Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 18:48
Static task
static1
Behavioral task
behavioral1
Sample
cc2740467d7e6f251b6875d45ef88a12.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc2740467d7e6f251b6875d45ef88a12.exe
Resource
win10v2004-20240226-en
General
-
Target
cc2740467d7e6f251b6875d45ef88a12.exe
-
Size
45KB
-
MD5
cc2740467d7e6f251b6875d45ef88a12
-
SHA1
20a9b359dc8f665acdab544a12a545b68656dbfa
-
SHA256
e50d70a9c439a1405cf69776ccc582e168e239bf3c2b999bfa2e245c4e5192d4
-
SHA512
bb42b16783702dff0021bf5e2036044952c2d4d27cef8cdc40e00243cc4fd811b987200c26fc2e9ff9bda279399d0503551956a18bdb2f8fd479d4089bdc0352
-
SSDEEP
768:Zz7tmjV+VcexfguwxXBrmGINgIz8l8FeA0pG:Zz7tmMjxfguw9Bm6W8lzQ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A71F91A1-E2FC-11EE-B91B-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416690395" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94d2d3723739f48802cd6414eea5c7e000000000200000000001066000000010000200000009a6eb5327eea08a1f636e47ef300745b46748b87a57684d5f8ceee34705426e7000000000e800000000200002000000078256de649b54911d501b765fa74788a1ea7dd8314bc27488377d26ae617786c90000000f5ff65db3acb839bec0d078ba5c36ae205bf5b3fcb6a30bad17ea005c0fb136dc1f76406b14ab6702ff708153be73aa52e6aa9ff6172d8a2475daf5efe97e25e85d3dc683e3b8f6173146986d1da29d7d1a5b01abe226839893514114d3a03d4ae16354c1c706b60ca921de60252b26b920dd01b6cadb47de6a4c989278ad51ba148103ad0e70281cc842dec368624ba400000005a18b1f65affe6d8785688c1ea8451b5f58bec177d922458945f82798880f7b666fe18217de58237e93205c2acf4c2bcee0540852c6b04fe3e0c4a710e4a5407 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94d2d3723739f48802cd6414eea5c7e00000000020000000000106600000001000020000000a633b8efa127c1bbdfa4e5cf5a9d437afa10ad4567780fe2ba50940820b5ec3c000000000e80000000020000200000002306d5061931b58055b4319b2817d5913afd870f915283477eb7a79339236d3520000000d2150482b48e2aab60fd7615f2e77c94715e28133038bb7f1d8ffa6fb2ebb5e6400000001674f2737230268241574aa109912d305a6a4e2a13af4d86bd373b159781a5b49400912eadd13287abcacddf4def98c63f9d81b41e403c8a13ad2a9eeb295c69 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e08c32950977da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2596 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2596 iexplore.exe 2596 iexplore.exe 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2544 1648 cc2740467d7e6f251b6875d45ef88a12.exe 28 PID 1648 wrote to memory of 2544 1648 cc2740467d7e6f251b6875d45ef88a12.exe 28 PID 1648 wrote to memory of 2544 1648 cc2740467d7e6f251b6875d45ef88a12.exe 28 PID 1648 wrote to memory of 2544 1648 cc2740467d7e6f251b6875d45ef88a12.exe 28 PID 2924 wrote to memory of 2596 2924 explorer.exe 30 PID 2924 wrote to memory of 2596 2924 explorer.exe 30 PID 2924 wrote to memory of 2596 2924 explorer.exe 30 PID 2596 wrote to memory of 2472 2596 iexplore.exe 32 PID 2596 wrote to memory of 2472 2596 iexplore.exe 32 PID 2596 wrote to memory of 2472 2596 iexplore.exe 32 PID 2596 wrote to memory of 2472 2596 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc2740467d7e6f251b6875d45ef88a12.exe"C:\Users\Admin\AppData\Local\Temp\cc2740467d7e6f251b6875d45ef88a12.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" http://66.219.101.227/~dark/loud.html2⤵PID:2544
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://66.219.101.227/~dark/loud.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2596 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2472
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5423c824e7f2406e2c7f4913ce993aaac
SHA12480f7b5ac00b8bf1da958c1cd5b703f900e6cf5
SHA256b2deade8f95a8b8b2b6c804d84b5a48347ee193699b2fd372ff1cb6b05b2a5f3
SHA512a7beb3f565092fbd69ab4829eef40180ed104c316242a4941802d7086b32cc591c7ab180cb0b6377f0295639677b723b2a4da264b485c6f34047234146a9f968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f3e22095e1741ff497d1aaedcaee9c39
SHA178354036ee93858aaf29cdb37f4633ca0d8d5f47
SHA256a00ced199de3bb10a6fc1904a964ca7ed380b87c835e1dabfd5e7feabc919743
SHA5123e907fa0df83b94e307f56cca392ab03d375d91d786f24f15d7d00648c317891570785d48a15a10c16332adff4cd697f0aeeb5bcdabeb5276960e16608fcf085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c07527161f0d774ae538176c7c2500f1
SHA19c41c83ff3aa70ea796f522e93b47d3092ff1bf5
SHA25652518544ca81d60d7985a0e9d12d4da26f51105fcf5690538e0d3014fab049be
SHA512e310bca7e9bb257b9249729472033aafbdacdce7207150202d3ca24aa883295599a7277c770b71415342b86240673d4d629637f8037cd6c653bd7030d92de47c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5374fe02a3014a0b13ee94917c14ca37f
SHA1831d5a6e07550f9ba07eb4f7228dab53ccd98f57
SHA256fe4ec7b88639b251d322dbd424b4c1cf24e78c69fa02b5c4617c5ff09f9496aa
SHA5127f8bdce00c33bba89eb4a1277331a8c3d64dfc0d8b24607dbab25b6422ef6a11b750ffc0dd58321df32f85cd2c0250d8020b51a22f7c6050203fabdc5db3f21b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e32b257db5cca39b82922d42b2f8d817
SHA11ec67f41183e3957a777be1ce70feb5b1cb92655
SHA25681c6446e5c11d302d1cc8440ebc7f9c9d7ac608ad6a250e00954e25badda3fe3
SHA512958d4c6e0b229d3ce25ce63ad70cd056b97b120c9d7eb36607d41db6dc4ad3debe360af068ba5dce1399c15210f3d77f22927d7bc9b405e770b0e03109ce0bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58f40b95dc6c5be794c23360cc4ef829b
SHA14bdc239eda7a39f57877569d6590f18179e02d4f
SHA2569cab31863aaa866bc7291ac79ce4da352031b929d4e222b53aafec857abc2a60
SHA512ff8c22efe002a16bcfdd290606190fcbe8e94b25c6f7c0eae2a702abfa14315be7b0710f07e82b5cc25d14ad0c4994808aeb8e2e776aac32df7e099c3f84c5c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD528eb013e742a043e6c28dcd972a33bf9
SHA155eba5f4190c8adde9a0e151b750aad3cf99cfe7
SHA256419c345bc7ed6133b874ae2fa893f47521a2bbf97bd7053f3c11e9f450063367
SHA512e1ac2698207923a1acbb39f2a2ccc4c1ffee500dc9c629ee47e183e97079478b71f0b8ce71e4a4a72bd3209e6e431cf7a2fcb066eb28ac7d27dc44aa67154fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a740331677e1d683a7fcbb2feef269e1
SHA19efd00aef2d7fa12d24aecfe5f37897957102f2a
SHA2561a41a64b2946a185adc3dcb667986e80787e6a3d3b0bfa28098d8fc16609107f
SHA5127297fa71bc11135acd68c57f7faa79a05c7786c3c7f760722b0e75c9b7e21986c8b5837c766533bc2d4b76948392d2729f02331b578dd500c9ced0ecabea7455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f8e19b7f68469080f551ae6d4f327885
SHA12995b19bafe930664257b24f27ea30e9dc610e16
SHA2568b579c0299974d3717e10439c1d4732b44744d9e0ddc345b1e79c6d9ff3bb196
SHA51282280f4b42b1bca57b8c350060cf0798230ba23b4061a87ee81c196c78944be743f085c43cc8f4b17da98491bae286154dcab4f694b2f487c47a05cddc607a6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD521a472001ea8875f9bd22ab78e8724ad
SHA195fa0fd90574d6d0d3e65bf7f120b2483d9c7321
SHA25641d73426bf93569726cbcb5d7df72f147d448a5b7a02c8ae31941c3e06b2d549
SHA5128dcf6adaeca08d0b8b8a97147eb3fa5a3363ec92625cc3fc36205a3d430e0d0c3f2e43e32a50ca104e361b01b7801ad13277f4568db2aec35537dc8b9d468fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD558e777f80edf7c7f634d926ceb32f80e
SHA1463078de5a37ff08a250df75425e91a092c7cc17
SHA256f9609181af94174316b6a2feb617a62ec1a3f2fee7fbebf30695d5542f7a482c
SHA512cbe38a9cfff5269f5bff40881a70e7e61b3f85d8a1e2b723b201685974f6ce992cf8700e78acf4341727cabb49cf3c306a5b98767d035143add52afd19b7e34e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD529d401dcccf2fa66c17b9d3af8333ac6
SHA1b51539c055c7265b8d2ae9ea6c05ce4198423932
SHA2565f3fd9be232b6c127395d4fe17e5af0424a97d2252d7128bf740b6b3849c3b6a
SHA5122fda5569d041d4e1a97555866798b23a7a480119ca5081cb7e08e6527460e8b8363280dc7a62712779dd3175e6ceb3f055d421ac17a648180e469d21ff57da58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52aa8c71cba9a2fa574c36ab19772f308
SHA1dfa0f93c80dc52b8f13fad2af36463435997cb4f
SHA256fc72946d9b8540e8f5590fe0485bfe25af0b4c8e45352491014d410073832bfe
SHA512cf412b9fe719b21d3b4840bd84348922f098378e7546a199c23dec9c1374e2b179391bd725a38db5f78edc72c2a0aae402e8e1bb4fd841a1732748e1e07a3943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52978f27c7c26c8a2d603a7791a4ff7d7
SHA1dfabaaab3504c817363831abf57a8fb286f9436f
SHA25615d684f088d8ef3977110a27b167e34585bf915b99ae39c4a9af13426c51894b
SHA51238a1e9e251d87f141a14c1acdd85901ecaeb1f780970637bbdf0ebcf7c7e520b1b4c5e567d046c8eb3d580d3f516727477f93e29812b11f87c724f307f2d6d03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51aaee18615c56c8c0cf8d56891f92a09
SHA10105fc303e8bcc971c810b3edd48cb448116d8a7
SHA25695e7a213a3ce3ce6937f4ef1a3307ef2e16eed134805dee1fc83cb487ebc68cb
SHA512f003012ae79631dad615424b2a93449851b408a68acf36b09503b0600830f5dfa8dd50a2824fe9cfcb21828b7779473cc4953175c3a4bcf934a5c6f9899679ad
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63