Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
02ac52d033c08cf815270e9e01585b4a4b7f6fa07e269793e73d8a347b497843.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
02ac52d033c08cf815270e9e01585b4a4b7f6fa07e269793e73d8a347b497843.exe
Resource
win10v2004-20240508-en
General
-
Target
02ac52d033c08cf815270e9e01585b4a4b7f6fa07e269793e73d8a347b497843.exe
-
Size
785KB
-
MD5
87f484a6fe53f6dd9caa957789a98e40
-
SHA1
423cb368351a68f7c70e005f7d65eb0c30120b30
-
SHA256
02ac52d033c08cf815270e9e01585b4a4b7f6fa07e269793e73d8a347b497843
-
SHA512
498124081472a22fe8e287738f79ce95cf6828ce26563f951691cc27e949396d064e301e0fcc25dadc58a9ba8ddacfcbf1cae5beffa3d090edc41bd11e15cdf9
-
SSDEEP
12288:W91mpRoMKeYmpsczjaIkqAF4arMyIGBdYVj8PZNy15ya3gb5qVT8T:W9s8MBzsujaQaKWPZasa3g4Vy
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
flow ioc 17 discord.com 19 discord.com 20 discord.com 21 discord.com 22 discord.com 23 discord.com 24 discord.com -
Program crash 1 IoCs
pid pid_target Process procid_target 2400 2824 WerFault.exe 27 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c078b961f7aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{88298721-16EA-11EF-A4F7-5A451966104F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DOMStorage\discord.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DOMStorage\discord.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000006dbd7c1ab09a4973220aae36af11ae964387baa3c4515010766474872a11241b000000000e80000000020000200000006fbd4346c9bdc02fd05eb0cdf0ede26637a676d794c2fb20188d5d0d1eb7b4ae2000000028307b098ad0fcac9d0014de3594f131eb426842538fd04d086dd0a29771b152400000006e7a4e26799d198dd4aa7a68dbb587689269ddf5b705c6d564d9df6d36e74a778c577af999cbe7f4ad8d12a80f44c0dc945a89bed1a996a1f48c963d646997f5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422400075" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 1148 IEXPLORE.EXE 1148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2824 wrote to memory of 1708 2824 02ac52d033c08cf815270e9e01585b4a4b7f6fa07e269793e73d8a347b497843.exe 29 PID 2824 wrote to memory of 1708 2824 02ac52d033c08cf815270e9e01585b4a4b7f6fa07e269793e73d8a347b497843.exe 29 PID 2824 wrote to memory of 1708 2824 02ac52d033c08cf815270e9e01585b4a4b7f6fa07e269793e73d8a347b497843.exe 29 PID 2824 wrote to memory of 1708 2824 02ac52d033c08cf815270e9e01585b4a4b7f6fa07e269793e73d8a347b497843.exe 29 PID 1708 wrote to memory of 2232 1708 cmd.exe 30 PID 1708 wrote to memory of 2232 1708 cmd.exe 30 PID 1708 wrote to memory of 2232 1708 cmd.exe 30 PID 1708 wrote to memory of 2232 1708 cmd.exe 30 PID 2232 wrote to memory of 1148 2232 iexplore.exe 31 PID 2232 wrote to memory of 1148 2232 iexplore.exe 31 PID 2232 wrote to memory of 1148 2232 iexplore.exe 31 PID 2232 wrote to memory of 1148 2232 iexplore.exe 31 PID 2824 wrote to memory of 2400 2824 02ac52d033c08cf815270e9e01585b4a4b7f6fa07e269793e73d8a347b497843.exe 33 PID 2824 wrote to memory of 2400 2824 02ac52d033c08cf815270e9e01585b4a4b7f6fa07e269793e73d8a347b497843.exe 33 PID 2824 wrote to memory of 2400 2824 02ac52d033c08cf815270e9e01585b4a4b7f6fa07e269793e73d8a347b497843.exe 33 PID 2824 wrote to memory of 2400 2824 02ac52d033c08cf815270e9e01585b4a4b7f6fa07e269793e73d8a347b497843.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\02ac52d033c08cf815270e9e01585b4a4b7f6fa07e269793e73d8a347b497843.exe"C:\Users\Admin\AppData\Local\Temp\02ac52d033c08cf815270e9e01585b4a4b7f6fa07e269793e73d8a347b497843.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start https://discord.gg/hagRbDeDWJ2⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://discord.gg/hagRbDeDWJ3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1148
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 4762⤵
- Program crash
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a8351612cefa4dbcb478a8507b37531
SHA100322c51784aef261fdbb97923e506d613d0c12d
SHA256159ec0e04f49236c4a0b256139bb49f301be61555eca13607a00f47883017f23
SHA512d1541e532ef286f0a1b781c03e0ca7b8af410947de609a498b4829b6e0ca79f1611a89fa902173c21338abe1341da6c397304ed68d075a12ae92832103b5d419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a598664b51ac6db6d12fd108564b8899
SHA11ad4d4103836dcbecaf9e40d0a42f709cafc324c
SHA256af8df484cb2e51ed9b9edec87ad2e0685ca917ef22628b069808628afde92459
SHA512900483a16236363e3a332fe4d808d26ba86b9f174d9f6f35b5df41c755240d6212b731ddc7883ec7f323cd94959aa7e066ff906686891168752ee5c5315eaded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad826cd104eb9a5926389a8ad2599a95
SHA1f00ded16c95d5d948acc120e1399fa696657ec84
SHA25617de6fe989ceca80812aa68a19d6565523b81fb8b63020a035a2771300c8ddaf
SHA512cf10515baf9ea7059b4d4b42c8888c4b7d206726d5f166380e790f01c36cd988c9de3aec393d880f90f356c48ba932dec2bb75e29b9ff70e941ab9197a9b2aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3c5fea385444da0542aa2643c85b66f
SHA1882e1819179b5ba40cf86903c739f80c33e735cc
SHA256a49fa8cb4df18a9c3b0b157225a4e95942a93e1c94c80b3a358df94bc23ccb85
SHA512a63c68ad23a692acd0a108ccd74fd5686555b2f38f952f92b4e4b0437826cc97b32b1a71c60d1db5da4b9ca2227413656fc58e6bc1efcafb0391ae0aa7446bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e80ab311b6d31f18c942aa16e5bbcb74
SHA19f3d728b7963b170507138e78a27566270a0b012
SHA2564ec5d4dba33cf58ece62b5adc4383a4bc42c438aed8473fe27e57e211fb0618a
SHA512648dd407ca04465ad8aaa975968742e5bb4ca9861ec90facc9d0496b72ddb363b05455024492b3b62d9dedbcf76eb69e0c7715992347cbeb9d935402cd83f2f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5371912d4cee2a2b197dec728d48e73d1
SHA1740d1d27e80d057c90c86c46f729784839cd12dc
SHA256ba679d85d37523bf8d4953bf288521ce8d47aac2c0071f73d6703e9075a816fe
SHA512d85af2cb48f091c8e751ed76fa3925b6a8138fc095a0cb69a13c2da2ed97bde0830cdd0b82431a53f3973c3eb10131c81388f66e317c8180da9a2b4795c1fd2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d43610683550522736f2c8c832f5451b
SHA1cf25834e0d2bc0eb2a22aced5039419871c0e2a5
SHA256940c0d1f121ea212ca5ba08e776bbd79294e4f275639ec9ed403ff7d81bab496
SHA5123eefa5bf907b35abfccefabc0785af1541fbb5d967fb3ff7870ef176d71f402f2a2b652c7d142cb333c9870045f75b76c5b4f47a1ba11575dc5439b733ed8e1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532a0a0f6ba97c959efd19a9a4c6741e0
SHA13d25905d11eed79e35b6fc39714f45dcea3a6440
SHA256a6eb4e7aa5af8cf0a4cca375d5bb186b67f77c49cf196211d5114a8d132436f0
SHA512a06d346f6737ac97901898b43dfcd77662f101d80df89b3379ad1cc73bc8d7d95816df0f68fb4cbc235f46eab7f9e9f8aa08f089549d24f28da4ea167f3074f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518d51b150dcd0ec4bd9ecdf7746c4feb
SHA1844eae9aeee1d3cbe40cd4429ae20e5e12f2e4d0
SHA256d9486a37f70def82671c01479d829b7a384ff62e1c7190077c28a1536f6e75f3
SHA512a22ab8974a64bcac091386c49c7948f28904b474aafcf5f0f67ef896e6f520e9cc16ceb38b082a78eebdaa2568fc533a71089ec51d3e2af7221b276039800b3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5136e9a06fef0834b0871703715502eaa
SHA177c69785354c378530ba827113f91981381fba89
SHA256762c0b382cb3ae26de1478f37cd01efc2c09b917aa5089056aed7bc8dac6df07
SHA51205d69ad5dedfb183cce88e7b59862864b91d1c798817720d3204253de3da68f35cd5e7eb52b2dfe56d0d41074bd608043aec81e9fbc07d9569d8fa459e524884
-
Filesize
24KB
MD5772e68d1de035263770b206d4e1e45e6
SHA180ea2abed973906303976e9f307528a02c8c75f4
SHA256013751decbff6f8520edfeece6fd9b8569e4011d708073ce4ad4828f99b2346b
SHA512ec0a6cd7e9cfa18f609ac0f44cf6122e6f5907acdbcea4a311ff2ce6bf5927e4d715ade2222fd1899805f119a4a9fc77e4c83c26827a28c32f9097dedc5f3750
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MEFTDE7Q\favicon[2].ico
Filesize23KB
MD5ec2c34cadd4b5f4594415127380a85e6
SHA1e7e129270da0153510ef04a148d08702b980b679
SHA256128e20b3b15c65dd470cb9d0dc8fe10e2ff9f72fac99ee621b01a391ef6b81c7
SHA512c1997779ff5d0f74a7fbb359606dab83439c143fbdb52025495bdc3a7cb87188085eaf12cc434cbf63b3f8da5417c8a03f2e64f751c0a63508e4412ea4e7425c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a