Analysis
-
max time kernel
157s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 19:14
Static task
static1
Behavioral task
behavioral1
Sample
87ada9411ca9c8fe0d7285d5d5b4022c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
87ada9411ca9c8fe0d7285d5d5b4022c.exe
Resource
win10v2004-20231215-en
General
-
Target
87ada9411ca9c8fe0d7285d5d5b4022c.exe
-
Size
9KB
-
MD5
87ada9411ca9c8fe0d7285d5d5b4022c
-
SHA1
446a79298b29ed53037d4a9b837242167f9849e7
-
SHA256
3d21f36bb30e876980868e9de4dfb85d21d07a90c5c7f99fe6061d6a28559ebd
-
SHA512
4ed61da98cec016368936bdf57567c143ce664ccca9eab250dad94d0c3471ce9da00690bb781591aa086187f85e1dddcaa74a30b79007ce3bf7f8c8539b52e14
-
SSDEEP
192:XjeNsUi++ipsz9SJK1GMmBCIGISDI9m4iYVys52E:XWS9ffmUU9m4N51
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation z1428.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 87ada9411ca9c8fe0d7285d5d5b4022c.exe -
Deletes itself 1 IoCs
pid Process 2424 z1428.exe -
Executes dropped EXE 1 IoCs
pid Process 2424 z1428.exe -
Loads dropped DLL 3 IoCs
pid Process 2424 z1428.exe 4872 IEXPLORE.EXE 4872 IEXPLORE.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\364tvb384 = "C:\\Windows\\SysWOW64\\z1428.exe asycf74" z1428.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\z1428.exe 87ada9411ca9c8fe0d7285d5d5b4022c.exe File opened for modification C:\Windows\SysWOW64\z1428.exe 87ada9411ca9c8fe0d7285d5d5b4022c.exe File created C:\Windows\SysWOW64\z3308.dll z1428.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{5050C6A4-C136-11EE-B6AD-D2066D8F1295} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31085891" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "639314397" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31085891" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31085891" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "413579933" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "639314397" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "691815117" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 972 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2424 z1428.exe 972 iexplore.exe 972 iexplore.exe 4872 IEXPLORE.EXE 4872 IEXPLORE.EXE 4872 IEXPLORE.EXE 4872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 740 wrote to memory of 2424 740 87ada9411ca9c8fe0d7285d5d5b4022c.exe 86 PID 740 wrote to memory of 2424 740 87ada9411ca9c8fe0d7285d5d5b4022c.exe 86 PID 740 wrote to memory of 2424 740 87ada9411ca9c8fe0d7285d5d5b4022c.exe 86 PID 2424 wrote to memory of 972 2424 z1428.exe 87 PID 2424 wrote to memory of 972 2424 z1428.exe 87 PID 972 wrote to memory of 4872 972 iexplore.exe 88 PID 972 wrote to memory of 4872 972 iexplore.exe 88 PID 972 wrote to memory of 4872 972 iexplore.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\87ada9411ca9c8fe0d7285d5d5b4022c.exe"C:\Users\Admin\AppData\Local\Temp\87ada9411ca9c8fe0d7285d5d5b4022c.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\z1428.exe"C:\Windows\system32\z1428.exe" C:\Users\Admin\AppData\Local\Temp\87ada9411ca9c8fe0d7285d5d5b4022c.exe2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:972 CREDAT:17410 /prefetch:24⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4872
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5164c747ec05b351867ac47fb8ac89dcb
SHA1d814dbedc7356af4d274b907692c28baea48dba0
SHA256e675e63c991701c36625eb6ef0d2e009c743f7a6843192f74bd10ac641503181
SHA512895663660c26f74561154925fd7ef4c2ee7e8fe0ad25985f7ed51ceadb476d576450c8c57aa8e8ea350be398b491f0bb5fe54744d7d1e625e4ab97a93b375643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD560126f7e4227110008bee4a9b1ed5694
SHA17a0e10d01afdeb634900b774e7d37c4f736f7950
SHA256c917d95b7fdf239b31f30f08e5bb621c0d7459f2b4eeb73fcfcf372cdb4ffebb
SHA51287ef9a9fbbf7408188894301131ebe0bc02652bb6d9dbeaccff90e46775504fa8a9957f7f9954d91882b2b388fb407579db9e64f70e38da62f4ee78621db7526
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
9KB
MD587ada9411ca9c8fe0d7285d5d5b4022c
SHA1446a79298b29ed53037d4a9b837242167f9849e7
SHA2563d21f36bb30e876980868e9de4dfb85d21d07a90c5c7f99fe6061d6a28559ebd
SHA5124ed61da98cec016368936bdf57567c143ce664ccca9eab250dad94d0c3471ce9da00690bb781591aa086187f85e1dddcaa74a30b79007ce3bf7f8c8539b52e14
-
Filesize
20KB
MD53e87feb444edbcc7888e79aafcda3ea8
SHA1cf85971aa314e172e9e6f14781f69584d5db9c32
SHA25647c87bdc099fd9a6511c75790c25d27989fe91323521d30c1789c0eb6356740b
SHA512319468dbad20e686d1279dfe1b7007a429126d7c6126a2246f145ffbb929768726ed99293ace8ab7de98342c520da6bfd8cd09ff8af302771fc288bc92c586d6