Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
a3c949762ade2e6c3a81f28c25ad7bc80ad8b77de691765a97a64ae99593b85f.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
a3c949762ade2e6c3a81f28c25ad7bc80ad8b77de691765a97a64ae99593b85f.exe
Resource
win10v2004-20240226-en
General
-
Target
a3c949762ade2e6c3a81f28c25ad7bc80ad8b77de691765a97a64ae99593b85f.exe
-
Size
938KB
-
MD5
21776e8edb25c66fc62d2dd38169900e
-
SHA1
6014b525344c3fbbd37496f9309a03ca684e42da
-
SHA256
a3c949762ade2e6c3a81f28c25ad7bc80ad8b77de691765a97a64ae99593b85f
-
SHA512
75e86983f9e9126fb2176247f207c8975e0308cf8c7f5c1088c947dc64a091dbdf0ae12eb41710513e4e930ba347ae47212edfa71483234b338a3276ad3f5f08
-
SSDEEP
12288:ZGoCd+aXUSHC5/srRj3ruYFytotwuXF6riJ0eskjB1gMlLIfhWDC3GHk35Iu:ZGF+CRjbuYDquXFFszMlj22kJl
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DE2DAA21-EBA2-11EE-BF31-5645FC2EE091} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417641395" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a529a2e22ae42f4084bf8a2f7b0415b200000000020000000000106600000001000020000000bb0c3ef4a2f41c787eb7fde61ce859e11529aa56a798e13832d828c820f3049b000000000e8000000002000020000000e84a3969d6da93773d04ec42ec3bb96b8289466aba6713eed3aa05961d8900d920000000dad97e06b3fc5f696c4f34a2e7289bcf6fda9d1d3d2e1fe10aad06011f8d39aa40000000823ef9c1d5aabbe1bc8a3855cd4401c0ee0933225350303a030c786473cba54004577a484ba9563f3b4cac2054f4d3cbff84e4b165609fea053a0d9e0b646838 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0792abeaf7fda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2104 2044 a3c949762ade2e6c3a81f28c25ad7bc80ad8b77de691765a97a64ae99593b85f.exe 28 PID 2044 wrote to memory of 2104 2044 a3c949762ade2e6c3a81f28c25ad7bc80ad8b77de691765a97a64ae99593b85f.exe 28 PID 2044 wrote to memory of 2104 2044 a3c949762ade2e6c3a81f28c25ad7bc80ad8b77de691765a97a64ae99593b85f.exe 28 PID 2044 wrote to memory of 2104 2044 a3c949762ade2e6c3a81f28c25ad7bc80ad8b77de691765a97a64ae99593b85f.exe 28 PID 2104 wrote to memory of 2520 2104 iexplore.exe 30 PID 2104 wrote to memory of 2520 2104 iexplore.exe 30 PID 2104 wrote to memory of 2520 2104 iexplore.exe 30 PID 2104 wrote to memory of 2520 2104 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3c949762ade2e6c3a81f28c25ad7bc80ad8b77de691765a97a64ae99593b85f.exe"C:\Users\Admin\AppData\Local\Temp\a3c949762ade2e6c3a81f28c25ad7bc80ad8b77de691765a97a64ae99593b85f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ni.com/rteFinder?dest=lvrte&version=21.0&platform=Win7_32&lang=en2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519f296672e4f0ca2935c1843270e7f0d
SHA1351f79c591af51e9390a332809fd527b73af93a9
SHA256353f7d8f248d84db3802b551bc3caf53f55bc1b7bd6be89aad54f5b368a1ad8b
SHA512f55e1031f5f91c2b37cd2df5c3eeab7c516b524f473daaee4b004a9ad3a74f2058ddd13d28f516d63cf7705da827dc43df13c6d7b7eca9a963c9c6fd0d9406d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2b5329cc0722d839c3aa87f26626261
SHA1bec331ecf5c4d0289d67daf9f7b5ef826aef6bbf
SHA25682c0c63f5240d8a9ed098c57200c1dbffb99ee536f4c34fcd27961650051f367
SHA512dcc69b87d4d8b7f1db693962b4655b250f8ed15ae3a844a4af56d2014404e4193e5ca20b88090b309a9ad0bf617b9ef9618a5922082687f5b53b7e30a55ebb89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c56bc1a1cdc2d6ecfd54c90fe18e770
SHA1af9360756b31a8339b0bc4bcb3c0f9569bb7d3d8
SHA256c5c68ae2806c99d20ee23ae694cba255297c65be62556f6110157011eca41663
SHA5128fa264bb932aff8c8b68ce3d28a0e4c35fee00e6817ee4acc6e0e23f3c1bf0ff5ca22d53a3a1ff5f74a1bce48bf93a699661e20e715267445056cf2882da170b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5846eca659159716dbdac08447c0ece4b
SHA1a36324639a0e96ac852b32c8ee4ab4aed3c67ad7
SHA2561b48641729b7ed3c9c02f6688abc8c24d3345886e22f026305f00a51ab0c0ad2
SHA512ca8f53391785dbe35de0039c953aa37d3cffdb48805aa8662522a1be81b7d65276d4af0d1df89a8f051ddfc22397af04c7efa9fbb8d1a346ccf929374e367810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5080b8b99f58c80f973c73ee8588686c2
SHA11a52d0ae0263e84b3aece437ce0360d297162f8b
SHA256bd416ce7d0c32e8180438406ef4931378639ffab15171bf9e13ee1b501664e82
SHA5127c46b61eddd6b465d71e7502d48c49fa75a1f77418858907ec2c013b44d989eb2d41bb751ce271f0c6e31aecfcc9fe76ab03d0020d2f126f30bbf359f220e307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5728db81e9241e3656725f56200c88ba0
SHA1947cade86fcc4551fa2fec653a19a1a407c7d4ba
SHA256b06e1cd6648c9c60f7d72fd0c36d15c8ba92f35b1301b25535b9afbfd98af44d
SHA512156ece27ab7e2f186b421df1b8f4f0184ee57ff58d9ec6b811a2c85bff886c2149ed655d7df06bcd504a92af1067502adef59cf98c8d866097661bc087a95b35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa9b0ec5a40108672d0c19137c60bcd3
SHA17b3a003331254b12fcdd3d4c3b7ed19121ba31ca
SHA256bc280af37c7063e34777ffae85a375e9dd26136467e6282933535ef995de20fb
SHA512e788cce8b7a06242e00a1424dab61575d0ec48c1327f15d1abb343832163392a05e1755aa00309907cbfe7ae7c00644134780f04686dfce16eb5d7f79e226f61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eba4ca0279e11a650fecdbf3e5f2d8df
SHA15c87e805efd778e991596e1e553c3aaf60165e3e
SHA2565bb16b226469a5c84f682b20ea21dc6473b353e286091907acfff5e5f1e588c9
SHA5121cc833ce593a319755ecbc9a9526fe35fec358a15cdac33840087eccf9e8f7f5fc041f5350bf214de00e9f73788a1070f5140e6d455a5c29b37dfeddd21e34eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58620151cb5c5b71cfc0dd4e1ae11dccc
SHA18fec520fca95319607ce2481a055e9fd29091268
SHA2560f93cc4bdb7accacf8d601440caa3c0663323f387f14711791684577e53ca67c
SHA5124d9300efb9d3ffd138d4abe62c5a2f7f0805b88c174a6272b2c3d9598749903672d34770587a6ab1580dcdb2f30ceaca33f9a084ff6883b1bdb04b6d7492aba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d74f6121e831792dee6d4f509131333a
SHA12ad3eec0c564a4cec2243459ed756b1e99b3381c
SHA256f8f5b82c9165bb3285cdf8c5aff9d103a30ab856b7ce4148375f0c7ecfed18d7
SHA512a41e4d3c47f16080b0a8c8fac4f51b11d026f7e045f140011ece8fea6739b617e0e8ad3e270e921c5e0dafbf59f5eb977967ae296fe5bc54d7ca9f89b80c0b0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a60530758e69c60b9fb94339aa371728
SHA1a08340a16aa26feaec9bf17b1cb85b4dc4cbb47a
SHA256c3952ab7ce39f2fdf1776ecb3b8249f868d240f4f524c31b635b607aa285997a
SHA5120a6c0ae3f114ebc941cbe1829587e23bea6014358d2bd9d1531579a0bb87f7c43a0d5aad0305a1233a7ee192bb11dd5a4863eab8309ae0b6b72b6574e263deda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfd35f993db92903883d031a47ea51bd
SHA1afc4c4715ec7127b0bf108449f053b34da84d131
SHA256754cc958d1267fd8b015183e26240933531ffc3ef1f62a66b59a66cbacbb24f3
SHA5121cf5cb2ffec856779f1c2c0ddd5158b552bb1f8a120a3aa9b9dbf05c8d700bf7a064a790b5e2ddd86a364e95302f72a22b1982c9f58a69aa900777b07158f38b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537fdc87b696641bfd12a612b71fe38e3
SHA1235efff81328d93b03986698c46ab7271e04e702
SHA256887603fdd58b686f3f9d99dbbc154147d1c7a2a1f2d0585a836e915eeb12a406
SHA512d5aaec7756fca418e594a7c7d22cd725eef56790d38b426dc4930727e03edfb09f25a87e8dd239f0bf6e6c8a4d6eac06289fd3ee23bc1ff34a6f054ea671a43f
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a