Analysis
-
max time kernel
6s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 12:34
Static task
static1
Behavioral task
behavioral1
Sample
7fd879394351cc247185c7c3537af62f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7fd879394351cc247185c7c3537af62f.exe
Resource
win10v2004-20231215-en
General
-
Target
7fd879394351cc247185c7c3537af62f.exe
-
Size
264KB
-
MD5
7fd879394351cc247185c7c3537af62f
-
SHA1
eece0bc50165b20f18387ce2d90a5596e61b5784
-
SHA256
e2aa2aaeef264369a30de21905df03a6bea2134be3c6bb63815c8305beb7973c
-
SHA512
5bc65f4a411131ac22db044fff9fd0f016a3d00e8e634627c9c964d1e0026a9d269fd84717a17a817a03a2d0d9f985a4f17e499ab850040a769f41b7fb5d155c
-
SSDEEP
6144:t43E/UxShGkwrKhiuFHMQsgnHnTrMvyGkDVH86+ZlE:yGUxSNwrKhrH5nH3GxZK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2164 winupgrade.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ime\winupgrade.exe 7fd879394351cc247185c7c3537af62f.exe File opened for modification C:\Windows\ime\winupgrade.exe 7fd879394351cc247185c7c3537af62f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main winupgrade.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Enable Browser Extensions = "no" winupgrade.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main winupgrade.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\Main\Enable Browser Extensions = "no" winupgrade.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\Main\Play_Background_Sounds = "no" winupgrade.exe Key created \REGISTRY\USER\.DEFAULT\SoftWare\Microsoft\Internet Explorer\New Windows winupgrade.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\New Windows\PopupMgr = "no" winupgrade.exe -
Modifies registry class 34 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\file\shell\open\command winupgrade.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut\shell\Open\command winupgrade.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\ = "open" winupgrade.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\LocalServer32 winupgrade.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command\ = "\"C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe\" \"%1\"" winupgrade.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell winupgrade.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command winupgrade.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell winupgrade.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut\shell winupgrade.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\file\shell winupgrade.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\ = "open" winupgrade.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell winupgrade.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\ = "open" winupgrade.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\ = "open" winupgrade.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut\shell\open\command winupgrade.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\file winupgrade.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command\ = "\"C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe\" \"%1\"" winupgrade.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell winupgrade.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046} winupgrade.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\open\command winupgrade.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\open\command winupgrade.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\file\shell\ = "open" winupgrade.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp\shell\open\command winupgrade.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\file\shell\open winupgrade.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID winupgrade.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command winupgrade.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\ = "open" winupgrade.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command\ = "\"C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe\" \"%1\"" winupgrade.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\open\command\ = "\"C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe\" \"%1\"" winupgrade.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell winupgrade.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\open\command\ = "\"C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe\" \"%1\"" winupgrade.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut winupgrade.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut\shell\open winupgrade.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\file\shell\open\command\ = "\"C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe\" \"%1\"" winupgrade.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3020 7fd879394351cc247185c7c3537af62f.exe 3020 7fd879394351cc247185c7c3537af62f.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2320 3020 7fd879394351cc247185c7c3537af62f.exe 28 PID 3020 wrote to memory of 2320 3020 7fd879394351cc247185c7c3537af62f.exe 28 PID 3020 wrote to memory of 2320 3020 7fd879394351cc247185c7c3537af62f.exe 28 PID 3020 wrote to memory of 2320 3020 7fd879394351cc247185c7c3537af62f.exe 28 PID 2320 wrote to memory of 3044 2320 net.exe 30 PID 2320 wrote to memory of 3044 2320 net.exe 30 PID 2320 wrote to memory of 3044 2320 net.exe 30 PID 2320 wrote to memory of 3044 2320 net.exe 30 PID 3020 wrote to memory of 2816 3020 7fd879394351cc247185c7c3537af62f.exe 32 PID 3020 wrote to memory of 2816 3020 7fd879394351cc247185c7c3537af62f.exe 32 PID 3020 wrote to memory of 2816 3020 7fd879394351cc247185c7c3537af62f.exe 32 PID 3020 wrote to memory of 2816 3020 7fd879394351cc247185c7c3537af62f.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fd879394351cc247185c7c3537af62f.exe"C:\Users\Admin\AppData\Local\Temp\7fd879394351cc247185c7c3537af62f.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\net.exenet stop McShield2⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McShield3⤵PID:3044
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ieflux.exe_deleteme.bat2⤵PID:2816
-
-
C:\Windows\ime\winupgrade.exeC:\Windows\ime\winupgrade.exe1⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Modifies registry class
PID:2164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD5bfcaeabfbce998e551827934f9cab4ad
SHA13a91d41d9d42b737bdb82f59b3867d3b4ef27035
SHA2561813f05035373247df14aeb946d7a38183cd78e9d6ed1f637b45eaff537b382a
SHA5125a393fc6e5cd0004b8c559b5dbbbc6903c4df29e27df3a4fe26bb8ad40b860f51d10152d7ebf002de6772448411edf3838626c34ce5d2265aa6a9703809831db
-
Filesize
438KB
MD561f6616249dcd05447dfd44d8aeb20cb
SHA1da03d83eb96281395c7779297e2a45ce4635a8db
SHA2563b071d347a89c6ddaa3f183bbc2bda404c3631def2b0a3ee513b0e18d9faf307
SHA5123fa3eddf68003d496fbbcf2cf59d1d92faaa6680f9b18c6a49d6a709a3c930cc48fc5001f94c26db92b0c09c73fcb5f685b5d08cad7f2632bb0e45a85c3ce7dd