Analysis
-
max time kernel
122s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 12:32
Static task
static1
Behavioral task
behavioral1
Sample
c3621af29a5d5c92637a78caeea6be9d.exe
Resource
win7-20240221-en
General
-
Target
c3621af29a5d5c92637a78caeea6be9d.exe
-
Size
526KB
-
MD5
c3621af29a5d5c92637a78caeea6be9d
-
SHA1
9a4e2e488809c81fc1c257e4c6fffb4b75b36f19
-
SHA256
536065e717af02f098e2e9ae288c1012e374ca7d82d3e5eb77a4b3df16b7fa3f
-
SHA512
8946613b7e8bf637db0df0b7232c2ed574c498819fc04242ce52ead431b4f614c5ea18ef265ae6eb0e0f91dab866604279c0e1f477a24421eeecd2340addff6e
-
SSDEEP
12288:5UXW75JFlEU/mMJxdETZ88LtGOsjhMN+88:qXoXoU/FoxpGOF+
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf c3621af29a5d5c92637a78caeea6be9d.exe File created D:\autorun.inf c3621af29a5d5c92637a78caeea6be9d.exe File created F:\autorun.inf c3621af29a5d5c92637a78caeea6be9d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000004f7d4ddb1d47007faa0bd255fe7433c4ca626cf51f6bec7733bb84c99ee67f59000000000e80000000020000200000009079a6419fa14719243dfd3ce2b7c8e802952c22affb676a43d022d4849a1fb220000000aee916aab1d4c63f4e5fac1b58da941565e8b3c0047f9bfbd40dec8b7c5705284000000022f7754f4ba78fd70654491d170835b066642184b6db16c2a0dca5812c6c8eebca43e8b58ae8cde902fc0df97a89b627329f336f9a20dc37a7623d6ed4a068be iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9A3CF501-E06C-11EE-8804-E25BC60B6402} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40a3ca877974da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416408638" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2880 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2880 iexplore.exe 2880 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2880 2856 c3621af29a5d5c92637a78caeea6be9d.exe 28 PID 2856 wrote to memory of 2880 2856 c3621af29a5d5c92637a78caeea6be9d.exe 28 PID 2856 wrote to memory of 2880 2856 c3621af29a5d5c92637a78caeea6be9d.exe 28 PID 2856 wrote to memory of 2880 2856 c3621af29a5d5c92637a78caeea6be9d.exe 28 PID 2880 wrote to memory of 2740 2880 iexplore.exe 29 PID 2880 wrote to memory of 2740 2880 iexplore.exe 29 PID 2880 wrote to memory of 2740 2880 iexplore.exe 29 PID 2880 wrote to memory of 2740 2880 iexplore.exe 29 PID 2856 wrote to memory of 2556 2856 c3621af29a5d5c92637a78caeea6be9d.exe 30 PID 2856 wrote to memory of 2556 2856 c3621af29a5d5c92637a78caeea6be9d.exe 30 PID 2856 wrote to memory of 2556 2856 c3621af29a5d5c92637a78caeea6be9d.exe 30 PID 2856 wrote to memory of 2556 2856 c3621af29a5d5c92637a78caeea6be9d.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3621af29a5d5c92637a78caeea6be9d.exe"C:\Users\Admin\AppData\Local\Temp\c3621af29a5d5c92637a78caeea6be9d.exe"1⤵
- Drops autorun.inf file
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://187.33.1.241/registra.php2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\auto.bat" "2⤵PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d5d0a1398fc2dcf3e3b6e6ab9901a9d
SHA12ca9fca67cfcbc8ba613ab86f14443c761171b77
SHA256b92bedcd614fa069ea1b45d0e49db6f94684a8043272fc834172128a825cb82c
SHA51232f8e39c7f6dd220f0d7e8fab9a1bcb864cc9e95d655fa7008ebd7cb5a99e9476f5b56cba9d806106f78e557c295bd221a888809c9078db009c2b4105839666a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502d97ba0c5e8b47aa30419c640d26a84
SHA1c44c898cd3760175a3d72b4563cccf00028a3c5c
SHA256ca90946a304ec68ca3a095085a157646d8ee50736ee6d1b9d00e1fb6a6aed364
SHA51271281f59d3d265bfba24eddcf77a3eb29885a73485456f58085c14b31f77eb68bfca7f0ded6698f8be5e4fff9b798eba5b90cdc15fd26281edc63d7139b674da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d1eb9511c1c201e11a2fcba3d0d53a2
SHA116e21e591f9bf247e8901949467fb729e0857ad9
SHA2564534b4ee9a89c1f364e8dc9f0f530aeb507b44faa9e0c28b8ee5fea38c2d9a32
SHA5126f2bf070f5c52ef3ccf5dcbab3bb12277ac0e2c3f655ddee80f7e0d72b3651774324cbe20593ba637898a602b1477d5136ef77c212b646c24ed11f6a73cab9ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b44d23ca348c3264696dfb0e078b0c6
SHA1d73bac53809a35f2998e23763ad931f54cfbf4aa
SHA256c1ad0e32539b3baa84d63a847d4312aa0e2a34dfcc977c9b24e8618e185afb71
SHA512ac8ea3821573dc7d30301300396ff4f950a6753a1fc28361cfeba33d97c3024f070c7613d8ac7b5ea4c61f83d8f4be313c2990f1baf65c205900452cb4a4c3a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5172eb311c9043fa3dc20dff1e1395480
SHA13a30e86fc3f175ffb11ce95bba1d53d50d8843f6
SHA2564abcc46b0230b831b31a05be9c80bec3be46aae81607c3541c033a55e6f07eaa
SHA512f77cda39dd56b954739453de2edfe5688cb1ebcc2ab3b8781fa4ef67dc802b71d70cace7dc4cb06eacb63d0ff82732b514859cdaf97116256cb36d4a0f24fccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfca314d63581b0574c14583e3143aed
SHA17403a27bba8ff84c72f8e6f0583bf1ff4672aa56
SHA2568eb6e3aa782bdd87742b5e7de5c83d633cb1453bb67f68469fb7da29a545567c
SHA512bcc754ec7662e8ef700e7eeefa77a8d67dc8a548de9706560b1c8ddd033c23f21e427881622252bb3e189527b11146d51f9d57218e74cef91ce218799c29758f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5718a582e3af5be1df7d2190bf353d7e1
SHA141b80397d32611946779084e24110920291dcd30
SHA25668bbf3cb022b0de07b10acfa59edcf2ffb39a697d4660007364098257c690608
SHA5129a5f308f6c5e5f3b7a1cb374359e2c8312cebc948d93e8807a087601f3ddabb9ca2e889c29725c7cd917f357a921a246c7d5570c692954c18ec85fe5662aa7ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53392c18f12eed403e1fe95b0b606637e
SHA16074f97152f51b67086b442af5f2957d31f55fc9
SHA25614da39d736fb61c6cab956e29d8e2db5bacd36816619561117829661bbda9a92
SHA512da9d7f24e99955308589461f1b400825a1d638973f24dcb28afaae2aed9032993eb4109af70fde5dcb0c0bbf2148a1ff580fe4f094b9a94637fbbe3ff886ca57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5198c5a24df79e62c363a504baf532eca
SHA1ed31defe0781170a25e7c3362c4a7af0adcb2415
SHA2561820ce47549ad414d7328876291ae90ce72ecda8ace5d7b3259ec85a231305a8
SHA5128acd5651875b16f097de63c1ff841e9600aec284fadb2a7eb531f85fbf0b304eac62c6d20ba4e0770d76f2fbf34928641fe153f724b3ad757923047f09a4b223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581a1d04271313bdec5a516b53cb76efc
SHA1b2d01005c66469f11b72c760c8e85349a8dafbf9
SHA25675cd32c55b72f7e8301add329e7a649b250585fb1a219ecf3fdf3b74f821e251
SHA5122c39aaa460a8a30f2cac3d8fdc5a792178d469993ae544b8554242bb2dbb2b229873b5a03fb5a8eec98137ca9233c4ca6b0bb159a62c3a5725bb16a1409d23fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564b78e67c007991a1176a3af619544dd
SHA1bef9e81bab0a2e3aec569d8381df580899c7f043
SHA2563580b86b17cd33fbd983cf432f8415232d1f0accfc561b91f1f6d47f9db14c4b
SHA512b72372cedda651d532f15380b4eed9e36a4aa1e0b4d5d333fdf60d0703574d24f670bdb70fadda89fbe464040d36d8ac41eb444d7e1f2a947cb8d7cbf246ffdd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
269B
MD5ab7adb09ac062dc40e60b90493d360dd
SHA1cfc1cf8e4df4ecfd804f765c7f3f346208863675
SHA2560886a88bda78c6a65a02c4e9c60aed5b51ac4c8c8e03ed35e9aa585256ad7354
SHA5127656d98e105f9b24b02d7f23fbf3f03c3d5561f13dae24c278f32605a3e0940e98bf722dd6afe76f0c061c5a4abea7b0ecb11b52b35e72f79eb6244f1d45cea8