Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-03-2024 10:38
Behavioral task
behavioral1
Sample
d5e66ed8d1e5ab6e46b883e75b769f4e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d5e66ed8d1e5ab6e46b883e75b769f4e.exe
Resource
win10v2004-20240226-en
General
-
Target
d5e66ed8d1e5ab6e46b883e75b769f4e.exe
-
Size
17KB
-
MD5
d5e66ed8d1e5ab6e46b883e75b769f4e
-
SHA1
8113d6b6954de05742a8135cdc345ac89ddae3e7
-
SHA256
cf2a7b0c95ce92b52d2285dc85f9db0a473b6dc5cd7dfee38ce640ef3522b13e
-
SHA512
bf32c10b218fb09200ceb3eecc58007ed6afd99d9c8b79c9ce51c0d36b08eaf8ac84ccb0272073d0b5a901b0eca7af57d333e4f78d4f71ce9dadc589fcccda32
-
SSDEEP
192:L68xrsKGIpLFqUQCKAzpZTPR60hNhbfaJLi8Aoguzqr9ZCspE+TMwrRmK+vhOrS:LnxRhxeCdC+bfaJLisgcDeM4mP
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1584-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1584-1-0x0000000000400000-0x000000000040B000-memory.dmp upx -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417006579" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D20375C1-E5DC-11EE-86DB-FA8378BF1C4A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000b4f4b0d4f25e5826777c582e337566d3dfe8e7a605aca754bc9bddb3b8dc93a0000000000e8000000002000020000000f47885ccb95fcb618e54e4b645799fe89ab534eba636a8513083acc5fc90061620000000db34f42b93d108e23c91df9f0ea5f5429ca8f2e522b689892435e839179a4b66400000001e6ba95b50c37c7592fcce03b43620124648ceb406d06d80519424bca6781e14dcea332a2297b89e4ede1f76abbb6e88be4fb6a0878e34611f3247f97f2528d7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 003bbba6e979da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000002037fb265632a5b725418719ed293bbd10804fd68b5dad2c7e91d0a1c362bec0000000000e80000000020000200000001ccf58056b836773256586a750680499f1c1cc60c233d0c56ffcf13b9fd17e3d900000002278318070401e4e87b653a789c9c8105c3382319b813f1eda2964547cd37c14fa33618ddee744e6f39dba505a3d414563e26870ab7d47f393409589946c23d3bec940ebd35fa3ad47d9c668bcea3075eca3abcefa0076b29bb832d660306b3e51a55f02c594fc2bcfb81f02f255c2a0fc63efb2883177f9327ddb4ac2ce987fce2ff6752e78e6f0f88c7e1f4f1c0a0d40000000aedbd691cbecfc8b24768cdacb13b6d3bae3ec7b8120978c056be0f5cb797e173105fca463b3eda6904da5523d7d2c2d4333fcf40e239016d8a3c04abd2367bc iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1584 d5e66ed8d1e5ab6e46b883e75b769f4e.exe 2088 iexplore.exe 2088 iexplore.exe 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1584 wrote to memory of 2088 1584 d5e66ed8d1e5ab6e46b883e75b769f4e.exe 28 PID 1584 wrote to memory of 2088 1584 d5e66ed8d1e5ab6e46b883e75b769f4e.exe 28 PID 1584 wrote to memory of 2088 1584 d5e66ed8d1e5ab6e46b883e75b769f4e.exe 28 PID 1584 wrote to memory of 2088 1584 d5e66ed8d1e5ab6e46b883e75b769f4e.exe 28 PID 2088 wrote to memory of 1728 2088 iexplore.exe 29 PID 2088 wrote to memory of 1728 2088 iexplore.exe 29 PID 2088 wrote to memory of 1728 2088 iexplore.exe 29 PID 2088 wrote to memory of 1728 2088 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5e66ed8d1e5ab6e46b883e75b769f4e.exe"C:\Users\Admin\AppData\Local\Temp\d5e66ed8d1e5ab6e46b883e75b769f4e.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://ads.eorezo.com/cgi-bin/advert/getads?did=4332⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57957c3c5c3a77432ffada706ade62dbf
SHA16b8f0440469f51b0444dc07b6a5e8db9d8c6f3f3
SHA2565640759c7d4508eddaa5a22c882b016e8c1d1861153982a871345c0c93c1a421
SHA512c2ef8c094ab84a25bb811a4179277129c53cb7f41644d4dedd2c9eac47e826164f8479f33f62774d7c8513b0e9cf21717161bec15d9fc31a2d7ea5ce8dfd9ff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508650c69e64346daf59464f7d0afb3ff
SHA148b088627ade339e5b32f282ebe3449d16ff7718
SHA2562589b3b482c405be8f77b3bc2171dcab87176e6b4e70a0115203c83017286b3d
SHA512fbeaf013946a6be0be2231074125204c1abc8d8017fbb9a13b12ca2dd28532843b759a1c4f9480c31a20de61edfe01fb0f7bfb873281e71eb0a1a33745b6a31e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513f0c12c071a764b58dd7503b9a17eb9
SHA183aad8400d7069cd9104f0959249f8995cc43d71
SHA256d746fbf983fbdba6ce0dba4db112a0fccd91dc4c1616af17ebe14b055cf5cf02
SHA512112a632eac05ce1ba6c1da2ca360a4b677a8ec91f29fe26675fb81e9c7422628290eccaadc3fe8877bef2005e9765bed541f531ef67c623cf0365fd4893d2425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5502a8a0650b88f7c6e8624f9a621de74
SHA178eb09d0bb8b77cbcb58fc4d9199af1c9246e5c8
SHA256f104acdf1f048209b8e43bfbec881f60ba3aed218cbcbf166335ca962be2e210
SHA5128d47e80e8aa0ef87e600d83f1c63fd76fbc060fee0f3b6aca23a6b5471e4e6f9bcd3a57d6cbf58e1a52989be232b872d9b0e79804a40319b019393695f86af34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5425190f424925bef14078959f202b981
SHA153cc765245f8edef8d842df2d39cfff7d2fb657b
SHA25612a00769c990fe968d122187f8d5b9741b16b83352680c39f8cba7bdcd26785e
SHA51292e408013bdabb00ed3951030506e992eacc547c38cf6d9c7e8caa44752ae9b109e3e4b3eb67cd745e911f03342493013764cec1d92386b287d5fd92c51af534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ba72b1ad3522a917f32f50aa33b02fb
SHA1ecd0132a6466ad58b18db0ac0921ae0e50d0c9ce
SHA25680725125796be806211a5179469a247336db46df4a56879a52b5435fec372de7
SHA51261162fabd2c8c3c2233b1e3943bcb7341801719cb9eb27df33869ca28be24c53db8940e5fd742168c5062afd7e75129e981a0f1b0732bbd54eb41512fbf3690c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d14dd5278589a67fa79a3eb97ae81644
SHA1f7d3b96508a55a1b42a317e67c3d6f8157134d8e
SHA2560e1a8efb1d0bdbd47413a165b7ce4dea862ec34e272d0fa5203d6a13ac98d2aa
SHA512eeae5a247d96bf6238001da0aac1a83bdb2014716d1abc45bb79f3168e5235c2b985ffdd856500a33e9639fff64653b3fcb3c002fe465cf0736f13ceea1cbc25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542496b329e4f41dceca7a13780865617
SHA1065cfd280d177ea9b9c427cc06f0a8b59e84f369
SHA2567943f4ae25fbb623867d32fbc5d26a41632e016250adbc033c03f48a5789bdde
SHA5122503255432171ff6533a81297fecc89c7feee5aef68041c02011ef0448a4d7b99b5538d641ad7de6b8d67d8fcc2776cf0f37f55301c0c73ba71afea62536e1b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e78cb84473ce34990bbb085f0ac3d6be
SHA159b1ef3b2b1f4d547aac60ecc91e5817e67e516f
SHA2564a410bfab39e1dba62eaea04677a085557ee93c5918062985f63dfd8c795cdba
SHA5127ba5d6b8cd0b77c0ab75b6b14eaf38efe57dd3900eb405f3f50bfba95a6452e73e1b14eb9f291d7a0d23c7bf4edf2786ba5763baa77de96f8b2ce15c13a457b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535eadaef7dba9a7317758c9380a630ee
SHA17fc78b4e35a464f9925fcea9ba21d5f01c9815e1
SHA256fdfd749e120c182303077f13cefcc05a363c3998162d0ab4e4e36a0ff12bce5f
SHA5120dc5578b6f1d431ac5e09ec386cf479bb7b4af6980161a0655f1bb7e10a573507760ec3ca0e9b5d8363c19da6fab279d437773f436381e76d453bacb363f00a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7b6a5bd38f4d53a7d45ba6334685434
SHA18f9a925844e99a4a9b7c43fe49e2a1d7bc85a75f
SHA256cc7cdbdf64715c6627d36c97f15dd45ad72aab400d264d3a434b25dc36d7be81
SHA51283d4e78a61e2c0a9a72adf3b002175d9fb7b39f98feb40daab9348e89485f925e488a57c7bf7a105744babeb2612a3b4443ee8b78f01d11c228f30b2d67a4911
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63