Analysis
-
max time kernel
134s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02-02-2024 14:39
Static task
static1
Behavioral task
behavioral1
Sample
89c5b369142e8d9fb772cddbd3ed25f5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
89c5b369142e8d9fb772cddbd3ed25f5.exe
Resource
win10v2004-20231215-en
General
-
Target
89c5b369142e8d9fb772cddbd3ed25f5.exe
-
Size
17KB
-
MD5
89c5b369142e8d9fb772cddbd3ed25f5
-
SHA1
f7221d2d20f1f4559554f75e5cd5dfd02ff38b62
-
SHA256
2102399e096ed9df1879890e957529f9484274c50a5dd3e6aaacf71eab12a378
-
SHA512
510d157724da03fb9bcb9928290288db8041c100d904bbdc00dc259d76510f89299c6ce6a0f9160ad6f833793e6ede2a53dc1d75ac83f491035c0df1d6082786
-
SSDEEP
384:htEEEcq8CIofVzYRWhsXVbCDVGgKTfsjt:hMIS/sXVb3PTot
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exeC:\\Windows\\system32\\wintask.exe" 89c5b369142e8d9fb772cddbd3ed25f5.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\config.txt 89c5b369142e8d9fb772cddbd3ed25f5.exe File created C:\Windows\SysWOW64\cool.dll 89c5b369142e8d9fb772cddbd3ed25f5.exe File created C:\Windows\SysWOW64\systemem.dll 89c5b369142e8d9fb772cddbd3ed25f5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E4D43FE1-C1D8-11EE-BB33-CEEF1DCBEAFA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "413046648" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1200 89c5b369142e8d9fb772cddbd3ed25f5.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2552 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2552 iexplore.exe 2552 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2552 1200 89c5b369142e8d9fb772cddbd3ed25f5.exe 28 PID 1200 wrote to memory of 2552 1200 89c5b369142e8d9fb772cddbd3ed25f5.exe 28 PID 1200 wrote to memory of 2552 1200 89c5b369142e8d9fb772cddbd3ed25f5.exe 28 PID 1200 wrote to memory of 2552 1200 89c5b369142e8d9fb772cddbd3ed25f5.exe 28 PID 1200 wrote to memory of 2552 1200 89c5b369142e8d9fb772cddbd3ed25f5.exe 28 PID 2552 wrote to memory of 2368 2552 iexplore.exe 29 PID 2552 wrote to memory of 2368 2552 iexplore.exe 29 PID 2552 wrote to memory of 2368 2552 iexplore.exe 29 PID 2552 wrote to memory of 2368 2552 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\89c5b369142e8d9fb772cddbd3ed25f5.exe"C:\Users\Admin\AppData\Local\Temp\89c5b369142e8d9fb772cddbd3ed25f5.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b684459f9acde49c23d0f79584139f8
SHA1822a27a3c77017843263f04a53fd463188471ef7
SHA2562bfcee30101aabb2b8f710d6352ef4d8276c1f19da2eaa6a7f45f3f2eb7fd6ec
SHA51239c451bda31983a4205f72e8b295603df59a211d66df8c5478b36a33e870ebe693fb92381fc16f291ac5f66a280bf13c4379522cc7d96be611e4cee78410519c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1dfb51b938ac62897215f769cdb0fb4
SHA18f19bb60b5e37d7e3ccba9cc6ac33e4c3773c800
SHA256125a4fd5cc20444b3584f3950c3a5f7d954e2bf6301808cfb84478a5f339f144
SHA512eee40f87ebddf47cd0c7b922c5391dd536d8817061b4117048943267416ba52d98e95f9d5ce5324fc65cb0f6fa528abb7dd991bb6b60e0b5ac8b4cde277df52f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e36e85c227bf50ca4a34e9040b64259d
SHA1e38bd16b1488e50093b150181ff8cd675e485634
SHA256ee67d7f9d33d3683ce43b69592a57a3756effc743d8511ad00711f64cdbc8521
SHA512247ca87a1fc6eee533a8bbfee0554f976354e66027c9d608ae40d66e2730c647e2891839c0448ce2e574c924da56d96e175b1002ddf1a336d9621a767b7371bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9ad6c6d0ac3c51afe49235a40b068d3
SHA11d399802d1e058a62a87b00c950e7749a1032e76
SHA256c3a080f261bb22a3261f078ba5065addf89cb58893b902d7b19039561c0debf9
SHA5121da354f79faaa20e87362f3867bf6e650c031f143b78c3819ed26292a6c940fe38cdf636a84f3d0dc4ce397765f29b2f51cab25c380fbe849faa90eace50ab81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a5d04bc1286dc2a60a5c67ffa1b4113
SHA18c2651c5bcd4508971a7bbaa7ed3c15699937f68
SHA25682ce531aad3f335971cd1548cdc01f6315922dea58045429221d454f8ae3e72f
SHA5120ac3adb8836963e6b4ec0ee8a59d53ca5b66981e523a4a6792d3c4ac89b72291624605561675b071156c030b8b42dc85cf3b7da31cc7f7e307cfcce795921e4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af46ca3ed365a58a9d25d5f21d9a6fb9
SHA1c0bb1c89db9eecfe1676fd52a2a9c3c0b626e724
SHA256288ad24571c66359b5896e75f7475580c5435f98eb5ca70ebe82341944867fd0
SHA5124b2608745532365f2b356165f6a1e07fc424f779ae2c240f5ee8107654373e86173bdc45e0e0fdda0e21c76b5213a0a02f3d7dc593247dcd1cdcf81305cb8e62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d52cbf6a3065c88ca4602e31a4ceb87
SHA154e9e63aa7b24e1d0a91ce61f5d9e843b173c4b2
SHA256389f9cb3dd9a9bfa3c3cb7495791ce209256441d72ed46af256ec2b323d39969
SHA51267d5f35f3c896ca99e250e7714451bf5614582e61f8cbd8b53b6489671be17ffa51b79482d54cde9365d7388e7606ab3b87189a71a7cfa056e46f45d0d8e8b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577afab21c7c40ea7a84eb87164b7a58c
SHA15c30376108d198baba8f6d6b1b2ee6eb681560fe
SHA2567d0493834e1955ddf64af006188346a7d0b937b55fc404df738c111069554fd7
SHA512644bd6cf844b440ad1c7906911a31ca51475bab8ce46f0ad2442eea2d60fb1e967b182783b3528f1a32eaec5f11e9da4ad01556246299102dffade7505d58c6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501f87ba79846f7bdaa8ef00163efdc78
SHA1e76166eb9b669117b30a9afe76d784f1cee3e539
SHA256076439514c150ecd06e6493de41a6197881acf36d0ee44809e436aa33ffe048a
SHA512beb0d2c1a44e09c99187d5d9932e7be40eed98ba348c64cd6b9b8e0de74ea1d6b81d456543d70d7eb00aeff11053e05fc0ab6b68f4eb346fb2269f249bdb7980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549f7210349013c397911634bc6528752
SHA12a02fb49d16bff1f7a21702ae189b5918ee20b92
SHA2563840ab637134115a49b9f82df9eea89a4bccfcbe59ae5b84d670411c79cfc636
SHA512270c8ce66dfc23e472292325537735d917f2d4ad0503338070e4354c24305fe09de790fa3acd0b3bff6c828516a655ac07407f5ba6aebe276e0b3da8ae5f0dde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5fc207305849fdd1a4a4cc7902fc774
SHA119bc6d05c6074ba8b44099437774fa80f4130060
SHA256efa1a768830d5ccb1d866e8e655bb9a90d62e468c7bb585bb26dabf749935269
SHA512e29249b8d6d5ba617c3816ce4d0a248702055623d232bf73e704847c3c0062afa750df3eda127436b32eb6fa779e3c5d2b810dcab6dd1df633d07808231f0c0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c40ce5d41e0c970f13073bf12facb5c5
SHA1017be8beafd8bd36f740916741409adb568721d7
SHA2561e15c35f8b19931dd3015c57938f0e1aabde94feb5a266b03e6a18973a2b3bc4
SHA512f52faae508396575a10d0becbe93353dfc675ca97c9d3196dc87cb615cd75b0a698563b095bcc13decc29bb3c27c1b2e02d3ecf99cdd2fe7f9055ec7913b78a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5966f0b4a1e05d95f5fc90dfb1013dd09
SHA10030b94f2cf3c5ccec846a80e4936047d4e0ae8d
SHA256418ba879a5b0538309d4f774fd10ccc7c81912c494eb3049fbee573d81103ae9
SHA512c4d4841df36db861c1099f6fb9b152317a2b5665251af35c898759d8773a03a97150ab1105be60a536ae6078f77dca6d8f645df9ef905e7c12ab53ce6917c052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f7346b2ae48c460d495b3901898fffe
SHA147d2118b414464586317b18d40d4923ce5abb3b1
SHA256a4a92e343c3b34ffa3b3a3dfab6dad4942a71c71a7c77867f6c6f8d8fe269dde
SHA5121deaf8adbadc7f20bc193e4b13a7d04db7792abd14794b0b5f09d692e0285ba612bb3f82d5755d0128e3672f62ca14e56b33b0c0755562b634dae706ab35a6f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd16d73a7e72841577975ed9f705ce85
SHA1e7f94c34a5ffc82838f703f62ac1e0cac0b6081b
SHA25623f2c88db75e3fcd9c37c38c74d38fb7d8d1bcec92689f949f8698599dcf2bfc
SHA512abbe66b2e6476d4af394c9c5072813d621ceb3a6c5d8d6df3f3306ea5d5750c4d88241475a0ca6f5dd88f93269e64ecc7fd626546a7d164d458030395901ce4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535e515dcc73a2a3c202cd3aacfb23b48
SHA17e153a2298e25202013a2396911114203ec34837
SHA25684a2e7cd7d93807318228691297c2c509ba5bc60513faeeb02181fb4cc8cfc21
SHA512a97a8b01d1249f811cf73daaf15329ca88002d801a8b0f0c8283bb3040ebaa5f69d13ab5ebb7527a56cc7988e491c3a7f66c17469ce7f929308c75a96247faa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5084afbcaa11c1be855b96c056d2bc5f3
SHA18053d67ab64cf10fc93808ad4b3a82044c70de0f
SHA256fd96932e1ac2422e8fabd8cb4e26a71f35b779ed0df013b52e3bf80870154316
SHA512d553c35bc229dcb44559338f50c90982f238557f617ebde710c816ed6779d56f70a4586e4b046a30f4acca5249008a767272066fa2fc67818be4390c95b228db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589b6f43fd59d23cf28426abb5d1d9884
SHA1b0915abf606e457c183552c05ca4fd2c2b4f5cd9
SHA256e1e5a242acb96136a4ff336ad7cf779d39fc87017fe68d028e87eaa5f64a7390
SHA5121cc4fff218cf01e92e931dea54434fd41d2ead7ad1de8fc24da17d327038f811317aab84d8b604b958c6f3a746aa2805f674de0646186c40798a0e445470c023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f127e2eddd24e6de9d1d32dde4467071
SHA1c10f8c048c02af8ec137010af80af4b258b092f1
SHA256cebe697aba39683a8475e6e1ebf134fb0fc78577f1763117940334a4afc6a6dc
SHA512ba551418cb27b1da871abd2525e53291a52821aeecde4f81d7d9c3c387c3627c708d5fde551eb087b39176b69699faebc2840b3b377218a01e072adcb5da3b3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6e8b23d1dd2fde2ea8d5347808ef2ed
SHA12dfeee6ba0bd7e4caddf977bf44f7ed25a86c2cf
SHA2567bfe6875cbf75f85976426f890d358566f27268bd0733c83b9e90a15190168c2
SHA512e2bb5db61fdf4a3fe00f9fb6183b63c3bef0efbc25c57bda65684514d26c8f6f4df24ab4c49a410ea59a757f161460171e611bfc3549c0f7c062d421014fe854
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06