Analysis
-
max time kernel
120s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 13:34
Static task
static1
Behavioral task
behavioral1
Sample
a1fa195157acf8b260428c5d9e8eb8e1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a1fa195157acf8b260428c5d9e8eb8e1.exe
Resource
win10v2004-20240221-en
General
-
Target
a1fa195157acf8b260428c5d9e8eb8e1.exe
-
Size
22KB
-
MD5
a1fa195157acf8b260428c5d9e8eb8e1
-
SHA1
38ee9fb2506bcf65883b67c430817d6dfa4abacb
-
SHA256
a49dec630ffd52a414503907c0807d698c383bf3ada0e2a36e2c1da9e5ded14f
-
SHA512
7e01b96bacc0edbd142791c8b87d618be60f3fc016e4f1d082efd566453c1e1c366de3e491b5ed55e9f3ce31d7287f9e29e3ce74bdb27d64196a8d5546196473
-
SSDEEP
384:3sPBkGQ1OkJeJOF+tKXuLJt/9UGOLMTxKBVkgTRDmBKD:3qk8KeldBOAwBVbRDm
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94d2d3723739f48802cd6414eea5c7e000000000200000000001066000000010000200000005c94621abdb1c85fa068161b6f3044cd4bcd070fd97b5206b1195d5874a9fd2c000000000e8000000002000020000000875d8aa6c27d58cfd69c36e841d146867a10d77a6cb5f8ba4b9e20575df20197200000000c75841e03ebfb2217dd04d93dd0ccb29193bdfb5fb6e0334bb33a27c2c063e840000000b095d1e9169a84aea4635c164c77329ba1d0e82b3ad24703bb155dc765e26dd66fff4fd576a04cd355d69c1641b6a8aba420e6be6e551b01497adbbc20b52b2a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{709C80E1-D319-11EE-8AD9-56D57A935C49} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "414943541" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e04acb452667da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2484 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2484 iexplore.exe 2484 iexplore.exe 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2484 2028 a1fa195157acf8b260428c5d9e8eb8e1.exe 28 PID 2028 wrote to memory of 2484 2028 a1fa195157acf8b260428c5d9e8eb8e1.exe 28 PID 2028 wrote to memory of 2484 2028 a1fa195157acf8b260428c5d9e8eb8e1.exe 28 PID 2028 wrote to memory of 2484 2028 a1fa195157acf8b260428c5d9e8eb8e1.exe 28 PID 2484 wrote to memory of 2652 2484 iexplore.exe 29 PID 2484 wrote to memory of 2652 2484 iexplore.exe 29 PID 2484 wrote to memory of 2652 2484 iexplore.exe 29 PID 2484 wrote to memory of 2652 2484 iexplore.exe 29 PID 2028 wrote to memory of 2528 2028 a1fa195157acf8b260428c5d9e8eb8e1.exe 30 PID 2028 wrote to memory of 2528 2028 a1fa195157acf8b260428c5d9e8eb8e1.exe 30 PID 2028 wrote to memory of 2528 2028 a1fa195157acf8b260428c5d9e8eb8e1.exe 30 PID 2028 wrote to memory of 2528 2028 a1fa195157acf8b260428c5d9e8eb8e1.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1fa195157acf8b260428c5d9e8eb8e1.exe"C:\Users\Admin\AppData\Local\Temp\a1fa195157acf8b260428c5d9e8eb8e1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://cartao.enviealegria.com.br/index.php?step=makecard_step1&ec_id=8900&lang=2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2484 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2652
-
-
-
C:\WINDOWS\SysWOW64\print.exeC:\WINDOWS\system32\print.exe2⤵PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52adb290ea943158dd8f0cf20e18b770f
SHA1582e327af8b5b780f416ac846ad0888bdffba3f4
SHA2567e96d0a300b5c7af9b38718d2225668f3eead401662e0b564600bf8c34aea27c
SHA512c294fa7c4a25a9c9fbd0b7cd7c0f7726bf81ebbc5bc84779a8ee9988b12db55dd17cbbed699a89cbce6451ed4a270e5594e3671a6fcd23ea5db8822f3d05b4e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d798f9252804a91e6af2441eb12c88eb
SHA1fdd1dcc36408045237c74ed55e08219b922ba7ac
SHA256938dba15b25af0436ed0546f366b1438903afb1471cc486f45cb800cfa742de0
SHA5124d4d6e38eed98ee269f447d95018a11d2aa86d34dd29b8805287549be12d57dd01b51a02a7a100f32cbab70b6ddc76e913fea3b8c022e8de297dcf53f4fa743f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aefbb8562b1df86849bc765193565112
SHA1f3bc776be081b62e5226cb4f5d81d71c48bc70b5
SHA256286fb259266c8ddf530d53b1da256948faba10ff6df6907cee71da16f13e1d42
SHA51299ecf9fd36fac432042328ea215be99f8e6ab3b4171bf0f73936b2e9f82c2a5ef5b12c4c3c4623491671723b5a72f21836201e3151cac6a33f94d8e99f3d2ff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5610a9910442665555fc1a1d5d9638bda
SHA124e22735852cfe4fe7805b466de682f074c26b04
SHA256ff23a56ef30406e415f470c2dda81821fe05e78148ccdfef8828ef6f9d0c5d12
SHA512ee79d6835de3cf73ad2920098d5202e1105d0897d466b81c40957e7b72a2af5ea3ac5be0113b7b3344de01256fe9838b9b0229d27ebe36124acb3b92116c1d24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b35792307b242d14d12b11f94bb673f1
SHA1c3c3eb9fea1f85878f1d3f5028052cbed7d29761
SHA2569926d7207f883424a1391aec74fa6eeab29e70530951beab3cafd557bb3b6ce9
SHA512a2aab69ceee751c52ce3670ccb051a991bf3161f36b6b8f3c87cbc91ea8753415b0a9b5a6318fd2dd61483d595e6ec0636fec315b22fcdd3718fffa61434c66d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc13246d323b6b8a6e46d7aebb6e76c9
SHA1845f61df9712cbfb0c3992870f7359264ba0ca25
SHA256b20bb8fbefc6213bb7100649d13fd8909a32e09bc233a4c335d5017ec81e2a08
SHA512d071e6f8e8e5fb0dfe9753980b897c6cda4179a6570715e933853917e142c5988c962772242f910460f470bcc027f15de300d494ea6bdc400c2a1417547a05dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d1c2a13569e1558ffe5cbb06e19ec34
SHA10dd2a32569ec4785e1febf595c233193fae6dc4d
SHA25692c852ce18a75f18e02aec972722e5ba0f59633594668a822d416fcb415cbfef
SHA512685702fdd24efa02eb2ab7ae316c13903e63be095bf71362cae46a8b312ce20d604261fe4a30e8cd89b2e635bc59c6363e37616cc96049fa60af50474a1137d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566971517e542eef6f8dba716469e00b0
SHA1b9542b51b6ce3077c963eff501e6511be832ddca
SHA256cc30764a5cb4b1a882c8029e55895a21df939f76f81e684c181c00db4c390429
SHA5129e69b76eb1cc328c2cd333d3b62330c6f700668795773708ee25d8d2c592f244c6d7a9c9c0b5242fc98fd18238426175860b16181134a34a9fc63ed2d08e67c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582c40634a45d533a6e68823b5927c14f
SHA1dea687c7d60e7eaf6bf6581116c19cea3515e59b
SHA256d38d36591aa5319a757217d027df1e1ddf0afdb21a355eabc18577f0bc142a07
SHA512b9477de85c1a367a7759986a28013cbe7c68526a8b62206ac9851bc351a528fe1fe2c12cf87f45a9243fb373ceb1f1eb1276c070d29b0b9ff9182404af9d2fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5140ec49f358915bb21bb90ee14e90c95
SHA1bded8383d8e06a06f0cfd603f00738ae0c1dcf0b
SHA256f4fdf01ad4a02bf574e202c18c6b72fd804fa8b6dd80735d7cfc1ccaa1a9692b
SHA5124944ad74efadd34a1306810d16c0efc4e35ae9bc3897ee58841bab391bed86ca2ce513fea156fb223f2d7a3e382257c340faf5d3d6cb02e8276510b522451b61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ca8b4e49e1c695a284d3010eed02409
SHA15c068a357da2d6e6ee72569d524d943534ab5529
SHA256bde953b754b28a3b10ddc1a7523397fdc41e06cb2b15f0c608fe3449c2f0f211
SHA5123d67c0d9e80579961eba2661cbde63a4b534891a4fabaf1e49c490ccc45df94bc4d60f389b008bca8f56083ebf1e17872fb60d0b2eaa21c346a4023c68956b35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c140ae7845655d10a523af23aead27f
SHA15409c8e6255876e1ed2dc001f81c695b8e6be531
SHA25689cd3f3713c2de39b8abee35b93f21a3ce0a6776ebdc6d569ca0cf378d9486ac
SHA5125c8856e05412435959a776aa6ad7425dd57649217aa91ac9c05d4f95c0a837ddb5031fe9ddb30529682d7bd6bdf0fe5a4eb30416f0751d9bbe3ba49dcf9cd330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cfb1b4c3332069bc9bcba191febeee3
SHA1d8fe679286eaceca7e36f7df97112da038448054
SHA256c332b0fd5a8931b953fa623bc612e7c82c2642a63b889b438dee53cf54761eae
SHA512dea472f15db8cd8a392551576cd852c46e0014529fe5f94720876e9ced4730dec9fecfc0e89a57084858a1908c4c49f3038d492e6e1b0b3af679d768efceba5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3cd0e71f5bd632ec9148416bbc009c6
SHA14568d83af1b2b4aee3d41f33c92fa1dd0c3c278c
SHA256583288babf5e5f56c09875c6ee9592fa413e1a4f4b1a2303dfc8617b00a0c4d6
SHA51243427529e3dcbc515204ce87539ea32395a80d39d492d8444921a69ee890ae09f13c42bc6976ad67ddce425d98c742cc073b2c91fcf64b72a31f6fa883b5d36c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c53899201509bd420245c6b5f92452f4
SHA10974fb926ab77f1244e02d66d3e970f97701b04f
SHA256eaa608fa16ba23353b7932681bb394b7b09bf70bb9e9df4cc5d7f59ebecda8d3
SHA512ecc66033d086c6e8166884dc6c7adaabe8abb14dca7b8b049be4a74b7a1506543738a10947023e533d8b8db5be94f06e81780f0513f6ebccca6cb40a91a36c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a33eacc40f5ea4b8c0ee48a44f28f865
SHA11b1d62e70ed3c683b2128fb09505ac4b865bb405
SHA2567b6acfcb72beda913780c2dbdb6920c2f4d5eeb3f49efece186b56a5d193323e
SHA5128414f8a96a5e4ba5239e1532e3709b2ce6ee1b2a2830a5413ba1ca9010049b5d501d9708bbe182817e8b2f7d88d20bffa4e882bd7ea4b18baff47c3bdc3ee0f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a16d3824c7d8f920794d32c149b7f3c
SHA1dd49b252907cfcce799734a6cd4544080d7b7c95
SHA256e20feac55492660216fc8e140545b450b092976e48f705720bb84e2c07b190bc
SHA512b8ca6b22df78783b90c651e0184d185f600cbe2904c54c05e81e30b2a84a1d32ac5d223d92ed620d8d5ef60dc105870ae79213ec92a69ba635ae534ba0310b44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517cf203560db8ae99e27755466ebaa78
SHA12ab63ac9e7033a9a339bea69bd478daaa8c51367
SHA256bf05a5ef4f10c3720cd41935abfb7a78a31d8af2c98b2c7578eb8bddc760959f
SHA5121dc31c8a7badef1b0993891d12361197aee00c8061cf68e549556b013beea5bc50927c438ba4e6abedd07d4a9e3904ee32eb5f4f45448150cbcc5c7989e3a208
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06