Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 15:33
Behavioral task
behavioral1
Sample
b50c5c5357394901ba856b0d93d30697.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b50c5c5357394901ba856b0d93d30697.exe
Resource
win10v2004-20240226-en
General
-
Target
b50c5c5357394901ba856b0d93d30697.exe
-
Size
25KB
-
MD5
b50c5c5357394901ba856b0d93d30697
-
SHA1
3339c604e9a86e8d4c648a42ac788fc25bf428b5
-
SHA256
4e44231509e426c10886a404e1c6e12c3d035588bda3940a9e1dfd2282acc268
-
SHA512
4683b98d43b78a38cf48d545df9649de8b3088ceabd6e3be6931a5f488d2f45ddbd68e6b98d2120328e339d4607230f49251fdbc100041e426caee727989ee23
-
SSDEEP
768:Ve/6d2fDN9xR+TxP7TdV/3+yi3JYIxy2:w/6wzL6FhOHJZV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4424 bolivar30.exe -
resource yara_rule behavioral2/memory/264-0-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/files/0x00080000000231f7-4.dat upx behavioral2/memory/264-8-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\fm123.dat bolivar30.exe File created \??\c:\windows\fm123.dat bolivar30.exe File opened for modification \??\c:\windows\bolivar30.exe bolivar30.exe File opened for modification \??\c:\windows\bolivar30.exe b50c5c5357394901ba856b0d93d30697.exe File created \??\c:\windows\bolivar30.exe b50c5c5357394901ba856b0d93d30697.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2113183834" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31092498" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31092498" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416417762" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2113183834" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2156152036" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31092498" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{A98650A4-DB05-11EE-B3C6-6257B05D87B4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/xhtml+xml\CLSID = "{25336920-03F9-11cf-8FD0-00AA00686F13}" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/xhtml+xml\Extension = ".xml" regedit.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/xhtml+xml\Encoding = 08000000 regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Mime\Database\Content Type\application/xhtml+xml regedit.exe -
Runs .reg file with regedit 1 IoCs
pid Process 3000 regedit.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3884 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3884 iexplore.exe 3884 iexplore.exe 4704 IEXPLORE.EXE 4704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 264 wrote to memory of 4424 264 b50c5c5357394901ba856b0d93d30697.exe 89 PID 264 wrote to memory of 4424 264 b50c5c5357394901ba856b0d93d30697.exe 89 PID 264 wrote to memory of 4424 264 b50c5c5357394901ba856b0d93d30697.exe 89 PID 264 wrote to memory of 1072 264 b50c5c5357394901ba856b0d93d30697.exe 91 PID 264 wrote to memory of 1072 264 b50c5c5357394901ba856b0d93d30697.exe 91 PID 264 wrote to memory of 1072 264 b50c5c5357394901ba856b0d93d30697.exe 91 PID 3884 wrote to memory of 4704 3884 iexplore.exe 95 PID 3884 wrote to memory of 4704 3884 iexplore.exe 95 PID 3884 wrote to memory of 4704 3884 iexplore.exe 95 PID 4424 wrote to memory of 3000 4424 bolivar30.exe 98 PID 4424 wrote to memory of 3000 4424 bolivar30.exe 98 PID 4424 wrote to memory of 3000 4424 bolivar30.exe 98 PID 4424 wrote to memory of 2388 4424 bolivar30.exe 107 PID 4424 wrote to memory of 2388 4424 bolivar30.exe 107 PID 4424 wrote to memory of 2388 4424 bolivar30.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\b50c5c5357394901ba856b0d93d30697.exe"C:\Users\Admin\AppData\Local\Temp\b50c5c5357394901ba856b0d93d30697.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:264 -
\??\c:\windows\bolivar30.exec:\windows\bolivar30.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4424 -
\??\c:\windows\SysWOW64\regedit.exeregedit /s c:\1.reg3⤵
- Modifies registry class
- Runs .reg file with regedit
PID:3000
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\355674543.bat3⤵PID:2388
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\355674543.bat2⤵PID:1072
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:1984
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3884 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
25KB
MD5b50c5c5357394901ba856b0d93d30697
SHA13339c604e9a86e8d4c648a42ac788fc25bf428b5
SHA2564e44231509e426c10886a404e1c6e12c3d035588bda3940a9e1dfd2282acc268
SHA5124683b98d43b78a38cf48d545df9649de8b3088ceabd6e3be6931a5f488d2f45ddbd68e6b98d2120328e339d4607230f49251fdbc100041e426caee727989ee23
-
Filesize
202B
MD5428090d84a47f875c8fdd6d0258f00c5
SHA196c029720065ac1dc5ece2a5481b780267d7b439
SHA2568c8668f6339728aebfc08e547f15b0e250f6a551be86f47fcb6098ffe37f0404
SHA512f752bf52b359a5a82e821ee288e11cd4176c39ac3c932c6f44db69780c6e2597e654bbb3a9db9c32f8659d5af66fa9578b5625758b1f6db70c1314369dbadf7d
-
Filesize
121B
MD5bba669b4c4e488f95dcc5acaccbde5fa
SHA1d4b568fb8ca1cdf0efe38d3a70b881e6d1b48242
SHA2563efce31d9197516129b549e0c478fb38ec9cfede6d46e1cc3f039512f2e4415f
SHA512298d78f0196754ece26e45bf280348626b6caff5f4368b4abafae3b467115bbdf12d5c3b1163de241f4198792c51dba31cd81e27f060a3cd989dcf4489f62827
-
Filesize
213B
MD5f5084eceb04a862006d8ad2f7f8488e7
SHA1c49af1aa42146be1c4e0634dfe3eeaf8c1c1d4f7
SHA2567cc549c7c2706fa78cd92830b6d21f276beac37f9e9a7cc3c5949829d1406ed3
SHA5122d9af66a79016808bfb454b84e97ed12bb5609acaf0f980e3c7fd1852405a62aa85de73d49bab29719e04295bd099d71d358aaf9c906dd411761631f5979c6ec