Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 23:13
Static task
static1
Behavioral task
behavioral1
Sample
74271e01650816e7478bfb47e3344729b4fbb05d3e1ca096df74fcab14a50808.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
74271e01650816e7478bfb47e3344729b4fbb05d3e1ca096df74fcab14a50808.exe
Resource
win10v2004-20240412-en
General
-
Target
74271e01650816e7478bfb47e3344729b4fbb05d3e1ca096df74fcab14a50808.exe
-
Size
683KB
-
MD5
a564887ce58df5961b28d40a4193a6e2
-
SHA1
a4c28aca82c84f2626725cf21dc8a3bc6b4ab5a1
-
SHA256
74271e01650816e7478bfb47e3344729b4fbb05d3e1ca096df74fcab14a50808
-
SHA512
8561e299e0839d86c6f2160edd1c1b875bd6d2c207fa99a68b8697d03195b11b1d05bd9b6f2ad2d52bd26ec385452e2cefee607422af283a13da9dda52a5c2f4
-
SSDEEP
12288:wSTURpWedRKW2yGaLiFxAMaxfkeGPpib4eC3sR/9ZEw:wST8pWwFrGaOFxLlRPpiRCY9ZEw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Control Panel\International\Geo\Nation 74271e01650816e7478bfb47e3344729b4fbb05d3e1ca096df74fcab14a50808.exe Key value queried \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Control Panel\International\Geo\Nation wmpscfgs.exe -
Executes dropped EXE 5 IoCs
pid Process 4228 wmpscfgs.exe 4204 wmpscfgs.exe 4788 wmpscfgs.exe 3316 wmpscfgs.exe 4868 wmpscfgs.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe_Reader = "c:\\program files (x86)\\internet explorer\\wmpscfgs.exe" 74271e01650816e7478bfb47e3344729b4fbb05d3e1ca096df74fcab14a50808.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe_Reader = "c:\\program files (x86)\\internet explorer\\wmpscfgs.exe" wmpscfgs.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created \??\c:\program files (x86)\internet explorer\wmpscfgs.exe 74271e01650816e7478bfb47e3344729b4fbb05d3e1ca096df74fcab14a50808.exe File opened for modification \??\c:\program files (x86)\adobe\acrotray .exe wmpscfgs.exe File opened for modification \??\c:\program files (x86)\adobe\acrotray.exe wmpscfgs.exe File created \??\c:\program files (x86)\adobe\acrotray .exe 74271e01650816e7478bfb47e3344729b4fbb05d3e1ca096df74fcab14a50808.exe File created \??\c:\program files (x86)\adobe\acrotray.exe 74271e01650816e7478bfb47e3344729b4fbb05d3e1ca096df74fcab14a50808.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3261736212" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3261736212" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 705ce9c94194da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000027adccb0a0f1bd459a430a31567ea62b000000000200000000001066000000010000200000001a449e4d4d0c750a71915828b6684d1a07d34467b417c52a8c54554da3183a3b000000000e8000000002000020000000280f0b2708e6137c2768aef09dd9f3f5e16de256c80adefd8e10699fff160b6220000000389b8f10ecc39b06f52d45146864f4065f8f2808a3d0151fe9ce486f80e848414000000013d915eebf5032f5ade9eb803870dc9714a1ab13dda0fe6acc3b3da623783238fae60a62d405d13462d768ef9346423ea8d47ca61047bc973387b543ba0bddda iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000027adccb0a0f1bd459a430a31567ea62b00000000020000000000106600000001000020000000d3bf4fbebcc23a6378ad06bcf9f643aa37a717b2d6bae1dfb026f512a7b9dbe3000000000e800000000200002000000088cab4800248c72bbe45ee688316e9c54441bfc60eaf10440b541eba328dccdf200000002320f561cc0d1e0f153dbea41f9dc587cad849b211beaafa30860fd2311336a04000000030c1ebcab2154111f7df40941996139542262a0120b1df19f82f83ff318e57c8195ea2e74458a311e8f5f0c30dc8d9f466e8b183e9c92908d97632a25eb140bf iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31102017" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e05e61c14194da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31102017" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{EE0C85B3-0034-11EF-ADB6-FAEF73C7C1C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2100 74271e01650816e7478bfb47e3344729b4fbb05d3e1ca096df74fcab14a50808.exe 2100 74271e01650816e7478bfb47e3344729b4fbb05d3e1ca096df74fcab14a50808.exe 4228 wmpscfgs.exe 4228 wmpscfgs.exe 4228 wmpscfgs.exe 4228 wmpscfgs.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2100 74271e01650816e7478bfb47e3344729b4fbb05d3e1ca096df74fcab14a50808.exe Token: SeDebugPrivilege 4228 wmpscfgs.exe Token: SeDebugPrivilege 4204 wmpscfgs.exe Token: SeDebugPrivilege 4788 wmpscfgs.exe Token: SeDebugPrivilege 4868 wmpscfgs.exe Token: SeDebugPrivilege 3316 wmpscfgs.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 3024 iexplore.exe 3024 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 3024 iexplore.exe 3024 iexplore.exe 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2100 wrote to memory of 4228 2100 74271e01650816e7478bfb47e3344729b4fbb05d3e1ca096df74fcab14a50808.exe 86 PID 2100 wrote to memory of 4228 2100 74271e01650816e7478bfb47e3344729b4fbb05d3e1ca096df74fcab14a50808.exe 86 PID 2100 wrote to memory of 4228 2100 74271e01650816e7478bfb47e3344729b4fbb05d3e1ca096df74fcab14a50808.exe 86 PID 2100 wrote to memory of 4204 2100 74271e01650816e7478bfb47e3344729b4fbb05d3e1ca096df74fcab14a50808.exe 88 PID 2100 wrote to memory of 4204 2100 74271e01650816e7478bfb47e3344729b4fbb05d3e1ca096df74fcab14a50808.exe 88 PID 2100 wrote to memory of 4204 2100 74271e01650816e7478bfb47e3344729b4fbb05d3e1ca096df74fcab14a50808.exe 88 PID 4228 wrote to memory of 4788 4228 wmpscfgs.exe 100 PID 4228 wrote to memory of 4788 4228 wmpscfgs.exe 100 PID 4228 wrote to memory of 4788 4228 wmpscfgs.exe 100 PID 4228 wrote to memory of 3316 4228 wmpscfgs.exe 112 PID 4228 wrote to memory of 3316 4228 wmpscfgs.exe 112 PID 4228 wrote to memory of 3316 4228 wmpscfgs.exe 112 PID 4228 wrote to memory of 4868 4228 wmpscfgs.exe 113 PID 4228 wrote to memory of 4868 4228 wmpscfgs.exe 113 PID 4228 wrote to memory of 4868 4228 wmpscfgs.exe 113 PID 3024 wrote to memory of 2152 3024 iexplore.exe 116 PID 3024 wrote to memory of 2152 3024 iexplore.exe 116 PID 3024 wrote to memory of 2152 3024 iexplore.exe 116 PID 3024 wrote to memory of 2332 3024 iexplore.exe 125 PID 3024 wrote to memory of 2332 3024 iexplore.exe 125 PID 3024 wrote to memory of 2332 3024 iexplore.exe 125 PID 3024 wrote to memory of 2284 3024 iexplore.exe 126 PID 3024 wrote to memory of 2284 3024 iexplore.exe 126 PID 3024 wrote to memory of 2284 3024 iexplore.exe 126
Processes
-
C:\Users\Admin\AppData\Local\Temp\74271e01650816e7478bfb47e3344729b4fbb05d3e1ca096df74fcab14a50808.exe"C:\Users\Admin\AppData\Local\Temp\74271e01650816e7478bfb47e3344729b4fbb05d3e1ca096df74fcab14a50808.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\program files (x86)\internet explorer\wmpscfgs.exe"C:\program files (x86)\internet explorer\wmpscfgs.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\program files (x86)\internet explorer\wmpscfgs.exe"C:\program files (x86)\internet explorer\wmpscfgs.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4788
-
-
C:\program files (x86)\internet explorer\wmpscfgs.exe"C:\program files (x86)\internet explorer\wmpscfgs.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3316
-
-
C:\Program Files (x86)\Internet Explorer\wmpscfgs.exeC:\Program Files (x86)\Internet Explorer\wmpscfgs.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
-
C:\Program Files (x86)\Internet Explorer\wmpscfgs.exeC:\Program Files (x86)\Internet Explorer\wmpscfgs.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4204
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:4332
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2152
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:17414 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:17422 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
695KB
MD5c16cde790c5ef6f51bc1fed25cf5ccac
SHA1b798334f702b66e9fe4594bd5382b6900918fe72
SHA256e79c7a9c9531f48cb23d073205b36881995a26f82273d822e2e46985abbbb851
SHA512cc59b69b992b485f3191bb7553b0b5702bc154e9a46b936f831892234dab330a1ec417a713b22f2e8f1db26786930ee6ef1eb35fd67ab0e2b0f13131c8be1be8
-
Filesize
32KB
MD54c0f57c52b87f02f9d2ed1ae3859243a
SHA18942e2891e8e847934a601d561f4683d169c3b88
SHA256999eda15b8baaf116b1df2c02cca93e903773d939229ea3bf6a8a981815136e5
SHA5122e471e9bf4d2cc8f81f1ffe0e969a54d5d4e1776507ba82a9e9a138b4bc249c0a7875e31c3fa22faf0546841bafe436038cb12f04b3490a13babef99b0c82b5d
-
Filesize
697KB
MD50ce31c70397b09da9250f2255ad00822
SHA122a79ff9878a5ba5961d98c16732e08fd1dd59ef
SHA256ac6b3698e590a07d873967fc3d234b1d121e72f2cb66e939bfd8ef4610c356d1
SHA512ec37b44dbe76747d6d03529b220fb3e83f03184d3c470097fc44c427ba6c80a8ef15a08702c62a97b67cc66f6e0607b4b03f854f344e0af66d24df86c8607ea7