Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 02:40
Static task
static1
Behavioral task
behavioral1
Sample
59c60faf837ec8ee08487f0b767a0a1122395f9d1013e032d7de624c1dddffe1.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
59c60faf837ec8ee08487f0b767a0a1122395f9d1013e032d7de624c1dddffe1.exe
Resource
win10v2004-20240508-en
General
-
Target
59c60faf837ec8ee08487f0b767a0a1122395f9d1013e032d7de624c1dddffe1.exe
-
Size
9.8MB
-
MD5
31c3278d6e3de01677e9a75c6719b7c8
-
SHA1
a92d6737e3d6b5a69e49e1d64086c1dc822c6875
-
SHA256
59c60faf837ec8ee08487f0b767a0a1122395f9d1013e032d7de624c1dddffe1
-
SHA512
7a32d0a0b399fd09743b6a05e6b326e194a385b0efdf23d10088d7328f9efbac8a4449fda30d4636df0240dd8229cebb921e3c5737c1a35feb619db2bace9b2a
-
SSDEEP
196608:ynwReZJal3OuIMEgF3EeS+tpxH7qGaRQV/BTGDa+q4fD6Bnl/MGxPB5gmtj:yQez4+uIMrF3EeltpJu5QV/g3qBnl/Fn
Malware Config
Signatures
-
Downloads MZ/PE file
-
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 2045e4f2dfc5da01 iexplore.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425358725" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2F6E6841-31D3-11EF-831B-46E11F8BECEB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3052 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3052 iexplore.exe 3052 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3028 wrote to memory of 3052 3028 59c60faf837ec8ee08487f0b767a0a1122395f9d1013e032d7de624c1dddffe1.exe 28 PID 3028 wrote to memory of 3052 3028 59c60faf837ec8ee08487f0b767a0a1122395f9d1013e032d7de624c1dddffe1.exe 28 PID 3028 wrote to memory of 3052 3028 59c60faf837ec8ee08487f0b767a0a1122395f9d1013e032d7de624c1dddffe1.exe 28 PID 3052 wrote to memory of 2740 3052 iexplore.exe 30 PID 3052 wrote to memory of 2740 3052 iexplore.exe 30 PID 3052 wrote to memory of 2740 3052 iexplore.exe 30 PID 3052 wrote to memory of 2740 3052 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\59c60faf837ec8ee08487f0b767a0a1122395f9d1013e032d7de624c1dddffe1.exe"C:\Users\Admin\AppData\Local\Temp\59c60faf837ec8ee08487f0b767a0a1122395f9d1013e032d7de624c1dddffe1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.smartftp.com/get/Client?osVersion=6.1.7601&platform=x642⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3052 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD58a6d54c1e8c7bb19656f8e4c1808ff16
SHA10b8045a8f2962d014f32b0c5391d2a617fa6f6c7
SHA256d0e3f9b1a76ef12eea266b8a6a30e87174fba6b1aa98d372bdb6d011226dcd96
SHA512e58ed18436b4191cce5af17165f652dcb3433c7138764bef3fe73698f21210e73cf8c9ce6b09b924092e2b92b307f09957cda327e6ee52b806019b99b143d68e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c2c8b5763a86187512cf2758b3c0e76
SHA17a2a57eabe7c08d8bb1826692d664bfef32fdb9d
SHA2566fd8b64a84ee06c3c10ce43a1a250e0b7b8d8d1a72cf68426ddfa462d96157bc
SHA5124e36ef438b1afc95f1705487dac25088b2311b2c2a5029fb7ba642b39dadd8a3c272f40caf8913d3a03bc18f1ce60b1f5de0f1e5a6d1284ee7a00cfb0a472338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a9f5da111f7e90d936da665845a46ee
SHA1e426e2818630bcc4a16a44837d9323317134306d
SHA256ca32f2703274db159aa74e64f81b27ef2805627d125dd7a99f4cea56e650172c
SHA512d014ee035937d585efc1a6c610da54b79a0534a315bba900148d5e472e2f8dc9f18798eda20d2acc7512298e81f3628865d3a7a2bf5321a56cfa0e9162269be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5789878bd35cea07f36d29416720dbc94
SHA196ebccc02bb5c36111876e3f9b7831e5ad385672
SHA2569bffb07347b24e56154741c0d15e9a5c7072bffaf14c3c8f4a76d1994545417c
SHA512beb525d5b1912d9fb78dcff84eab6c84ac84aaefd442c61905e5a28e2a8e960f1098f998951f17c50cc5bd0f4eb65a9cc618105c5678df8b4578400b6f0b2030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f5997aa36afb229cb493a093fff8bfd
SHA1a09becefb421d6b06b38dc64e9d82d0a2e0f4d2e
SHA256c854d11063f06b534cc52943d6a0aaaf9abcab5744f456130318868f86c5d6d0
SHA512133b4d51055c16fae1bbe7a6cfb471a62fa0eb2b59f24a92ce31b80830ad630d9832e68dfce3fa480bfab4de70ae5f804d76b5140f049fff19503a0ba5d78987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c087e73c4eff8d73973796f094a018b6
SHA119d7ca97d238c6822fd3804ae0b53805dfa6c714
SHA256019b785f31cfc242f7af198358362120dcf975b04521f34cc4fe66d9cd140244
SHA512310355b0a6f5e99035e922e86df8079c8ff1ebb6efc819fe6395cd924bfc661cf64c51b224d39bdd8a5d56cae94242b1fa2c15193396d603bdb8ce40745c25d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eba63bac1b824866973d57c53076ddc
SHA189a9ba9d047628bfd1ffa94b2e09b3da1191ed49
SHA25619e06f70586fffab642ff76a4f9711bd691996e324a095b701d0de1140869de2
SHA512f260e8f2c75855ee59887e42a7559c247868a778013fe5084ccff0374b8b5871697dd02479b323964799e139b91e3af5d86695aecb8a1109f7f10489bb0decc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f3ca67fa7a5f8b47012672cbc6d550a
SHA14286a46354f6449b69ca4862d4b175f8ec5f6ed0
SHA2565cc0f8fc2c81660dd61fcb980e1b60acae5be61f315ea00fc21f32c1a0c91ec1
SHA51223456236bc88dd1ea63112ae892fe9a7c8f65243301ba02e59ee35961119ed7c017edc694cef16afde8f3f157f7a5e96aaf5b2e7b860099843e90aef32b1d4d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7ae5aec1a32f6d9e414bad76dc30de2
SHA13c0299634f99bbe7ec9f73580a94c1a762a9b61c
SHA256c4292b6f3bed47253d02c2356e9598e1cbf4d0a81b8ceb12284d8f0122e61c0e
SHA512f4280f40cc3c450857bed615502539fe7e46b95d4c5561921622b772c4735f4d602aff5e436275debd370aff1dd8aacd34ff739033979967bc6f49c1c0e3c7b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542d77b402e7d1c93055bb8996dc1b47c
SHA13df9c2048bf13497612492cb668ec844483beac4
SHA2569b2514e4c2767a6b5696dc802a1e9edda770ebe527cccb0b350e6c7ad60e0b5e
SHA5128e67857696899cbadf3daf2ff47b4483f6d28d1d347d34ab1f8d21755f4063817152d9ada6b8df3ae98e81c253e56e20cf532b8fd8bdeb6557aa1d5f87823d5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebefa0ed1ddb0bc670e40820f5d3c9bc
SHA14a129fa22780eebd7cbd0b3651ebe7fc9b96885f
SHA256821c0f2cbff1f5c6b5f8bb5e7ba81ee03d4ac2b5060c7b66d3acdfcce79374a8
SHA512ef9a2d198038bfddc8949fcd653bd08a1b26520d1db700c2a6e9220b183e21ededa945531981f9c9e93c83b15f73126a9ce1bdc89da0e16c512d01535c9c36fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ba7aea7aec714f0f4df7563652b0dd7
SHA1c63bddb09acb6c2ebe4fdea2f1966be2ab200723
SHA256f83d0f29a55997e815837ddce9faca5e7ac471cc76dd8c2d7294a30626037e0d
SHA512631926910349a18b9d80a063e0aee1a9ecc98e4120b52ac4ef1fe52c588cbf3d26db595177b75a5f32db7be4c5a415ea626c419c2c4ed485e02fa4a8a332465d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad1f19a10eedafaefb7d48de527ecbce
SHA1aee801cd3d0b56cf26028d4bd5b53c6235ae030a
SHA256a9b12d1fc967d266efbb1a5b2475c0eabebc127a580cbbc9ecc0417b6ba7673b
SHA5125c2ea6e20a19b6cb375d2cce3af994190bf32e539d2c00630e2c59d53562dfeb8d2bbf2a42323a9ea198401b6eb433c2ba28fc950a9c582eda36b672bd140264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5947b8c285636d69bd34cb4400257c2b3
SHA11f24187ef5a41734d02f5e94825c06396b701f19
SHA256465a8b90a1834f8b1beec123a0e7ec2b896574d6cc951d41e27751632af9bd77
SHA5125d2af1d4eb3fe1813830e314e1c268bc6e55c40bee2397a303716497937f282c022a4e3490c25abefb10c1eceaecd5ad3fe8a9adee55c97bfdddccc33fdfbc52
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b