Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359.exe
Resource
win10v2004-20240508-en
General
-
Target
d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359.exe
-
Size
715KB
-
MD5
2683435f8356b41552418e5cc12d331d
-
SHA1
87a2d1896275282d7f3e94215fc47b48d0799877
-
SHA256
d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359
-
SHA512
6470969180651b766b3e0b295a750f35d9d4a09674b51dd427d3dbf9e03f3eee9b66873915f24ac4edb78b62575d2e493d3fca454b78f0bfb2db1d2f65ca6f1b
-
SSDEEP
12288:E6RZu520Z1CNRPZvgmY3Z3mTiUY7ZfxTvjorwDtVglN:EqK7Z8pvT2ZdUYTTjoBX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation wmpscfgs.exe -
Executes dropped EXE 5 IoCs
pid Process 720 wmpscfgs.exe 3336 wmpscfgs.exe 4660 wmpscfgs.exe 4896 wmpscfgs.exe 2552 wmpscfgs.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe_Reader = "c:\\program files (x86)\\internet explorer\\wmpscfgs.exe" d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe_Reader = "c:\\program files (x86)\\internet explorer\\wmpscfgs.exe" wmpscfgs.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File created \??\c:\program files (x86)\adobe\acrotray .exe d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359.exe File created \??\c:\program files (x86)\adobe\acrotray.exe d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359.exe File created \??\c:\program files (x86)\internet explorer\wmpscfgs.exe d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359.exe File created \??\c:\program files (x86)\common files\java\java update\jusched.exe wmpscfgs.exe File opened for modification \??\c:\program files (x86)\adobe\acrotray .exe wmpscfgs.exe File opened for modification \??\c:\program files (x86)\adobe\acrotray.exe wmpscfgs.exe File created \??\c:\program files (x86)\common files\java\java update\jusched.exe d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{2931BB63-329F-11EF-BCA5-7ACDD6433640} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007bd2b5d2c6d91e4f8f2c8e8b7d41a41500000000020000000000106600000001000020000000b59ed6a2ba99dfd36623eda9ea71abf386531347d8c4feaef875683fa52ea537000000000e8000000002000020000000b613b5b6ccbb275eac87d0ed36056869246f6810ab89114e0cbd7a488c4f583c20000000cb09f59b9cbf1a9dff78cbb3fe9f89c489150bf9de145990486c0312afe54ae540000000a7b699d1b555959b13f16b33f4862da9dc299bfea6f066701d5c3a4b6b0634c52c9abac56adb43c5fab99223572bab52decf009254542bcfaa33613bdbbd7124 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425446331" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007bd2b5d2c6d91e4f8f2c8e8b7d41a41500000000020000000000106600000001000020000000f39f7942d989dbf9a12d7adbb9bd257aef8cc7a68a0d31decbab52bb21c1d360000000000e8000000002000020000000d00838fdbbcdbb0cf4b840bb0ef69bf748a4480bf9b47577a4f43f3be22f15c92000000054feb1d2a7033fc01023e954051521ade739b42db0f222775579806fc7058b9440000000d89c3a91b59d3b8ad40f3c33344141eabdb7d8f4bbde8f388266306dcfa062ceacff6314a9ff8a4f047f1063a108a8568fbd18a38f239e5e13422ce30aa270b2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10968f02acc6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c04ec711acc6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2024 d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359.exe 2024 d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359.exe 3336 wmpscfgs.exe 3336 wmpscfgs.exe 3336 wmpscfgs.exe 3336 wmpscfgs.exe 720 wmpscfgs.exe 720 wmpscfgs.exe 720 wmpscfgs.exe 720 wmpscfgs.exe 4660 wmpscfgs.exe 4660 wmpscfgs.exe 4896 wmpscfgs.exe 4896 wmpscfgs.exe 2552 wmpscfgs.exe 2552 wmpscfgs.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2024 d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359.exe Token: SeDebugPrivilege 3336 wmpscfgs.exe Token: SeDebugPrivilege 720 wmpscfgs.exe Token: SeDebugPrivilege 4660 wmpscfgs.exe Token: SeDebugPrivilege 4896 wmpscfgs.exe Token: SeDebugPrivilege 2552 wmpscfgs.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3560 iexplore.exe 3560 iexplore.exe 3560 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3560 iexplore.exe 3560 iexplore.exe 4292 IEXPLORE.EXE 4292 IEXPLORE.EXE 3560 iexplore.exe 3560 iexplore.exe 4940 IEXPLORE.EXE 4940 IEXPLORE.EXE 3560 iexplore.exe 3560 iexplore.exe 4384 IEXPLORE.EXE 4384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2024 wrote to memory of 720 2024 d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359.exe 81 PID 2024 wrote to memory of 720 2024 d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359.exe 81 PID 2024 wrote to memory of 720 2024 d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359.exe 81 PID 2024 wrote to memory of 3336 2024 d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359.exe 82 PID 2024 wrote to memory of 3336 2024 d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359.exe 82 PID 2024 wrote to memory of 3336 2024 d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359.exe 82 PID 3336 wrote to memory of 4660 3336 wmpscfgs.exe 83 PID 3336 wrote to memory of 4660 3336 wmpscfgs.exe 83 PID 3336 wrote to memory of 4660 3336 wmpscfgs.exe 83 PID 3336 wrote to memory of 4896 3336 wmpscfgs.exe 91 PID 3336 wrote to memory of 4896 3336 wmpscfgs.exe 91 PID 3336 wrote to memory of 4896 3336 wmpscfgs.exe 91 PID 3336 wrote to memory of 2552 3336 wmpscfgs.exe 92 PID 3336 wrote to memory of 2552 3336 wmpscfgs.exe 92 PID 3336 wrote to memory of 2552 3336 wmpscfgs.exe 92 PID 3560 wrote to memory of 4292 3560 iexplore.exe 95 PID 3560 wrote to memory of 4292 3560 iexplore.exe 95 PID 3560 wrote to memory of 4292 3560 iexplore.exe 95 PID 3560 wrote to memory of 4940 3560 iexplore.exe 96 PID 3560 wrote to memory of 4940 3560 iexplore.exe 96 PID 3560 wrote to memory of 4940 3560 iexplore.exe 96 PID 3560 wrote to memory of 4384 3560 iexplore.exe 97 PID 3560 wrote to memory of 4384 3560 iexplore.exe 97 PID 3560 wrote to memory of 4384 3560 iexplore.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359.exe"C:\Users\Admin\AppData\Local\Temp\d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\program files (x86)\internet explorer\wmpscfgs.exe"C:\program files (x86)\internet explorer\wmpscfgs.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:720
-
-
C:\Program Files (x86)\Internet Explorer\wmpscfgs.exeC:\Program Files (x86)\Internet Explorer\wmpscfgs.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\program files (x86)\internet explorer\wmpscfgs.exe"C:\program files (x86)\internet explorer\wmpscfgs.exe" Files (x86)\Internet Explorer\wmpscfgs.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4660
-
-
C:\program files (x86)\internet explorer\wmpscfgs.exe"C:\program files (x86)\internet explorer\wmpscfgs.exe" Files (x86)\Internet Explorer\wmpscfgs.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
-
C:\Program Files (x86)\Internet Explorer\wmpscfgs.exeC:\Program Files (x86)\Internet Explorer\wmpscfgs.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:4128
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3560 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4292
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3560 CREDAT:17418 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4940
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3560 CREDAT:17426 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
732KB
MD5908f1a757930deab82bb4f411c46d938
SHA182e65ef36227d18c7682414e954b73aa2afbd40e
SHA256ce2fc401bdb1d0b657537f9db0dae2fb01a0a15e0a3f3fd80a7790c7e470c428
SHA512133bf927efe1c95f0e59adfc2d0c8762635f95de7c11c625ee9a20327df54228f7ee1b0448cd6149046b9e7ec51f1aa58f3df6f6008c384ede8a8afd628e9fec
-
Filesize
744KB
MD59de2c64f80b8b59dc8ce281941fdc5df
SHA14498d57d913be265e97c03de06605546ba60adfa
SHA256ddef3a3703353f57ccd5864b7e848bd6768330601619f0a122ce2e69ab45a205
SHA51268c48c23ef04485930e3fd20e12701e627d7e15d999b9eeeabed954ec21618800bfb762d145569c4a1f388d0e6b012f5d1d944af8626444971d42bc8b20ae73e