Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 03:22 UTC

General

  • Target

    UrlUpdate.exe

  • Size

    152KB

  • MD5

    df4c70adfe3ee8e7d0a7d396754681ea

  • SHA1

    86d6bc8e6961a01aa689909d678512e0e3bc202c

  • SHA256

    94a6a81ad5c12aec33d7274e43ed8197cd476bb9680724995631fd971e8a3d86

  • SHA512

    94e8fa6c92cbb30320b2067158549e6079be66489c4a2c8008ec7675d9135cddd477137b3c08fe7e7a41d2da6fcc3732d9ae10e8bc47226108938249fa33fa4e

  • SSDEEP

    3072:T6npLFsb893Sn3dkJht04WD2spOL/KGKlhcpguZh5pXK1zZcsbAM:+0nNke4WdUL/KGKlhcpguZHpXK1z0M

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 5 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Modifies Internet Explorer settings 1 TTPs 17 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\UrlUpdate.exe
    "C:\Users\Admin\AppData\Local\Temp\UrlUpdate.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Users\Admin\AppData\Local\Temp\urlupdate1.exe
      C:\Users\Admin\AppData\Local\Temp\urlupdate1.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2108
      • C:\Users\Admin\AppData\Local\Temp\ntmurl.exe
        C:\Users\Admin\AppData\Local\Temp\ntmurl.exe install scope addressbar
        3⤵
        • Installs/modifies Browser Helper Object
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2440
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\ntmurl.dll"
          4⤵
          • Modifies registry class
          PID:3024
        • C:\Users\Admin\AppData\Local\Temp\nnlogon.exe
          "C:\Users\Admin\AppData\Local\Temp\nnlogon.exe" -i
          4⤵
            PID:2212
          • C:\Windows\SysWOW64\sc.exe
            sc start efinderservice
            4⤵
            • Launches sc.exe
            PID:1020
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\efsbar.dll"
            4⤵
            • Modifies registry class
            PID:1736
          • C:\Windows\SysWOW64\REG.exe
            REG IMPORT "C:\Users\Admin\AppData\Local\Temp\sbinstall.reg"
            4⤵
            • Installs/modifies Browser Helper Object
            • Modifies Internet Explorer settings
            PID:1560
          • C:\Windows\SysWOW64\REG.exe
            REG IMPORT "C:\Users\Admin\AppData\Local\Temp\sbinstall.reg"
            4⤵
            • Modifies Internet Explorer settings
            PID:340
          • C:\Windows\SysWOW64\REG.exe
            REG IMPORT "C:\Users\Admin\AppData\Local\Temp\bbuninstall.reg"
            4⤵
              PID:2312
            • C:\Users\Admin\AppData\Local\Temp\iewindow.exe
              C:\Users\Admin\AppData\Local\Temp\iewindow.exe
              4⤵
              • Suspicious use of SetWindowsHookEx
              PID:2388

      Network

      • flag-us
        DNS
        search.netimo.net
        urlupdate1.exe
        Remote address:
        8.8.8.8:53
        Request
        search.netimo.net
        IN A
        Response
      No results found
      • 8.8.8.8:53
        search.netimo.net
        dns
        urlupdate1.exe
        63 B
        144 B
        1
        1

        DNS Request

        search.netimo.net

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\autoup.ini

        Filesize

        755B

        MD5

        846444f8094c4c64779a1487344f6472

        SHA1

        a79f4eca69692f66978912e9994e9d2b8565b08e

        SHA256

        805f1c58946bfda2635d0b9ca8723dc5f306fb00e4508ae188caa0f0a24b16a3

        SHA512

        95657d0b90df18460854af78869a3eb3c693603d5fd2fc2aad079dc18fee5488dc08df91be352010b0bf661bc07dcd787227a3b74bbe17ef5c1b54f5e45eb92c

      • C:\Users\Admin\AppData\Local\Temp\bbuninstall.reg

        Filesize

        442B

        MD5

        d1b9ce8ba9d227e61b8200e837a791da

        SHA1

        5ae250f8c2191376d9a07d80c356cedf976a7575

        SHA256

        3f0c9bf08a9cdcdb96c2401271dc2bf0316adc6d4b01dde12c0d9da32594690d

        SHA512

        265d60be34fa0457e7a7073ccfacf7748b8bddf003589cc53e6e9f2d055a0b442fe21521b78d2e2321faeab7f401eeca7d7f32b3ba65c8d64fdaa521b243965c

      • C:\Users\Admin\AppData\Local\Temp\nautoup.log

        Filesize

        371B

        MD5

        274578edd13251ea77c2a63c99556c30

        SHA1

        92219693f1fcb2e554786de7fa34ab64bb1713bb

        SHA256

        19bb112c27f6af09bd3bcd6a58f86e0005f39522d4bb93432f1e913042e96165

        SHA512

        42dea94ea9f2a9001eeee376b1fac39d6e00d999314ef36839ced39c4e197056a850b3baf5fc33230ae985826628d63de8f086e060162ba6280a7952e02d66a6

      • C:\Users\Admin\AppData\Local\Temp\nautoup.log

        Filesize

        1KB

        MD5

        3e77231c9fd413fa94790881d91613fe

        SHA1

        8cf9a1cc263882bc294ffe2d1ff5d24ae4540c1e

        SHA256

        bb3f6b0647b4e51e12be08ef1f4292d15903990b3efa46e73038471451675011

        SHA512

        64d6161ce31acd657fe274eb2c1bcdf3cd9bee233f214ea8acaf7da1e45abff1f726392ab48f1b92c8db03f1e165380717a148e623b824234c7268044f8239e2

      • C:\Users\Admin\AppData\Local\Temp\nnlogon.ini

        Filesize

        324B

        MD5

        538db3509cc0579e39a151e618cc0cdd

        SHA1

        382d4259c2ec86e5ad33b94a5d9601007383aa4e

        SHA256

        3447a237c8d3c323476c6546a6fa915c12e6dc09741428c4f0062412cabedd7d

        SHA512

        c64cedb604536a6390b5a79529fd85227288d00340e528e5cde5bf1c978d57ad8701171dfe90c2eb9286e9f25a8e9675c47ff44f064bcee421d258835289ebf1

      • C:\Users\Admin\AppData\Local\Temp\nnlogon.log

        Filesize

        293B

        MD5

        343d729b8c5192b5d6519dff5abdc9f8

        SHA1

        34a10fc20f056a61a9c8a706cd723c2c474ea0ca

        SHA256

        ec5daece8787762edc3d28407358beab0362c004547aa6937941205ec3fad1a0

        SHA512

        4703bc272ec1aae32a3592d9afe83c2a886c924485e4e77e4daf5e28375843c5da1f5ec73824562aa3ad9d36ee3a032a93f689dc759ef97b283b6b216596c954

      • C:\Users\Admin\AppData\Local\Temp\sbinstall.reg

        Filesize

        830B

        MD5

        99efeac3859992432d0973cbac6e9b30

        SHA1

        6f987006f2fe72031084bb86e18ed2f7ba4807e6

        SHA256

        a89c9dcc2775d7b98f177fd55c553e5b00d1800a59322e1e1e854a79620868ae

        SHA512

        42c441aade296c8acce5d424b919e14476d0da84a552dba118c7487415540020687fe290849214dc8067fdbc35a7a6002cd687faf048d7d2e495fd476b3788e3

      • C:\Users\Admin\AppData\Local\Temp\sbinstall.reg

        Filesize

        324B

        MD5

        058f2758bb8063271a5c5c6257ea9cd2

        SHA1

        6928513ee55a2a32871c08f1a3aa890c6147b074

        SHA256

        2e58e8a351d814537317d27c339272ec69e611daa63c7df80a3dc8666096fc98

        SHA512

        0bc4a847b8aaf00f596ef97a9942882a224397b5af52628417695724d4b9dec07547f48003c902493e71832c1622305736d7119e5a278822ab55cfccef1df1a7

      • C:\Users\Admin\AppData\Local\Temp\tags.mdb

        Filesize

        232KB

        MD5

        e794b6261cf1813091db92cf0563a6bb

        SHA1

        636546a00885e834915a9320fdf747ae2cc07c76

        SHA256

        00a12a1b9132fddf2202de9f97ccaf83264a79d5a932974ef37510a5780997de

        SHA512

        8e19e391db5c9023d33e860dd73e37099229d8730fe7ddbfd1bc3aadf9c7288ec58f29c47bf0aff9f3f00edda22be3374f83a970ce0e082014dbf45c95417d0d

      • C:\nautoup.log

        Filesize

        160B

        MD5

        a3f15fb605bd7885c66a4181e4b9e661

        SHA1

        6c1f8c5286f1d6bc33754ad2b96b92861e39c956

        SHA256

        79f16ef1a13262e965d6490902a74dee9d9818dde39c6c3ef159443816e2e8a5

        SHA512

        9c0302647a03d5e0be2b0cec4e585f9ae714d971d55057e28eeada0ce3011f19c4de555d7e204e815988a908d49fb2e5b4bac2d662cd7c7bf3219da9ec9c7a51

      • \Users\Admin\AppData\Local\Temp\urlupdate1.exe

        Filesize

        152KB

        MD5

        df4c70adfe3ee8e7d0a7d396754681ea

        SHA1

        86d6bc8e6961a01aa689909d678512e0e3bc202c

        SHA256

        94a6a81ad5c12aec33d7274e43ed8197cd476bb9680724995631fd971e8a3d86

        SHA512

        94e8fa6c92cbb30320b2067158549e6079be66489c4a2c8008ec7675d9135cddd477137b3c08fe7e7a41d2da6fcc3732d9ae10e8bc47226108938249fa33fa4e

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.