Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/02/2024, 03:34
Static task
static1
Behavioral task
behavioral1
Sample
ad94d60f55a18437f92fbdcae9b5877b.exe
Resource
win7-20240221-en
General
-
Target
ad94d60f55a18437f92fbdcae9b5877b.exe
-
Size
765KB
-
MD5
ad94d60f55a18437f92fbdcae9b5877b
-
SHA1
d54898bab32f25a922b42630c8f7339f7e8b5bd8
-
SHA256
745e4e94c5cfed3c2bd3d1dae2a920e134003abb41f2e115de21ad9455eea398
-
SHA512
fd965a7447f4d5befe9a0c2aaebb33ad26215d9b722f2fce5fbb36497804cab6b7ce064f36435a3267498dc41ef2f3559150d9addd46b484203b3acf072b70ae
-
SSDEEP
12288:QaitwoFKgcZD0OW5AUmV0qayz11JDmJv9O2SfIA5f9FZSk1z4yhMDaq2:XkwkDc10OW5AHVy6vAJv9O2SjN7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2420 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1976 IEXPLORE.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat IEXPLORE.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\IEXPLORE.exe ad94d60f55a18437f92fbdcae9b5877b.exe File opened for modification C:\Windows\IEXPLORE.exe ad94d60f55a18437f92fbdcae9b5877b.exe File created C:\Windows\DELME.BAT ad94d60f55a18437f92fbdcae9b5877b.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 IEXPLORE.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings IEXPLORE.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{187C56BE-C1A2-4AB8-8655-6CC46C1545BD} IEXPLORE.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{187C56BE-C1A2-4AB8-8655-6CC46C1545BD}\ce-2b-31-ae-4c-b8 IEXPLORE.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-2b-31-ae-4c-b8\WpadDecision = "0" IEXPLORE.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings IEXPLORE.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00ac000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 IEXPLORE.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ IEXPLORE.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{187C56BE-C1A2-4AB8-8655-6CC46C1545BD}\WpadNetworkName = "Network 3" IEXPLORE.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix IEXPLORE.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" IEXPLORE.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" IEXPLORE.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 IEXPLORE.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-2b-31-ae-4c-b8\WpadDecisionReason = "1" IEXPLORE.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad IEXPLORE.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" IEXPLORE.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{187C56BE-C1A2-4AB8-8655-6CC46C1545BD}\WpadDecisionReason = "1" IEXPLORE.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{187C56BE-C1A2-4AB8-8655-6CC46C1545BD}\WpadDecisionTime = 7060e42ac06ada01 IEXPLORE.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{187C56BE-C1A2-4AB8-8655-6CC46C1545BD}\WpadDecision = "0" IEXPLORE.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-2b-31-ae-4c-b8 IEXPLORE.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-2b-31-ae-4c-b8\WpadDecisionTime = 7060e42ac06ada01 IEXPLORE.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" IEXPLORE.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections IEXPLORE.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" IEXPLORE.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1984 ad94d60f55a18437f92fbdcae9b5877b.exe Token: SeDebugPrivilege 1976 IEXPLORE.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1976 IEXPLORE.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2420 1984 ad94d60f55a18437f92fbdcae9b5877b.exe 29 PID 1984 wrote to memory of 2420 1984 ad94d60f55a18437f92fbdcae9b5877b.exe 29 PID 1984 wrote to memory of 2420 1984 ad94d60f55a18437f92fbdcae9b5877b.exe 29 PID 1984 wrote to memory of 2420 1984 ad94d60f55a18437f92fbdcae9b5877b.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad94d60f55a18437f92fbdcae9b5877b.exe"C:\Users\Admin\AppData\Local\Temp\ad94d60f55a18437f92fbdcae9b5877b.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\DELME.BAT2⤵
- Deletes itself
PID:2420
-
-
C:\Windows\IEXPLORE.exeC:\Windows\IEXPLORE.exe1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190B
MD598a2e082020424a33bbc56685f510968
SHA130581ea197167d8e99e22a24cc9060e2291890bb
SHA256251ffaa0cc8eee8544e37af6e8137629661e47e827a99476c95c9c41f163eeb8
SHA512e577577ddaf3ff822538a39058d6e3da219ec804f64d9633e80519884f83ff9176bef5dece2292ca37f960487a99d5a5a9bd1faca445afe156a20825ee6b2e26
-
Filesize
765KB
MD5ad94d60f55a18437f92fbdcae9b5877b
SHA1d54898bab32f25a922b42630c8f7339f7e8b5bd8
SHA256745e4e94c5cfed3c2bd3d1dae2a920e134003abb41f2e115de21ad9455eea398
SHA512fd965a7447f4d5befe9a0c2aaebb33ad26215d9b722f2fce5fbb36497804cab6b7ce064f36435a3267498dc41ef2f3559150d9addd46b484203b3acf072b70ae