Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 04:04
Static task
static1
Behavioral task
behavioral1
Sample
457e98f60801cb9c4d344722ff6eb230bc56e016d96d4d5cd07a9ecdf4c29f91.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
457e98f60801cb9c4d344722ff6eb230bc56e016d96d4d5cd07a9ecdf4c29f91.exe
Resource
win10v2004-20240508-en
General
-
Target
457e98f60801cb9c4d344722ff6eb230bc56e016d96d4d5cd07a9ecdf4c29f91.exe
-
Size
6.0MB
-
MD5
db2f81022aa778a94399b7d958a6ddc9
-
SHA1
ee0db450f30e20728550a7e952fc572b88671760
-
SHA256
457e98f60801cb9c4d344722ff6eb230bc56e016d96d4d5cd07a9ecdf4c29f91
-
SHA512
ba38f4f8f48b5a20adae1df39246ab3c281dca3f289ce3a06fc9a136c624f04417518fbfa1acc7dd0e885bcb82e1c990d0f828aa0328f6b4009278077d74a5d3
-
SSDEEP
98304:fbdhDqohDS1F+CRcB27OgUWZHw8VQjr+/bJBAUZLT:fbdhDD23a2sWKjr+TJVH
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
457e98f60801cb9c4d344722ff6eb230bc56e016d96d4d5cd07a9ecdf4c29f91.exepid process 2936 457e98f60801cb9c4d344722ff6eb230bc56e016d96d4d5cd07a9ecdf4c29f91.exe -
Processes:
resource yara_rule behavioral1/memory/2936-1-0x0000000000280000-0x000000000028B000-memory.dmp upx behavioral1/memory/2936-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2936-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2936-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2936-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2936-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2936-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2936-3-0x0000000000280000-0x000000000028B000-memory.dmp upx behavioral1/memory/2936-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2936-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2936-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2936-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2936-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2936-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2936-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2936-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2936-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2936-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2936-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2936-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2936-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2936-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2936-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2936-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2936-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2936-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2936-58-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
457e98f60801cb9c4d344722ff6eb230bc56e016d96d4d5cd07a9ecdf4c29f91.exedescription ioc process File opened for modification \??\PhysicalDrive0 457e98f60801cb9c4d344722ff6eb230bc56e016d96d4d5cd07a9ecdf4c29f91.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57A9AEC1-1B15-11EF-91A4-56D57A935C49} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1300 iexplore.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
457e98f60801cb9c4d344722ff6eb230bc56e016d96d4d5cd07a9ecdf4c29f91.exeiexplore.exeIEXPLORE.EXEpid process 2936 457e98f60801cb9c4d344722ff6eb230bc56e016d96d4d5cd07a9ecdf4c29f91.exe 2936 457e98f60801cb9c4d344722ff6eb230bc56e016d96d4d5cd07a9ecdf4c29f91.exe 2936 457e98f60801cb9c4d344722ff6eb230bc56e016d96d4d5cd07a9ecdf4c29f91.exe 1300 iexplore.exe 1300 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
457e98f60801cb9c4d344722ff6eb230bc56e016d96d4d5cd07a9ecdf4c29f91.exeiexplore.exedescription pid process target process PID 2936 wrote to memory of 1300 2936 457e98f60801cb9c4d344722ff6eb230bc56e016d96d4d5cd07a9ecdf4c29f91.exe iexplore.exe PID 2936 wrote to memory of 1300 2936 457e98f60801cb9c4d344722ff6eb230bc56e016d96d4d5cd07a9ecdf4c29f91.exe iexplore.exe PID 2936 wrote to memory of 1300 2936 457e98f60801cb9c4d344722ff6eb230bc56e016d96d4d5cd07a9ecdf4c29f91.exe iexplore.exe PID 2936 wrote to memory of 1300 2936 457e98f60801cb9c4d344722ff6eb230bc56e016d96d4d5cd07a9ecdf4c29f91.exe iexplore.exe PID 1300 wrote to memory of 2916 1300 iexplore.exe IEXPLORE.EXE PID 1300 wrote to memory of 2916 1300 iexplore.exe IEXPLORE.EXE PID 1300 wrote to memory of 2916 1300 iexplore.exe IEXPLORE.EXE PID 1300 wrote to memory of 2916 1300 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\457e98f60801cb9c4d344722ff6eb230bc56e016d96d4d5cd07a9ecdf4c29f91.exe"C:\Users\Admin\AppData\Local\Temp\457e98f60801cb9c4d344722ff6eb230bc56e016d96d4d5cd07a9ecdf4c29f91.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://changkongbao.lanzouq.com/ikW9T1cfeg5e2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1300 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a0476052f687ef585077589f103c295
SHA11034ab8b2cb4b861676abfab950ee6c77cce0608
SHA256ac94aa0691ea23149fd9b609afee93921d96841f688baf417136215c3039ea04
SHA512e631c6a9c915da1df6ee0b476c715e06767b9e85b00a4f5ee2f017868ab2a1f12836d93aa6e343d7f633cd56835660c40c528153c4524c356ea99efeb0adf010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c95e5f401815b7dd374783567515215
SHA13f0b4ccd4800e42f8e6c9c199a7304be5bc3cbcd
SHA25627f2d362c67af2136f4e20ea63eb6a8f6032c4697f102268ae1dfc3748e1a832
SHA51269ece9cdfc039c248440f89f72d8490ff328eb50311d1e09cc7bcd01dbc4e13e2882bc0d6bd6e544072bfe71cdc00c6fd8bc858e5c415e70b30c9bdbbbcfc8de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576d48b5d543bd88e0328d6bfd099d669
SHA130424d2a4a0150e46d52d4281584ebb3e797c6e6
SHA256f9ea3e96dcd0b4c54843dde1634a0dac642942334912fe905397c23a95a2f281
SHA512e80b88be782d55dcae10bacde569af4c46d6198ba886ae62549f12aa4bd16cb87839b84ca940a2397319c8ba3070e442fc0fec997ebade3ff3fc3af45f074ae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e94c6dfae7550d8d0ddb866645edcb85
SHA161acfc1eaccc6fbcc1a2bbc95a5393073b332028
SHA2565971265f7abfdef3b13caf74ffd28307c8001d5a66dd1dd4027f88eae9767691
SHA5124844cb34b7c04d466684f2253769a84ce6a8f1b3c4d48e7089f5759b5a38704a52ece9d21516c153e1a9a140ca08656510c067dfc078d2b3e0b4e11af4c38c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb8d8c40c864c485279f272636b76ee1
SHA13e62391edb184d7aa5ab7c9b02b7da26961748f0
SHA256d31e04e282e80a4f197e3a02ce931affca3ecd3dda4e2803cae4ad9f60c2be56
SHA512312e6f4dea4e64953f8de7d1be3d8cda405b1bf1047d64f78c32e8ced523d850f52c60d04a03f2e7c6a602f7878b983172d1776942e82bbf44aa69ba7eeb11ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f8524da72ed97b68c8517d6a6a2a87d
SHA157259e0965ad5da32cf5fd2ae6d25df609e4212b
SHA256d1906de883a7633fc3ab644539170022cebb8bd875a87eb65cb6e7b88d16c7b1
SHA51250c55011f722a65679615b72200ba94d75d632cc1a2b07b36f3c144903773f239d6fa5fea463474d87feb96cb3634854a2f2866c2a77a9a941657e22af894ce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5baad4f7cd344c1c236f091ad165186e7
SHA1d8a43d09eac2a9fe843f0eb8c5dff36ef65f8e82
SHA256b041466ac6fd3492157b7a0c725e9b37fe988338a4bb2a2a3e8e8ec286b6182d
SHA51201d072f2e11a3d9dabed0cd4c5614a4ce2e3d9b8900f782c00b9193c6b8788b5774c02f964c11e51a75880753f05545b6479153731d236082fd88eefdbec32f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff95d5917a79d689849cfda37552a223
SHA12bb1c15605ae0b470365f3f41a52649e1f793f64
SHA256e90e8f189682ce86194d45c4b40bfb88824546f81a44bd66fd4488e03f727470
SHA512394e06e917b944f73cf279fa840818a3a89fc4aa378a77a852b58d87c60c4bb0157d7f982b618165edcf5db1946e89e2901b0553703470b73eb2888280094468
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
10KB
MD5842d9e10867153ad73a1a80d79afef13
SHA133a49d893273182e8aba6e9531c3077d4ab86516
SHA2562823197bddf0203ea011003a4e70f2687da234a3388b5090a76da2c2562d33e4
SHA512e6e10f63c7d3e65358bd6e66a7328f7d06d096b2ed936cd4504cfb8c6b5f4081dd55884bb915191156965b0eb9b3fda6a97b5b1a1eee45d59a41a4e375d1e518
-
Filesize
8KB
MD502e3c0364cd93fd56fce9c2ae885339b
SHA1ffee74b2301ef0c8e88dfa37c1d180d3eb952ec8
SHA25650fd9ee309fd11fdd83f6cfe01ce6efeca5d8dd36f2cf075be2bf1bc7fa89095
SHA51258f892ade02def2692de3dc09d61161db368cbd8b1491fccc4c6ac04d70d3f971d7306fe81136437c2594750cce65b04e3e510107129f6296e722035f85f6970
-
Filesize
189B
MD5322f59ce015ff2f1f00ecbe4fdfce380
SHA1eb4756a5bb023f6d1feacdbeac6e94013e15d5b0
SHA256c96ef901d8f23cb7626ef980c4cf5bece7aafeef9b2b8b28829d3a11a51562c1
SHA5122610ce1c0a55da67faa9ddaca26529a87bf5ebc6706621682d54024fa887ca9cd54cdc5b854f8b79ea99b02a5277d6931f633fa876107d9ec1bf503bee23a02c
-
Filesize
246B
MD5b06ddcfdb64cc28ca0a0ef609de5f05f
SHA1bd95d141935795e249d2ab00824839fd42c8f505
SHA256da0a5d79dc6a120811b556885b704f9fd158b1f19dd5a9c595719feb56065f00
SHA512a1dd3cc527ce6a6c4b0ea2c369d4370f6f1bf332c9255e1a8eebfd5986c133dacc2e6c6a55071e5bcf4724f37ff2920f2e17567ca32571e664b458e526be72b5
-
Filesize
260B
MD5924bf7a4ce305dad87743ba3c5773aa9
SHA112d0fddb472394b23e5176ab4ede38974e723b81
SHA25601faf5e88442653bf38adc145d517f44d3495398e0aa666c7486b7030c126cbd
SHA5122380c957717d3bc97ae2de96aba9cd3b50a1774eb96dc47840add1b12ee13485ee6cc6c4d30953b8f42d32ae3b02657966229fcbe58a60843df0cbd6170eb44e
-
Filesize
1.5MB
MD5ef48d7cc52338513cc0ce843c5e3916b
SHA120965d86b7b358edf8b5d819302fa7e0e6159c18
SHA256835bfef980ad0cedf10d8ade0cf5671d9f56062f2b22d0a0547b07772ceb25a8
SHA512fd4602bd487eaad5febb5b3e9d8fe75f4190d1e44e538e7ae2d2129087f35b72b254c85d7335a81854aa2bdb4f0f2fa22e02a892ee23ac57b78cdd03a79259b9