Analysis
-
max time kernel
65s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 04:19
Static task
static1
Behavioral task
behavioral1
Sample
963b37b4582bc3f36021b801338a8363.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
963b37b4582bc3f36021b801338a8363.exe
Resource
win10v2004-20231215-en
General
-
Target
963b37b4582bc3f36021b801338a8363.exe
-
Size
14KB
-
MD5
963b37b4582bc3f36021b801338a8363
-
SHA1
285000b5160ba424e8f084c37a7df99f6e9833a1
-
SHA256
06fc1779292668a9d5aa606e5d3c06390bbbffccf24023be28a522e182ccf36a
-
SHA512
63134930f805f80af94cf8220d609359c0ab6fa015ad1370eb32c2936fa8ba40c5aed253d788d961c945423ac64521249835f43f12100b78038ba0b059cb54f4
-
SSDEEP
384:+7Jn8r3JUv0YLq14ukfaX1tJNNnU/s7U4:QJn6ZUv0RkSX1b+WL
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1026dccb6a5dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F758CEB1-C95D-11EE-94B6-42DF7B237CB2} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000d62b68532bab9fefebae8e5ecd63f969f0296723a106513b6a177441a13dd0e8000000000e80000000020000200000005f7f049bc3f59ec29a54c1a1af986ef50b83d4521b66d19b3221d2e9bd5202f020000000185dcc92e7cf610388576b99fbe97966536384da4d6a3ef2dfc585c3e3df051b400000009351c3a355cd81a2c3999b5983a19fd682a432167d7eb53a8eeb2b63b8f2a46a3668edce40a145c57b9d19260398d34688d670a6fec45bf41bb8ac07afa0eb53 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2268 963b37b4582bc3f36021b801338a8363.exe 2268 963b37b4582bc3f36021b801338a8363.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2668 2268 963b37b4582bc3f36021b801338a8363.exe 16 PID 2268 wrote to memory of 2668 2268 963b37b4582bc3f36021b801338a8363.exe 16 PID 2268 wrote to memory of 2668 2268 963b37b4582bc3f36021b801338a8363.exe 16 PID 2268 wrote to memory of 2668 2268 963b37b4582bc3f36021b801338a8363.exe 16 PID 2668 wrote to memory of 2840 2668 iexplore.exe 18 PID 2668 wrote to memory of 2840 2668 iexplore.exe 18 PID 2668 wrote to memory of 2840 2668 iexplore.exe 18 PID 2668 wrote to memory of 2840 2668 iexplore.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\963b37b4582bc3f36021b801338a8363.exe"C:\Users\Admin\AppData\Local\Temp\963b37b4582bc3f36021b801338a8363.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://a.doginhispen.com/149/in/htmlg2058670254.html?cid=51094673&aid=10381&time=2058670254&fw=0&v=149&m=02⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508b227c5f776cdf9940c9a9ca2825ae5
SHA19cb39ed9be81629abd0f4c259bc8e89e5fa787fc
SHA256ce6a50dc9cd4f42e85ee103c0cf533154703a01b6f7fd47d8fe19685568dfcfa
SHA5120b406bab93bd3ad22a824872a772a43611ee73384bf8e0a7950475a9a5a7b543147dbe8600d73d9e529a50bfcecc8df4150afe4cf90c4a6dea7c194b901f4731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8d1b4c770d025dcb35bcd2e8b716a06
SHA1e12fe67ae8a3a19f281d3360b1e1fa1bde725bb1
SHA25647574d6b94d075dfd5223f3a1c73a061399b793f824f787fb70d9e287d06f06f
SHA512a6ebda7143a814fda60985228de5f6b4fdecf51a0a18d0eada9f43e40407f89aa262ac7e803b1a1d207f9f1e706c67a7f07c5159483397ce86fee0dc72ba00e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ce90f14b7d795b46e79f4154c768ecc
SHA1e51e9504f3b566d7923fd5ea254ac05bf2fca59a
SHA256fca44b3bae772879140a0784b870620b2656b99292556b75ddf8c68842918c3f
SHA512cbe55972fc2fd41a4676bb2295acdcf5e0daf8b0da14e7033c73dd0303a1229dbeb3506e5b13e489219797181ac073fda6dfd159e4a93b2abe3ceb9a30d25f6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1fe8a739bf6f0406bcff461fe54ef70
SHA1765a2748dc6bb088f1243fdf87a6109839e2c639
SHA256ca707c16616ef4a56dac7389e8160c2ba629474aaca713440b0097a30c9c98c2
SHA5126c4b57601365335026aae389fd4aa0f70a773085f0ede83fc48e38fc3b0622b04f5e0ddba24432fe34f77857e4c0985e00724b6454e39eff8ebc796d8cd5da8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c44d27231cc2474bce2dafb7f45946b
SHA1876cba5ab1b5e8121d8d16a3d6439c93dc24367f
SHA25691802f195ca25f5e27c8839bdc5aa14cacb74090c6d0a20aaa3d0f7efcf057a6
SHA512d26b2ade4c78417c4c575eac29fc56a15003fbd430b38bc094d6f06e99537bed1055e2cbfde4ed76157214d62977ac9919585cf351ef7254c37e659916a1aded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ffe8bc873d4a9d67fa0b6347cdde6f9
SHA1788d7a8ce0ca38e4b2dd5d6cc75df03ab1f8d8cf
SHA256c0e5bbbb6664b751499b77da74b9ff7dc05d8b48de97b143d299933f6d005493
SHA5126963e40b497fa71302e871d9bb2048e818442d8d68c4d1800589d50dcc0efad76c7fdc76a65d722ba4a1ebc3f76adc7bb07d4ed7ce104d36a05773e79e2928c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5697eb79961e78f49d2d9c3483081dd1e
SHA10e8d9440ecfbb9028fad22860b09242028a14d50
SHA25644f5f5110fc6919fde4b2cce61e51f9436ae39d1ec3790dd081030ef803c9fe3
SHA5126c6bdcfad17ac7a6b7e43097bb59523d00507b2ff53d1beb8cdc23ce974985d0a220ecaf81e356f16270b4b4866d0b0df4833553cab4272d3c83e90d757a9599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568050798699b5428db540cb2fa178ecd
SHA1c4a02a69559fcf84e0dd20ceadc6d857a6739237
SHA256dfc2164383a7675f0f3902fb74b2df472f2d775b3754b832dacfe4a5594a1d8d
SHA5126768f5ef104bfa3439a385c618cad426095274892c848b76e298bc111c15176ef86cef49378b39e1a1130fa7ee9c995c186acf111ad0b9817dffce1e4ae2ec61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5199e7d94e837cae808963a6f5b40bfeb
SHA1dbbb8c0e1ab77c02e4d2a0bd895eeb79908d1497
SHA25632032eadafd9f7f3225a6315160314f4d6452a43f45c4c666ef6a251456d6032
SHA512aae405b0e55180e11c113de2142730ee4a456892f41336dd5b3e8c4fc9c97f93be4b808f51dac90feccbb42760fd18af1b52f9799e0dd45e32d81df0e6d74693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553f66d532e47f624838c03b0b8792220
SHA1ebef7e7f6d731a636ae9006e8d077ce1b36cf27c
SHA2567c7632e9310996ed8f9fc486104f18c66fd5e1df5afbc9134c5753ab98d8ae98
SHA512615311a7378a38192700f153df53e55102d1162a7030b0d9d153d76fa287bd7a46605a89fb24677fc034671ac18a911be73340cd32ced26f873fd8246a0682a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adeea03842502748087f10e0b27ad4a7
SHA1e92cecda9b102ef3aea9d4ed7d3fe7c6c5d710fc
SHA256276e3de4a6b689c2bff87942b277a91ff0ba4ed4b97cc3b47c58a9d0f41dfad6
SHA51245fbd796108611779691bf3ff2cc8359b7a15ce3efecf1dfadbb2ec58830afad09011cf60cb970184ffb453d8d6fcb5d929ab8c42071a36cbb9890600a0263bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a7463f8f2aa8166e407b8dac9948abf
SHA1276f81f35b1796fceb785a2697617e036c2ab7c2
SHA256478096e2511f75b15db8f2b80c42c3e476247b37417386809d9dc1d167f8d60b
SHA512eac8b0695c5a2ed78dddc8365d1183f92cf1e9d93f25b30188925f9e9b05015ee854a464ce7cf3efe4b0c56db2a7375e6dc9e74d8ad0d14a68650943716743d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b85ddca61918d4bcc4292d7717dc154c
SHA1cd4a98cb37846ed14d94f48e0314277aea8538f2
SHA256d6e2fbc188980012801d00a17d88807efa87646720cae251862781a6dadaff03
SHA512f885182ded8ccf8ebacbfc1f54b2d071c0a91ed05ee40e4204bc86c27a86d0b4990370ad70d97598a92d951f2684e15fb54be1d7bc5789f7365d6ad9d2f1111c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7b9e83e8ce46d7d8644d11e2ae3df4b
SHA14b4cbc8e3fcce2951d31804c79c4f4a8a6b1e4b6
SHA2565ff33f3709bb5acc2f360b5be35f946bff4d1a148444c79b1238567a027997ad
SHA512950de24d3cba494c99bb96c2cf83deb9054f68a69a26bdcc1b1af7e1f11f4d0e6a61cbd11d64fb91f07e0c72e619ff9dad8afb99ebed8332d99201e070462f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55797740f6ac8ac5102c06152273cf937
SHA19643b044e112a0cf1f5fe43be7838bcb5aea3508
SHA256dc3f6e2848178d90c7776fcdfa15a68707c9d9d348d472ed2eeccf354da60cff
SHA512c8b9b797845e7d3d0e1fa3bd2b337e3507e67026e8c44198bb4f62fe7fefdd6d969feb96b077ccabb8a47f9d7c52047cfcd2fbebe8b1c30a094477aa79d402de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c2595632c808985a1d193496677b91a
SHA18b03d6cdb074ee26d33c324d72c7a6eb49cafaae
SHA25639eb5e356903f2b7079fbb1d04d61478989c4831256b750c31577148a06d762c
SHA512749de90bf347ec5c3745d446842c004b28b1005d95dda4950e42a2bfb61b0c8dde830ea79f186501e5c41d5817d3bf7d18239451eb317961bee580c5954c37d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c266984e4bf97fb3b2e019d459d764ba
SHA1aa7bab0b07e6bff072c5e81242ecd014a0ea091e
SHA2563912007affde14eb8db7d22e629f3abc9a6574da1a638a523e8a48cb6f08c115
SHA51223aba39f0181e782840ec69fd25c6e6c54da0f66b3c77f6cd71f4a868bc6b305575f29d84deba1221762421b1a5d6ecce56d6bb12078385cb23610ab6f21cbc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bd14e3b2797a475a9c1feb47a55028d
SHA12bf13141186616f6b26f9f8dbe05a6b0bb295a74
SHA256aae40d131e49b90db0fac91f7f5ce03222b8f3f1ffffec2182d8bf7233ca2005
SHA512961d815282ca03765fe011f78ce26eab6417d06663f863fbe26432e7cc9a2a7d856a9a1d4c934db7658a5df599d9650f9ae512da3ab329250b61f14aa91a3271
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
34KB
MD5edcb10e9e6e0c28247d301079826192f
SHA1a3d7285901bd960f93d917f31584d39ab2edcc3d
SHA2563e41df82f4e9c8af988ae4eebc30009c2b9d11a3f01905c4ab24fe29e236455a
SHA512c7d1e38eacd06fa2ca0321f85583a5e87618d8b9d96865605225432ce6256644feed8009cb360178ba2288408d8977667fac4e83de27a925918518649c601fb3