Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 23:54
Static task
static1
Behavioral task
behavioral1
Sample
9a3fbfc5e02d0821369fd7c346b343ad.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9a3fbfc5e02d0821369fd7c346b343ad.exe
Resource
win10v2004-20231215-en
General
-
Target
9a3fbfc5e02d0821369fd7c346b343ad.exe
-
Size
9KB
-
MD5
9a3fbfc5e02d0821369fd7c346b343ad
-
SHA1
4263a531054f66eaecb269e2f3475779d2971df3
-
SHA256
638a0b8e278b877d4dfcebcee20554592fab6322f98a9afbf1e13d3b1f0be0af
-
SHA512
b1d28d0d04eb5935ea483a57c2b6688d765846b98c718c7e94feed930e9189a1baea09daba25ac872e1dce6780d85b6166ed276acca1e22777e9b131e6cfe071
-
SSDEEP
192:0eNsUWP5jHxGK20Spk2842DGKg0cUB30oiYVyE52y:AP5jRo0S9MGKg0cE0ov5r
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2112 z1462.exe -
Executes dropped EXE 1 IoCs
pid Process 2112 z1462.exe -
Loads dropped DLL 4 IoCs
pid Process 2224 9a3fbfc5e02d0821369fd7c346b343ad.exe 2224 9a3fbfc5e02d0821369fd7c346b343ad.exe 2112 z1462.exe 2720 IEXPLORE.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\7v3j = "C:\\Windows\\SysWOW64\\z1462.exe gdtgh" z1462.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\z3226.dll z1462.exe File created C:\Windows\SysWOW64\z1462.exe 9a3fbfc5e02d0821369fd7c346b343ad.exe File opened for modification C:\Windows\SysWOW64\z1462.exe 9a3fbfc5e02d0821369fd7c346b343ad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "414030326" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{32C66251-CACB-11EE-995E-62DD1C0ECF51} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2112 z1462.exe 2708 iexplore.exe 2708 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2112 2224 9a3fbfc5e02d0821369fd7c346b343ad.exe 28 PID 2224 wrote to memory of 2112 2224 9a3fbfc5e02d0821369fd7c346b343ad.exe 28 PID 2224 wrote to memory of 2112 2224 9a3fbfc5e02d0821369fd7c346b343ad.exe 28 PID 2224 wrote to memory of 2112 2224 9a3fbfc5e02d0821369fd7c346b343ad.exe 28 PID 2112 wrote to memory of 2708 2112 z1462.exe 29 PID 2112 wrote to memory of 2708 2112 z1462.exe 29 PID 2112 wrote to memory of 2708 2112 z1462.exe 29 PID 2112 wrote to memory of 2708 2112 z1462.exe 29 PID 2708 wrote to memory of 2720 2708 iexplore.exe 30 PID 2708 wrote to memory of 2720 2708 iexplore.exe 30 PID 2708 wrote to memory of 2720 2708 iexplore.exe 30 PID 2708 wrote to memory of 2720 2708 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a3fbfc5e02d0821369fd7c346b343ad.exe"C:\Users\Admin\AppData\Local\Temp\9a3fbfc5e02d0821369fd7c346b343ad.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\z1462.exe"C:\Windows\system32\z1462.exe" C:\Users\Admin\AppData\Local\Temp\9a3fbfc5e02d0821369fd7c346b343ad.exe2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:275457 /prefetch:24⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc18792185c0a11dd0eb7c1d2ee4369b
SHA1eecc8316e01deb2534d422ddd7e0abdf1ec2d571
SHA2565d4967fa3911754a647288ae9b98c8b1d2736581dfcd8c2118ac3e420d775ca7
SHA5120b24ebab63a8dc955a280dd88bb13448c102abf70ff23e49215d72919a4640808389ff2169008d263f15015173070acbb8d48b664d54cc076c7448b907376249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fc6b94ed0332894125049ae94bd694a
SHA10370d64adcbee37c9526f5806eb1b2a180f63e97
SHA256bc084e5bbe2ee111d67a97bfa5121d1ece397b92dbf27baaa0d0f9164965ec44
SHA512e8ea1c18d07814d3b080469eb0c4a61f9e663f291680815197fe21a405cd90f6ba42b9e3efbfae947d0ebf372e3c50da0836a3cd31d8c6f163602b4659f37515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53027c76c2da513fc67965316d7591839
SHA14a2325987bc2c0783fb795a6a7c4e0fedc41b8fe
SHA2560b87656fc32e44f10ade660e0d5f7c206e0f83bb887a19113a981479d95fb4e4
SHA5123d70300ebb31df874bbc1ad8a894f43a47bce9a58f8b2bd1c170d072e038b4f4b07439f42e7bf4f8c49316c213cefdb208e17765d0d98d18e373341890e7d14a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5324baf7efb919de93be9075027479506
SHA145a92088f1d42ce76629a10dc1dd38e249f280c6
SHA256b64d2d8bc579dc8a4944a7975fb6c42a8cce6f0667867bdeb5970493798c91c9
SHA5125e634793205818ddd81a18591983a2a998fb09e09dbd6159c6ed24e3d623eddad640df88c2bfed5d2c95dec05247b032edc7a0495dbe4ea9e815b7abbac63b9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ad5a989bbdd3284fd78fae5f95c958b
SHA18a1f3e5106d7071e288e0ccb992cf3e31367bc9f
SHA256cca35a202cfa37eb8741a38a46cf5549d4747d99443e8825c7fd441ec0da794b
SHA512e04b7d2513844464592bb3e17c61a88a4fe5247c1630497eb146f1ce5333483f4b7b679a0b63899a30d5f8a620011c4e1aa5e2fe376d613411a77247a24696fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0bf80a419b1666f2c85e41bc083f9d4
SHA17475781a218e271f94e5cc69e6c9c54d53d8f7c1
SHA256548d507e82eaeead614e65bd081f7c05d4480431b3c2ab4e569214c92da6d84d
SHA5125dca7dafd33d31da10c18c5d81dee3b9bcb21e2da7d83a2e5fa7f461d86c3b651a68a32c1a6ca52c806314bf249fd7318c2eaf71ec23ec56ba711bf2d48aaad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d52d8d431b070e015dfabecbddbef795
SHA18d8d68159c2902639f526571a097e358234eb9d5
SHA2568fa29ae0afef3be1071de2b1075f90c5f635a27f1924a07c33567db54c652bba
SHA512eb3f42b21e16785c8a9b5391833df332fc1c40f68eb63e7be8c050d03b91ce85c8ad94604f7af8dc5ec57311704c39375df140e066db9a514889a754d1e0d472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514ba486c33014fd7384032fcb18230cc
SHA184733ea086ff3d02024fb98082057adfbc835c1f
SHA256aa8f2e4356c9237889cc490588d98432bec5da504ed7e1b60de9a2fae7c96bc8
SHA5125d225826db3e2e7a8934d4c74e5f928a69ba30e8ff99b393fc9ccc4ec1664f68509f8fc86b40423c1f3ce522d1d7683cae45faaf461a0e114395f74c57a5ee65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d52aac085a92b6a3bef7db88bcc8b0d
SHA101d20c502840dc6a911b0273e774a0e5d553e673
SHA256f16bd48256b9b1bb2bc9b0e684af611889dfb29f6c346ee83bf1b47755cc6634
SHA5122249b8c77a4183d9e83555bde318c8226f29f351af26611243135ce16d6a03da5580a5032f7ca675e97e56f9a951f32bf9c597895085081ca6003107b3058b38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3588c6b4a7a9f893e17b2eeb50e7e45
SHA11f45b26b7bf78169c41e461ca9766e3d110cad05
SHA2569e3f4f03d1350dc8ea796e8e5e7da8c5b004cb89d15a003dc7885af31855196b
SHA51265cb5d195d2fc32b94f8c73da440051333a26fb0d79de4bf32c17a4422e8983b3e994c060ee78c743059bd161c3c83f45173beefc475b1c7edda62798c34ed26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534084fae30dd0bb131a5fae1af34c293
SHA1a731bca5408c5a4842ae589fcaa4393a31038c80
SHA2563888e3dcddc383470b217f43f1972c4448409b0c4e53b5a3524c038c110ce995
SHA51274a51da241606a1686bc13e35aa21865b2902bf422c73bc63ef78346ea0bcfa4ac9c2ecb64a789046230c27a353190cd2f21936c0b5bad208d76087d4561fd05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52daa438b774b7237f469271309739795
SHA143a8a8339552a12c29f9605838b3a7997958b421
SHA256112500ef5575c9d467886a96f4004967d4249e98e9c0ccca2e86f4fc4cdd03cd
SHA512b7345574c52fff6aa004a314f4d287552b7b881d8efe7e22fa64954d91ee0042ffeb4eb2a99d31706d04b8123a61831dbac108dfc56527a732d45d394c09eca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d842d34106430ccec1b867d402f3416
SHA11b0d5be26a484cadb09993f78db0a9457ddd78f8
SHA25680bc27f6cfd617373ae55c6a4bc3581046e49b15876147c9a18155d6678a71ac
SHA51247d24db6fa07f59d97ec26279809b407b2ada954f76d9e9fad635306357a70ee778af738dc6928c290f207ff99d181a2241a241b4dc298de997dffd79de18a5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b27efa18b23342bf2f2c0738839c77c8
SHA16bb7780a1166a8bbbef5a19040c2527cb25f2355
SHA25695344d5f3c7ee83761900617a0808e659dae5350b4fd1dcf8208dda981e8034f
SHA512511e96c723b0015de0285e5288a0a4d686ef5e765ab1ed25f7c72fdf39658984870b8d93e5e3184ce7c1c42496f738896a9d38a52ef87638c96ef45796f6e2e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b211ec72b9a65bb41cae77a4550a70c6
SHA16d6b5f7bfcd70966e10dc7dacdef15d941bde0ce
SHA2563754ec47451d09f05c76af5d5af3097f8c0ce05cc01c6ef477bcd68472429762
SHA51217dcff895002a2216ac7c4f56a337ded457e6d57ae0b4a5a9872c655163f72431515aacc48a628ad12f924b1b9de35480a232724e52fa143641991afadb36f5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4350ed966b5658d0cb513c77393ccae
SHA13955ab33a38236df8e9fbfdc56618c23966b92a7
SHA2568a33cd5c66f65a53d6413376c6ff9a94794f2919baba8252880ac53642a83d14
SHA512576d6c45c8317cf194063b32be212c6be30868c2fe973e71264c4fe4740544414ade83eda3798dd709ec7a238efbe9b7f2d44fb26d32d3acaa672ab0d9bb7ff2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
9KB
MD59a3fbfc5e02d0821369fd7c346b343ad
SHA14263a531054f66eaecb269e2f3475779d2971df3
SHA256638a0b8e278b877d4dfcebcee20554592fab6322f98a9afbf1e13d3b1f0be0af
SHA512b1d28d0d04eb5935ea483a57c2b6688d765846b98c718c7e94feed930e9189a1baea09daba25ac872e1dce6780d85b6166ed276acca1e22777e9b131e6cfe071
-
Filesize
20KB
MD562d2087d6cc0b95a23ff34b7a4d1e25d
SHA1355ade49790486576a51dfe7ac4267ee6c647a23
SHA256d1f216d36f66511c1b87a206226bda9519b0be9ca6db89ddd2ec1f9146adceed
SHA512c0c9f37aa4a34cbe220a08a4e85989ef5db918907be962f3698b04dd77207b2a7c3482574ec7dfbf4bb67e35227547e0cb4d57c7b8b7a6dde39abb9076c2e29e