Analysis
-
max time kernel
42s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:51
Static task
static1
Behavioral task
behavioral1
Sample
MW5-LoadOrderConfigurator.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
MW5-LoadOrderConfigurator.exe
Resource
win10v2004-20240508-en
General
-
Target
MW5-LoadOrderConfigurator.exe
-
Size
3.7MB
-
MD5
7d1b2115beb8e953e67d4f4ccbe3d70a
-
SHA1
d82793470e1e997117fa26987183a73affe9b22e
-
SHA256
079306348cfcfa277c8142497832e90398350f44467c7d433def4c3b8759e9cd
-
SHA512
536338d77af5d4b48e3eb50bbd0e104993437c3dff08f054810836b619cfe661c2c62b85217d4238d1c33c5ebec68643868938b50c3949dc1ae96c77aef1157c
-
SSDEEP
49152:NFzlsQ+zyBzjozz4jgxBBjHQtD6TSNTFH4e/0bnT3p9:jzEzdzzBvTH
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{919F6491-1885-11EF-B195-DEECE6B0C1A4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6012516792acda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000002224bb54bb787dd50acaf4c8a872026943d9ea35ae8b277b1272c4ff2bfb139000000000e8000000002000020000000d466e61dccb1ec77835aeee8fd2028512b18653f25e519eba8ace64cc844791120000000798089b50fd94508044af93cdb0b421fa8f962858b336d7ca1dc667e7d95626940000000682adb11e17e5c5409c8a1c97dcc76f10c4b66ba747434f0f35159fcad96cfc3b899b10d2b5360b20d201770cbfdd80c2cb732c25dd2f13d240dc601e441efa4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2744 iexplore.exe 2744 iexplore.exe 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
MW5-LoadOrderConfigurator.exeiexplore.exedescription pid process target process PID 620 wrote to memory of 2744 620 MW5-LoadOrderConfigurator.exe iexplore.exe PID 620 wrote to memory of 2744 620 MW5-LoadOrderConfigurator.exe iexplore.exe PID 620 wrote to memory of 2744 620 MW5-LoadOrderConfigurator.exe iexplore.exe PID 2744 wrote to memory of 2612 2744 iexplore.exe IEXPLORE.EXE PID 2744 wrote to memory of 2612 2744 iexplore.exe IEXPLORE.EXE PID 2744 wrote to memory of 2612 2744 iexplore.exe IEXPLORE.EXE PID 2744 wrote to memory of 2612 2744 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\MW5-LoadOrderConfigurator.exe"C:\Users\Admin\AppData\Local\Temp\MW5-LoadOrderConfigurator.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win-x64&os=win7&apphost_version=8.0.4&gui=true2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2744 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b226c6bd7541e14c48a49a245b996585
SHA129d5932f6d945d30514570384992749dbd51dcff
SHA2561512305218613cf98e6bdeabc5594147d5dd7a8a728e5575f15aee41a8f2120f
SHA51240835364097a7f50c807749a2d36e7f99701685bbee1c4e95d1b42577a11a8a72b8522ec0e245cb6390257c048118bbe415217de38fedc9eab4a69cfc1ac4bf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541a8b989164bc8a718ec68c40df4fba2
SHA144a0e1e05b361f8cb6d206a3ee55aacf7dd05aa2
SHA25643f64b15070449f00ca7987547f0fb33839c2c3051910c66032770473fa8bb50
SHA5123e37e2aff44c7e1b5fe596d37c5229bc28ac366e0d851e7e67950d772c9be288953ac2c3b0fb56d852879b966ec1ec939b178b59a0c223405a68afa9f933f353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5539ff0d4ac16bcb46f47539330b3e6c5
SHA1baf3a30d47d4ff56291cba22f2d79a1b813efe07
SHA25667ff1219585f4eab8c1c38f91889861dc47621e53facb20b92164cfe58400304
SHA5124cbcd9c39101e64d9f89a1e3a5c13b17b412e33577fe2d1f358fd494a9505ab750ceee0804a777f8c6638e9fdd52736a2641169af631dba2f628f89e2e4f9359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f51930310ec5a0575192adfe935f4699
SHA1188fd588f3cdcd0a3e51d3866eb7659fa3b8de1e
SHA2566ad73a17303127a46a792538738bda62c82d32f8578989dcfa1a8f1a14a68e74
SHA51271234791e56345ec447ad336ce61dbe44870ca9e40c6f73e7e18a6c6e8cc07091065ce73c497e6dac97576009162961685ebadd9da9a48bd1681f4fa2b32e1a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ef4e2446d646c8e206d260deef1eb28
SHA12e67d468d7a6f5446bff1cf52539df203d6badae
SHA2568f91c00869a0b6d4d09e751c7fdc76f608db4808bb1dbdb96b0aa0a8c453cf18
SHA5122a96f3f302efc271d9cc1299d47981a5396ccf5d0d7ee708baec0301f190bb302c56d1614dd64948d59950ecd1f0e14c72a836acb14ffdedfcf43811b1201343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c16f5e53169cf39e893988abcc2932b
SHA133a35c00b0ce7a0763896b434d1403602063ecf3
SHA256226b95e3602bae3548b67a0f3c0b172574442355dfe8a08f2b6ac8afbb556908
SHA512b2e39a37a24ffa56745ee0fbd47381e3a454a03dc937b04e775b25b9b217728f664dbf9d436a31dd08fdfbbfb6e4770a68a4eae843e138671e0e49947fd83503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6db8046983c69f2a6b8073cfc36264f
SHA18cee8ab9cedc2523c05a95d3629e54be2751151f
SHA2566c7a5c0dfe2ba0f299aa939378a3fdeb23f1c5728fbc60358d8fdaca12b22dfc
SHA5126b23ff39efef200e1148fb9f73527c335beb3cc395db51505a11b13e82f88f1bc3ade24c104516d3a5b67bb91a8f0645c4c6719126951f6c855e06da3ef036be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5b58c75613a97bf785f600a488cedb5
SHA182b9edd2058cbf80b33b3e9055bbe3605f743935
SHA256b334730c9c1a81657826a369ece05a41a95d7cba65de9ca54a7d69f05d445ecc
SHA512f3db9c93024131487c0b0b8d0646795b98d7bc08afed915bbdebb752aaeac73ff51164729860b51bfd0c8b4694a4f016c89b09aa80711d25a2d90bd8aa85ff9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520104914b38acb5f2f4a17c761538b15
SHA1a677fc38fa49bf0101a20a83bddf58044efb60fb
SHA256e7b5bf259659933287b3f0fe1b05ec6ce25b40fc26483dcd78882f6d17906b1c
SHA512916ced689e526adc730c6ee1cf3a787f8cf264c8446f33d7702ec0399f64ebbbe14b2b97aabddfdd8b3c8ccb053b6f234fa14330614f9ea0a1bb8a2a7b2743af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e1033b1f2b1fe45bac04ae594a71d13
SHA1c68132e3e5ce99200b6943afb6e42aeece503ba6
SHA2565fc3c623b4b43a5819e30a0cf5ad812d584bf76cb52548b34147cb99960990f2
SHA51240ad2f68d6a99c351aee429fd64876cbbbaff288b554069b0572b513e6f041fdc410cf0925434d7b1b812b85bfa01022206ac67533366d68c5c51200b8710d3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ea02322476df9f479597ccb4c37be8f
SHA1781d3bdf9b9f0a7e6728a6c640b4623115a49307
SHA2566d3cfbdf85808dfacdd8ed552bddf9708e083e117dfc3c9b16b850e93f559a4d
SHA512b735274ea579db031c5225161186ad0bba316d893bce2c83f9bbad7ad8c2d2a96bf782f587b22d2fe163acb4443a2d960c91f876b740c266a2fc5533df21881a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8e24dce846ab4aa2362deeea197d770
SHA1606fa763e369a2a7248a9fc60eed9e20c7f9fba1
SHA25645889eb3dd30d01462fdc881dab7e70a4ff1ba8f5a3c5789a53cab2df4e3d61b
SHA512ee61618d00bfb62a94414aa9b31d73e985a338565a0afef8e13933104c56d247296131f8ed96f4a198c41b964facc0cb6dcfd96a85864a198bdd7db9fc649f87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8cd7fdd19574cfbd1bdefae76ab807c
SHA1ac94759703a5777a0013ec16866353f7553304fe
SHA256751217111ecb90787d4ea43615117ae26e175dba65f3f5eea50c2c31b606387d
SHA512d681f56458398412edcb6267ac07e12e8b82fa38d8c529b9e2864ca920ef414d4742e4fef8c9d710c2b06930787c9ced8c8f4c9abde5e12847e16c09b626c039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc7afdfc79b9ab1b69a2c840e39f88f3
SHA15319283e5cb2406e5e523ec1630f711efcaf3240
SHA256afac573353e021e2f0d269c30f7bd3ba0f3f99ab9bf2b8f2601255cf543ed0ac
SHA512f3fcbcd8f10251035620f40c23c4119502150ec8dbb1839fd735613e825e3570b49551b102c29d7fe6a000e28c56da19ffff9998e7a1b8631660c008da184a4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbe60f907e1e5459f2a0d2f83e6a16cd
SHA12aef462ef947fd665370f33f6171bf4adb94c703
SHA256a03463416f2fbd2a30c4a16e8e45f0bda072bd3cc8d9116c9b39761e9579fc38
SHA512c6ea2f61cca6784567ac6c7eef7cd9f20e572b9dc6c90c68b649740635f34b8111310e05170f09249c54530c45cc70d121ac500d496930f0454443430d33f71e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5640f2b75bf5d14b44e894e1a15ceaeb2
SHA1732367e0133ad8279d23d46c77f65fa1dfc79725
SHA2562a134869067021a05023b272a16b5d98a2bf66c6172614b82f0cb9f3cd27506f
SHA51245759fe0fac889bfa06a7fccd471e376fa737ce214ffb79794b22ef98e71207a42fa60eb4dd38b9870f419c618299dba5a1fa1eb4ff8e5a102b6e1285353b5bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff8cc4ca430b6d72b6bed77187018884
SHA138b19801c3c91b294d3ceeaf282c23e9ab0a51f4
SHA2569219261fb1dae5a5cc99c4e0439b85ba3205a4ef799e3410903fa409c1da53d5
SHA512aaf025e9144a0a379ba7ec0e607c977081781c9fc5b2c598fe427e92b3d76204bf4996212ddecd1c94ab44bb2ef412fc5caa447838de78b209d74bf6ead8a7dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eec7c9533917066ad0579e6eadb1054f
SHA1b49001f681941a74655b15ae599c26ee3fe0dce7
SHA256d71bdeb28a06aade2d767e95f1e67a7d2a0a8512086f5b59fc161d16aaa895e9
SHA5122727c0e36e89be46524a3e3e7770cc7ad2681741f7af8c46854b963c0dc03d546d663b6df6308c3a525b1691577bc9efc70f4413d61b3d773fc9d882073129d8
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a