Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 18:21
Behavioral task
behavioral1
Sample
b55cadedd3bdd4bf56ec4069b607e1cb.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b55cadedd3bdd4bf56ec4069b607e1cb.exe
Resource
win10v2004-20240226-en
General
-
Target
b55cadedd3bdd4bf56ec4069b607e1cb.exe
-
Size
62KB
-
MD5
b55cadedd3bdd4bf56ec4069b607e1cb
-
SHA1
34027a7dec7a059973a4b5328c1daa5b9ae904e6
-
SHA256
dd453adfb44dabc2acb72e544c044202b31925d19c58e9cc4f04412e68c32f2b
-
SHA512
1441c2fde57708ed326392de73a94c5d751ea7131e59feb8036f18e4a2154903d1125010c3e137cd3e4c52f30d84d63ff6377a25684178db95a5d0863df6bedf
-
SSDEEP
1536:XPcVo6r7S/rabbz1RkdOwyJdEWyxFcP/+Jnouy80QzS4nHnLvSO:47cWbbzvkdoJd+LcP/Sout0UF
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2416-13-0x0000000000400000-0x00000000004D5000-memory.dmp upx behavioral1/memory/2416-148-0x0000000000400000-0x00000000004D5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415824788" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000dbb7fb428cab0b892bc77d93d60f5be4e270a33816410bf36f9723bfa121f09b000000000e800000000200002000000095ef73267e5e1364fab62454a12fa4df0c5a27e3f7d2ad5b7d7b3a5a84ecd55020000000c21d541e387c225b31ff49e889ca84f1bd6e7f7f3e767540b7fd471f81d693714000000015ac0435d0d2f48628bffffe7fff895f64360641ec68f891fa0d997d7972951b1570ff0799f6024b86fd57edab0192abd7fe415eb7588d196866f858812599a7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4197B561-DB1D-11EE-B33C-C2439ED6A8FF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0172e162a6fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3004 iexplore.exe 3004 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2480 2416 b55cadedd3bdd4bf56ec4069b607e1cb.exe 28 PID 2416 wrote to memory of 2480 2416 b55cadedd3bdd4bf56ec4069b607e1cb.exe 28 PID 2416 wrote to memory of 2480 2416 b55cadedd3bdd4bf56ec4069b607e1cb.exe 28 PID 2416 wrote to memory of 2480 2416 b55cadedd3bdd4bf56ec4069b607e1cb.exe 28 PID 2480 wrote to memory of 3004 2480 cmd.exe 30 PID 2480 wrote to memory of 3004 2480 cmd.exe 30 PID 2480 wrote to memory of 3004 2480 cmd.exe 30 PID 2480 wrote to memory of 3004 2480 cmd.exe 30 PID 3004 wrote to memory of 2840 3004 iexplore.exe 31 PID 3004 wrote to memory of 2840 3004 iexplore.exe 31 PID 3004 wrote to memory of 2840 3004 iexplore.exe 31 PID 3004 wrote to memory of 2840 3004 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b55cadedd3bdd4bf56ec4069b607e1cb.exe"C:\Users\Admin\AppData\Local\Temp\b55cadedd3bdd4bf56ec4069b607e1cb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1536.tmp\×èò äëÿ Ôàðìàíäèÿ.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://bagiformandia.in/ts.php?p_id=16013⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3004 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf7a3c7bfb2562c1faf80c0f63d5370b
SHA124fdc15a5dd6a7cfbe26ab0bc88528ce601b0e67
SHA256cd51313a35277ecd3c1cd2504c6b9262ba75cb6d2c67bfa6044d0db3fa994fd5
SHA51236ee81107dca53a6d4335c6e83d3cab08c5c2239bdaf4df7c919d23d34c60be7709cd5af8d27d4ae8bac2cb112117d17075bfbb6cbbeef8019f690eef4b87df7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ea659e6b430c8e25d9dedfdf3595241
SHA1a30fe46f8c210246d4a2001970efaca3f9c9f9cb
SHA256be44a06b2b0be467793e0eaa3fd82cf23bceee4a3d9773bd20a0866a7c8b3348
SHA512caaae2b76c282e4b0f9531ea0293e81f3678afe15a56d7f2fa9c76305dac00105439460c5ec600798614a6901074ac108a2879ed3bafd4fb145cd185d0570056
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5644c93760422070ff46bd809b35ada71
SHA1e2afa2f475789c580f6515a572c5fd788106bbc1
SHA256908417e71b47e8fae33cff2323bd1dc35b3ddf4e5c34a4dcf03c6231ded82bc4
SHA512a62294e8e5448661cc84b47f02580fe0e7b8811a8f4ecada0bc5992a0247d6b97bedf54a9987af47860c1359d68771060a905697d0539491e7e2996f9cad6000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58089d0ca174e802cc97e0bfd020d10fd
SHA1a3bf4a5cabaca5a0c4e18f674ad6d05eae3456e7
SHA256982b7cbbea2b286c5d061a55b9449ce01448a580b2a5025ca000631bd2d44558
SHA51293393ca9de4ea3c0f7fc5bd914e94a35d2689527f05a79c26563f1f0cc18c4a2fa36a820f832a55035a2b0a705d2ff37cd8bcf5c902de3f6deaf41e8295485d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d82cbf189450c2cf3915101ba36fec1
SHA13bc72681476cf2bdf2c9b7e0e6f850d95c3bfb92
SHA256aa29fa54e1334d920650c290b6c52bba0f47009532d2664d931ea811a2fe926b
SHA512ab7fab5135d1c0bcb97cb51daa29b4d86f31a2b97a12058f35d50e5203850d49934b0ee4d76eb94cdefdbee027ee63a99054e3698033a0d64e58c8608455f4e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542ad93005dded0a69e395df8170d4b67
SHA187de83688017503530753cd6de7f244f78bf3ef2
SHA256bd46842fe9c2fe716533008db2fd012b3732784bf10f688fbc4dbeb1d5469b28
SHA51254ef441a3e45c583ae3007b90fb3e72e167001d679a700e5c1207c707dd9a65dc0a42c95d1bd0f5443a7ad2a0d34587e8add2eeffc2743c805bcb28f6911e87d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c11fc8efff8f1706c98a0066b9514860
SHA1c84997338a477f8845053ce490e744906efb50d3
SHA2567939c7ef32a83dce4ee2c59c7ba3540a169f677d32ddce5a8712aa9a40d3adc6
SHA5124f80601732559e456d70a6923f85e40782675ce244f6555772578ea28da523118588ea47a50705ce92d48040d2df5a4a9eeb918afdaa6be94e56c331cf8b97bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5989cd7e59665c041aa6ac5efad6c62ef
SHA17de096b0491b38ed4f6ca8a5ab652e17be3d4f30
SHA256598ddbeb78f6593d3d7e404a076298c7329779adc8213b9c6470474654b75233
SHA512ca3939043267c48d9e87c31c3313d4f7a2df8fd9b552bb814fdedfee74a22ac029be4a2258e0ca6f43f9ee1b7b79ad4249f8e87589170539b5892f114508d63c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4d900d37c8f1113e3540bc219d3110f
SHA1bf2384a1f9e12f593631e1d897cb56f81e3f7b4f
SHA25664b8a09f081290b0c70e93a7bd0973840f9d6fc8ce616a34e7d746d228b8a083
SHA512f779e29d6cb0f29b4926026f3b68ec9d237f21f2e51df7534a036fb8cf2e9fede557ca22b1323d1e1825990ff5e38a550e1f6aebc5f60ab0199502c880c54249
-
Filesize
57B
MD5af97ab24c5b97d1e6f9b409674b11542
SHA12eefbb37b475678aef97ebb75eab66fc4ee28ca6
SHA25638821b4c5a1659107133bbcaeefc71b2933475ccea6822b9f4fc7aeab08dc688
SHA51248298fe78524de03cf4226950a70ef081e0857416763250d00e657dacc8b93f195c0c494be10138fffed567a71d8687515038675e59acd76bde47df96ee7f5fd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
26KB
MD504533cfaca19269aa0e1bbd6b4603dc7
SHA191fc52fc0ded3a8bc27ab2d6c9269621b4ba693c
SHA256f4eeb56f33c05d07de6512bb1bb8078e5034004d045521cb84161710499b93e9
SHA512a7e386054e483670004301934a7f90d4c065ce1f965f83f9592cca5a7779feb436e28a1815bcb1a3c971b95f7fcb3472f31dec7393ffeed314cb8f0d7dcaac95
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63