Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
02-05-2024 20:33
Static task
static1
Behavioral task
behavioral1
Sample
FAQ/file.bat
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
FAQ/file.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
INVOICE_UWB872.lnk
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
INVOICE_UWB872.lnk
Resource
win10v2004-20240419-en
General
-
Target
FAQ/file.bat
-
Size
793B
-
MD5
414720fbf4f23b0b60cb16b1286f4fb9
-
SHA1
48a6c2520f3ee5babd7c506562ba470fed53716b
-
SHA256
d92433da2959be279c18e55b59ce0c65a387c981d0223fd727ccbb54c845986f
-
SHA512
fa7f0ddb96deeb5bdceb57127857ccf4ac4d36ad8bd4b01316bfbf225b9761939949714cb57c97546b9048746e96de14da64fd5282bc5e80b8c6d6f078348a8a
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3D69B731-08C3-11EF-A296-4A24C526E2E4} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0722d12d09cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000600e8cd9a729562aa09a1b239a792a4d9218c3ead5ced50f40082d7953179e52000000000e8000000002000020000000a7961a04ba4f76450ef8dcd488504484e8a34935693006f4afdd352c00b14d2d20000000a34f8d1d86bc55197953f11557f3799e7b0b780157a0c6abfe05a6bab86019ba40000000be1587042e6a3e4f8e2086c5dca2bf2e0afae61bac930af5a7d91fe8be19183863567859746d210fe2fdedc71cab014a8691e241734985ade854ab4b368445fa iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420843878" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2536 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2536 iexplore.exe 2536 iexplore.exe 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2940 2904 cmd.exe 29 PID 2904 wrote to memory of 2940 2904 cmd.exe 29 PID 2904 wrote to memory of 2940 2904 cmd.exe 29 PID 2940 wrote to memory of 2536 2940 cmd.exe 31 PID 2940 wrote to memory of 2536 2940 cmd.exe 31 PID 2940 wrote to memory of 2536 2940 cmd.exe 31 PID 2536 wrote to memory of 2564 2536 iexplore.exe 32 PID 2536 wrote to memory of 2564 2536 iexplore.exe 32 PID 2536 wrote to memory of 2564 2536 iexplore.exe 32 PID 2536 wrote to memory of 2564 2536 iexplore.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\FAQ\file.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FAQ\file.bat" MY_FLAG2⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://ariamedical.ir/.well-known/style/yourinvoice.pdf3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2536 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2564
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b0d824940ebdb550cb5b77b656713ba
SHA1bc55418a0ec4e5638e128137285ba6258afa4171
SHA256fc3899e72dc45f7955f419527adbd774c570d185f9bd8cb22c4759afe727ab19
SHA512a0c1a53c303db1a46cf31a6a68921fca3f8ddc255df47dd4e8f4551fd73fa4b0195867e5e4e03e31f9cb5d383991e36936461bfe3a0fb06b3ba548dbad0422f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58aee1b841e1e7e15da5e9077ffdd9afa
SHA1663abecbb237787a5424dfbb2a2b865f853dcbed
SHA25670ec49cea85f44f8cc35b484b82af2322d4404415e03911a78505b4269d9b4ee
SHA51279ce25c4860e524189bb579ba2fd63cddfb1bdb025f28de95d12327103206a7b775de798e4fe01d0cd06233f6f324f0b1eb9e140af684ee4f80c530028377cd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c13e97a8d23ccad1f24a800ddd89034
SHA1f12e9dda785d313d1ab89fe374b1632ad69a8218
SHA25688629fd69d50b5d5f0f6318b2584ba29b13a507c5ce967b1eb3baf0dc802e4e7
SHA512def8734464b5910549ea018fc6dd873d2e5d2e5e40028f3bc197dd8c359e4c373febccd9f944e3e3ffc68ea687f591e89c8560aeb4a353cc9e5a547400c63aa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50beae21534df1aebbd6743eea85ecef8
SHA1583648b95c3602b885904020bb5cea1e8d4be550
SHA2562dd46902920a61aa8da80bd47d14056d0b9ec98f3dafd647397e6b44f1dea7c2
SHA5121ba3260500b069fe37b1f66f04542c6be35038278dbd17b64fba10b33df855a247b8efa1dd47555184e9c789d4d98b8a56e95b36709853d985b77fc729e910c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5f2023ffa4ee6c6c506c18a606e731a
SHA167e5dd62dee2d01abcefa1154d8c878c580e755b
SHA256afed686016d52c656c4bcea1fad27b5d4505fe67a0fe01e093388490ebeb279f
SHA512b6157cd64369dc759dc032bd60478f58216668493fcfc405e066089d45f4f63d49c5e29760c597cc94f232b052695608b5acdf8c059fb5010f8d2072f0db4a77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dda076ea29a567c96ae7832db363b95
SHA1fb79648ab6fb3405ff8767d27f8d08b36ca47fe3
SHA2563ddcd460096e92b657a6543695ca43616d10500b253afa00a0ac1e1fc9e7ed23
SHA512b161faaba8c91c5f4b5f198cb7283ac8e92182b48ead0c5a9bf391d0baa33b329e96fc888d18a622aad0a4f7afb3bd48bdeea0f9294473c2de609e3c3853ec28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b76b52593f6f020089aef20df95c0e0
SHA12e4684f75f13d248579bafae1f58d394b145e33e
SHA2568651a51da5a173e2fe8ac5b4c7f0937bed6289a1022f477d56800c60aa211b1d
SHA512cfc3d4df8552d11e3ebee6dbb417e06b8f39baf8358052290a969ce871001aa4e72f55ed19c6e6c2f99eb79df071ef2d322119b2811c17ef3bd115cb5f67422a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1eb6e15206ff5d806eec9a42821b0eb
SHA1c8a1590c635fbc40d97cbe487009e72a259cb086
SHA2565d8e8baa68031164b89223d1696ab62a0abc6e87ac4e47bbd2506076276b2ee9
SHA5128bb07e06e8d89ffcd3fab633417ac95c9f04f081b91bf49da670413edbcfbad7c2e612ea9a75ca40caff91fcfa885b53a9148240f25789a66f0f5b086bf79dc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcaa4ed34331855b14adb15493f92084
SHA1b291452ed9b6a28db06fcae9ecd8dc6954b72fba
SHA256f060e953302f92dee23c2cd9224c43691b7aa93e508d9b7092a2d4e0957d6c9d
SHA512f05f1ec07b4b1a23284e51ed2662f582d3aaf37246e6116db8c83abeebeaca4640b96b1d2038885d5cf8a0409ffae7a14407d35985cbbc570241cd98b82746eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba1c1abeece62a21e8b0102fed5e5741
SHA13d00b2b1e8dd833d52d5a930397d2a1a343e4b6c
SHA25662076c2f9803bce198e2c6df9e939a88c56c2a5c3b8cf785a3baac7b86e22058
SHA5124cf0d2c08666d9bc42ed8ee064533a8565aa2691c5680564a5f353a3549fc8315535bdde4afa89ead9babdef6c3e1ee7e496e0fc02547411a94914fdb6827229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58903fefbd37e69c47205517109357b72
SHA1b3ec16c3c9f5ba55a45fbbd5d6fc15460f3d3ca6
SHA2566c692603784b4cde442eeae98be3293aa88f501a3b5c77d3824b4841e6faef1b
SHA51209118cb6fc226576c004c3317fb923248a12b4eeba201bec09c57fcbb2f06c225c81949330ed8b736ba17aaa6eea6bff5d92d385c4ed80c996f201e815b19a74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da453db0d63732a259975522e1e66f19
SHA15ddebc4de623108ea2ae0097e1d3146ec049b068
SHA2566c044355a19671663ea7cfd3f6a197496bcb9be3b307ea49e994bcbf3ccdf6b6
SHA512badb0c25b049e165f0258443cb0627763912871daa0cdc28f38744a33804785867cf87331ec58d98e14a26d9ac3da31d9ae87e4fce089f21024f7b3803b0d2c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505ce53de92a8461e8bc4add8aa609ac2
SHA1389f59314bbcc1670b5e5c11aa13e5db9501692e
SHA256e82fc310d25fa7936b57de5a91484ea97ed78067ad550139977d8b3e5dc88c0a
SHA5120f8dc84c7ff315a28874660e4d606d2d1d46eec16c6cdc2c2dda0eb9515fbd504d93f27c3c6d9340bf1ae371433346b22317ac7394ca1659d7026b19635508f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d9ca5880ad5987b057bbb7a439ec899
SHA1738f5d45dfe9c0c2050e51732e948b71dfadf8dc
SHA256057a48388c5643281813bf79e37e330965c1dfe49e77cc25f837200c09a1f174
SHA5120eb2a2a0a15691d5206bd3502a5fb466b71f4f059d99829951f741645582a56bef8c89365fddc32be2704689a61b9fb6e77f828e94ee9f38e5f2a8217dd5fae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56822d6a489091afea30000f4cb7c4b16
SHA16018f7b10ef033b32429f7478cece8006d02fa3d
SHA2568aa5502f79aec938b8271bac25a58ebc3d28f810f14799c08454cd163f95cb6c
SHA51229f0a3447467452482835e05a4d2f5a476f2d6197519d348048946af529798fa3c0419936d7e32b5a37fa34b00940d6f923bba1148389012bb69e47acebff4a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51780b076bebbc1d8ef8b4090cab694cd
SHA1c26a4bae6dd57c4c69c12804038d292a905901d4
SHA256baa0af259f8c6bbba545579660c6ff33ff0635b2295e7fc7b38cdeb71dde1261
SHA512bddb79b9526000642fdd6d01127283f5ae7fd60b8f8621e8a260fe7a85139aecbf8eaff6f7d07fe9f144a703289671e2638d645128a98703f10f1f9fb44e2f15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503ea0f439242b0ce31890dce2fa1ef6b
SHA1bda77121c0d217a545dbfac616a5be1fba697a00
SHA25674e810bec51f81b8b5cdc31bcd992bc1b7b05b9ec7711add95d2137b0fbab164
SHA5120e7ba951e13259e84cb5b08fedda8f8704aa6ccda29c6b104e9d91e69efe139af74ed49d9629bd5a1207aa4f6015a03e706a38f0901e2f717411b25aa0e41fc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5430ddf587d79f73d270d7c53f1285d56
SHA188c2fca07a57c5dc73029dadca73d06d97738157
SHA256d8f39e0f00599e4e582c906d7c7ed0aa134d71b55086098cc9dbca4b2037dfdb
SHA512dc4ab368754f7d7e2c56503a1ab39e20c883a44d1ff24b498ca1754c0a06e194ca798ae16f722a7ca4d79d88ed00d46d9453e7469341ec05cbc28a52cc4b479c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d1463b7e7b52d7800b2c89409134664
SHA17332ee02cb20f67c615f734be75927ec5acc2de7
SHA256daebef4676351fb37b493f36b35020b51ad670927b70829e1d24022f95dd5a1f
SHA512e747f218018c2509533c91ce9b5617e4fd94f39c39fc2a8d9f332617976c30e5b8843a4a2464d7771d6c251dd204fe2988b7972c8652ee42673b8f3fc10d64ec
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a