Analysis
-
max time kernel
118s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 17:09
Static task
static1
Behavioral task
behavioral1
Sample
bc5a2e029eed8ef8589a09d6dafbfdb4.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
bc5a2e029eed8ef8589a09d6dafbfdb4.exe
Resource
win10v2004-20240226-en
General
-
Target
bc5a2e029eed8ef8589a09d6dafbfdb4.exe
-
Size
20KB
-
MD5
bc5a2e029eed8ef8589a09d6dafbfdb4
-
SHA1
b532009f65dfb1941216776030a4c0ebfee39b1b
-
SHA256
912e7dbc6572651d87f27337e189bb670d650141d3efeb97669590c0c9ba1b35
-
SHA512
4b98bbb06857143864be276a493093f80e2cd6917cb53439d1c9e9ef66f7461f13fb45e33c072fedf2d420a42d63bce2aad266f381b3fed16765f4e974165830
-
SSDEEP
384:ejQrdNQwQglX2sIFrDBP1NVEqoqjSvNhXOfyNSDI:jyw5uFHXE7YSvN4KNr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2608 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3052 kenny11.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created \??\c:\windows\kenny11.exe bc5a2e029eed8ef8589a09d6dafbfdb4.exe File created \??\c:\windows\fmark2.dat kenny11.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CF287A01-DE37-11EE-8547-E6D98B7EB028} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416166057" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1640 wrote to memory of 3052 1640 bc5a2e029eed8ef8589a09d6dafbfdb4.exe 28 PID 1640 wrote to memory of 3052 1640 bc5a2e029eed8ef8589a09d6dafbfdb4.exe 28 PID 1640 wrote to memory of 3052 1640 bc5a2e029eed8ef8589a09d6dafbfdb4.exe 28 PID 1640 wrote to memory of 3052 1640 bc5a2e029eed8ef8589a09d6dafbfdb4.exe 28 PID 1640 wrote to memory of 2608 1640 bc5a2e029eed8ef8589a09d6dafbfdb4.exe 29 PID 1640 wrote to memory of 2608 1640 bc5a2e029eed8ef8589a09d6dafbfdb4.exe 29 PID 1640 wrote to memory of 2608 1640 bc5a2e029eed8ef8589a09d6dafbfdb4.exe 29 PID 1640 wrote to memory of 2608 1640 bc5a2e029eed8ef8589a09d6dafbfdb4.exe 29 PID 2512 wrote to memory of 2460 2512 iexplore.exe 33 PID 2512 wrote to memory of 2460 2512 iexplore.exe 33 PID 2512 wrote to memory of 2460 2512 iexplore.exe 33 PID 2512 wrote to memory of 2460 2512 iexplore.exe 33 PID 3052 wrote to memory of 1052 3052 kenny11.exe 34 PID 3052 wrote to memory of 1052 3052 kenny11.exe 34 PID 3052 wrote to memory of 1052 3052 kenny11.exe 34 PID 3052 wrote to memory of 1052 3052 kenny11.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc5a2e029eed8ef8589a09d6dafbfdb4.exe"C:\Users\Admin\AppData\Local\Temp\bc5a2e029eed8ef8589a09d6dafbfdb4.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1640 -
\??\c:\windows\kenny11.exec:\windows\kenny11.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\cmd.execmd /c c:\6566533.bat3⤵PID:1052
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c c:\6566533.bat2⤵
- Deletes itself
PID:2608
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
107B
MD5f44172647bafba8f4960fc6df9d823e1
SHA175c9b654a6cfdef6fec0c4f4c6da8ff0cbc25fcc
SHA256fbc9f8dfafc13c3c67be51b6c77927698893d2c7f854916467621b47359b7d7b
SHA512e19f872a055ee897c6f5536221fdd4f7600819deb5ce9cc29e7723ff23fa6763416d07bdff3a46cef72e1d040e3e639facd565ec5fd4b66b1d5f368209552bdb
-
Filesize
203B
MD5c5ab7354150215eb59fed364a8de1869
SHA1e4ea41087d892e468c3e008626421fd423290ab1
SHA256d801e081a8a993cf1530cbe9cbff1cd79fa723f3f3ad686306773fc0fc4b375b
SHA51248d2b5ed57723006361a1dd21d5da1a7e01f7b8c52ae0904251fbffeb07589c811a7a00fa8c080706dda020cbfb18ae9fa093f963259da3412b01326bac4b450
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
20KB
MD5bc5a2e029eed8ef8589a09d6dafbfdb4
SHA1b532009f65dfb1941216776030a4c0ebfee39b1b
SHA256912e7dbc6572651d87f27337e189bb670d650141d3efeb97669590c0c9ba1b35
SHA5124b98bbb06857143864be276a493093f80e2cd6917cb53439d1c9e9ef66f7461f13fb45e33c072fedf2d420a42d63bce2aad266f381b3fed16765f4e974165830