ed763fa304beac6d49fd1
SHA2561b8f258ffad7a4bfb8324350a5172252934d7d6c5d460237a8c9be91aa99daed
SHA512863de57ea7bfd7b1b0555364a1cb134d6dfa6bb35dfb38344510ad49ced28f554a0783e5a89797c00b9b09809b1b2209ccda05bc33465416e2cb7af422c90875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b5f01ff691ec11467170403b59e3dc7
SHA1c72afe735a35e3e81585e5b88d0c4c3dfd6fd588
SHA256aa8a0f8268b72b5396e23454de8ff2996aed8221dff156f49bf8ce743beae541
SHA51278a44d2df46da22b43e7a4684b9d93f558c7e0a0ff6fef2a2029383c967338131b59bacb6dbda953c35b86eb901eb752da840086181df5e73e265642ffa84d50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b89e4db1a8794a0ceb468fb304deee56
SHA1c3f4b6139819367e7d0dbadf49b661088bfd1d15
SHA256aacf9f96b7e1d614f3276e3f4d89adcb68d1f0acd5d618143a7608866265a318
SHA512bdc73273e622d4728b7213b7f29ece0958584821ea3d8a79547b156694bcd6f971c91ae53ee25291a4951dc7b98f4f75b528af05dc17967bea6ac111a020e5ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e3b02b6d85fdc4c8a538f509e56cef9
SHA15f898e39475c6863ab64a23dee93fd85fc75e0c4
SHA2566276074fa1826ac37b2fc241531b31d9b4a4cfba25d124f041fd811fb8913d0e
SHA51295368d275598297ee09f7542f5fa2d11ddbd118034aa65511415922bed79a227b7a1c1856bb359e395de86fdf878202bed0f25838264dd54b597fafc79ef40c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5884258eeccbf561a520a3569faaa0bab
SHA1122b5f0aeb1e83aad686addb2c3fcdec4b6b3b6a
SHA256bd3c38916e223fb9977876f3d5b4dbdb515e2b5659a7811c2d53e99ad6eeaa1d
SHA51273ab10614c1850f53cfd8ad498a202b2c304a6c4070178b72b555ac26fbc89b5bbdb8abaa290f3425546f4db90ccb433364e4275582fb72a7ff2833941e4eab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ac3bd810fc9ff676191bc4f643d7775
SHA13c8c93f80796df2e2d39f96ab187610965cdbcb4
SHA256dc8f93cf8389e99be1e172263f315dbf50f68a8bdd40f952d45444d6d527673f
SHA5126480627fddadf64bb284175ea9581dd85c20573153758a96fbb04febd871be04cccca9eb5a8391284652c8d92b7b34ac825a3bde66735a5a2612a2dab2146ace
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508e93e73147678ddfc994624a1389753
SHA1a42e52652353b76cf38997e241bf4915cdf91c2e
SHA256a8f62f20e3a00ec29c8d08967c6f2a96aa1f8e1ee44a7e835a7bb7eafc83fef7
SHA512fe6fd229c740a2359eafa291de75bc1a8a43517d4b59cbde2177fb09b7ed1436e976c24a9e53dac9e2fe37442052eaf4dfee32439abbd12051176eb567d67357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545ecc6d512958dae4398be14e1dfa311
SHA1198d40db4d6da8f2b029376890d0b6f5365f030c
SHA25640272639f6c9133fbb6890238546e3779fab9e5b367384666eacb328fd543d88
SHA51260169549678a6933f7df72dceec5ed78be673c001af67f63d688b0832207f58c8385d81ab4669422f6845fe36f5f93d5f2c49a14821335061cbeae97a9a12273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5252c23489f38ddd12cb7cd4f19e8966c
SHA10753f42ab93d181a74192a16b3e77e26095e2130
SHA2562c42594c6e16c80fa45d4bddd7e5a5d12824f12237e991f59b90338b225ac23e
SHA512e97fb04067e59c978b4a8d120557bb52c300db8fc4d65e876f2c161105c2a1eabc6e494874d03caf7b6c4e51ed622f7696d4af04b1b6676e56eeb919a3c94ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecf83b2293bfc055b6a15b7654ee37f5
SHA10c030527fbb4a1e03598a9c12c1acaad07e6da97
SHA256033af45ee40f1206a770cdaab5efa2134259588eb87c535c1bc95360e33e75cd
SHA512c62782cceb2306f54d1d9bd96fde3915a2c881a8c3704356b4ab8016c352c60ac00d8d257eb522e1ac6ca2a766ded9de714f46473f00204eef9266bcdafc4625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55daf5ed9469525ce51a6d919c6877d25
SHA1d6370f56a7621f3da0acc902f0a2dcce1a93a525
SHA2566108a1319a8e46ad88f9b78bf08e59bb81dfdf8a7d41f9292bea3674ad94a12d
SHA5121e260296884957908cadd04cff8d99711d9717738ea55afa749365910222d004b1d0948733967fcb9deffb64589d9e040dfd5d9b1b84f16728572ebe3f292715
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06