Overview
overview
3Static
static
1Prefetch.zip
windows7-x64
1Prefetch.zip
windows10-2004-x64
1Prefetch/5...979.pf
windows7-x64
3Prefetch/5...979.pf
windows10-2004-x64
3Prefetch/7...8EF.pf
windows7-x64
3Prefetch/7...8EF.pf
windows10-2004-x64
3Prefetch/7...F9A.pf
windows7-x64
3Prefetch/7...F9A.pf
windows10-2004-x64
3Prefetch/7...D46.pf
windows7-x64
3Prefetch/7...D46.pf
windows10-2004-x64
3Prefetch/A...734.pf
windows7-x64
3Prefetch/A...734.pf
windows10-2004-x64
3Prefetch/A...A6E.pf
windows7-x64
3Prefetch/A...A6E.pf
windows10-2004-x64
3Prefetch/A...CD5.pf
windows7-x64
3Prefetch/A...CD5.pf
windows10-2004-x64
3Prefetch/A...4F0.pf
windows7-x64
3Prefetch/A...4F0.pf
windows10-2004-x64
3Prefetch/A...BB7.pf
windows7-x64
3Prefetch/A...BB7.pf
windows10-2004-x64
3Prefetch/A...3E8.pf
windows7-x64
3Prefetch/A...3E8.pf
windows10-2004-x64
3Prefetch/A...0CE.pf
windows7-x64
3Prefetch/A...0CE.pf
windows10-2004-x64
3Prefetch/A...7F4.pf
windows7-x64
3Prefetch/A...7F4.pf
windows10-2004-x64
3Prefetch/A...1EE.pf
windows7-x64
3Prefetch/A...1EE.pf
windows10-2004-x64
3Prefetch/A...9A6.pf
windows7-x64
3Prefetch/A...9A6.pf
windows10-2004-x64
3Prefetch/B...7D1.pf
windows7-x64
3Prefetch/B...7D1.pf
windows10-2004-x64
3Resubmissions
25-03-2024 21:05
240325-zxdnnahe48 325-03-2024 20:59
240325-zswcxahd77 325-03-2024 20:56
240325-zq3dfahd45 325-03-2024 20:51
240325-zm6xfshc96 325-03-2024 20:45
240325-zj6ghsca7s 325-03-2024 20:38
240325-zezs6shb67 325-03-2024 20:36
240325-zdscpshb45 3Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2024 20:38
Static task
static1
Behavioral task
behavioral1
Sample
Prefetch.zip
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Prefetch.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Prefetch/54449E3A-7D48-4A3B-8938-6F0AC-DA408979.pf
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Prefetch/54449E3A-7D48-4A3B-8938-6F0AC-DA408979.pf
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Prefetch/7Z2301-X64.EXE-AD2E68EF.pf
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Prefetch/7Z2301-X64.EXE-AD2E68EF.pf
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Prefetch/7ZFM.EXE-56DE4F9A.pf
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
Prefetch/7ZFM.EXE-56DE4F9A.pf
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Prefetch/7ZG.EXE-F49B3D46.pf
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Prefetch/7ZG.EXE-F49B3D46.pf
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
Prefetch/ADB-SETUP-1.4.3.EXE-A5343734.pf
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Prefetch/ADB-SETUP-1.4.3.EXE-A5343734.pf
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Prefetch/ADB.EXE-CE29CA6E.pf
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Prefetch/ADB.EXE-CE29CA6E.pf
Resource
win10v2004-20240319-en
Behavioral task
behavioral15
Sample
Prefetch/AESM_SERVICE.EXE-85691CD5.pf
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Prefetch/AESM_SERVICE.EXE-85691CD5.pf
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
Prefetch/AI.EXE-517C04F0.pf
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
Prefetch/AI.EXE-517C04F0.pf
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
Prefetch/AMAZON MUSIC.EXE-8F9E1BB7.pf
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
Prefetch/AMAZON MUSIC.EXE-8F9E1BB7.pf
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
Prefetch/APPINSTALLER.EXE-8BEA83E8.pf
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Prefetch/APPINSTALLER.EXE-8BEA83E8.pf
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
Prefetch/APPINSTALLER.EXE-EBDB10CE.pf
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Prefetch/APPINSTALLER.EXE-EBDB10CE.pf
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
Prefetch/APPINSTALLERFULLTRUSTAPPSERVI-ADC5D7F4.pf
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
Prefetch/APPINSTALLERFULLTRUSTAPPSERVI-ADC5D7F4.pf
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
Prefetch/APPLICATIONFRAMEHOST.EXE-8CE9A1EE.pf
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
Prefetch/APPLICATIONFRAMEHOST.EXE-8CE9A1EE.pf
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
Prefetch/AUDIODG.EXE-AB22E9A6.pf
Resource
win7-20240220-en
Behavioral task
behavioral30
Sample
Prefetch/AUDIODG.EXE-AB22E9A6.pf
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
Prefetch/BACKGROUNDTASKHOST.EXE-1195A7D1.pf
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
Prefetch/BACKGROUNDTASKHOST.EXE-1195A7D1.pf
Resource
win10v2004-20240226-en
General
-
Target
Prefetch/APPINSTALLER.EXE-EBDB10CE.pf
-
Size
37KB
-
MD5
75a1d8ebe0e3867b4db922178aea875b
-
SHA1
dae592de043c8097d0acf9d0b093167f0ceabefd
-
SHA256
2aa02a0c3e8df29cd63fabd67ac0485e714905283a87c913693a700f0146d479
-
SHA512
d6b3efcaa56e742dd72cea39a9946f345af33df87932ec9e0581b985a1ba3b2b66442112bbf97eeaf2e7cb0243b3e917c3036e617d8612ebee890aeec3b2d282
-
SSDEEP
768:v3rG2ubVYScxo8XPDmLEnovaE2/s5XGcoWFUHEavuR2Ie7Bd:v7G2uMbmLGAGcBmqPe9d
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 12e2ba990f69da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{14CF9D18-EAE8-11EE-B3C6-4640DA9D21C7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Internet Explorer\RepId\PublicId = "{6AB3D43A-0899-46E7-92BD-69F36DE568E8}" iexplore.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4284 OpenWith.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4060 iexplore.exe 4060 iexplore.exe 4060 iexplore.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 4284 OpenWith.exe 4284 OpenWith.exe 4284 OpenWith.exe 4284 OpenWith.exe 4284 OpenWith.exe 4284 OpenWith.exe 4284 OpenWith.exe 4284 OpenWith.exe 4284 OpenWith.exe 4284 OpenWith.exe 4284 OpenWith.exe 4060 iexplore.exe 4060 iexplore.exe 3788 IEXPLORE.EXE 3788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4284 wrote to memory of 4060 4284 OpenWith.exe 108 PID 4284 wrote to memory of 4060 4284 OpenWith.exe 108 PID 4060 wrote to memory of 3788 4060 iexplore.exe 110 PID 4060 wrote to memory of 3788 4060 iexplore.exe 110 PID 4060 wrote to memory of 3788 4060 iexplore.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Prefetch\APPINSTALLER.EXE-EBDB10CE.pf1⤵
- Modifies registry class
PID:1636
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Prefetch\APPINSTALLER.EXE-EBDB10CE.pf2⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4060 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3788
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD575a1d8ebe0e3867b4db922178aea875b
SHA1dae592de043c8097d0acf9d0b093167f0ceabefd
SHA2562aa02a0c3e8df29cd63fabd67ac0485e714905283a87c913693a700f0146d479
SHA512d6b3efcaa56e742dd72cea39a9946f345af33df87932ec9e0581b985a1ba3b2b66442112bbf97eeaf2e7cb0243b3e917c3036e617d8612ebee890aeec3b2d282