Overview
overview
7Static
static
7afrsu.exe
windows7-x64
7afrsu.exe
windows10-2004-x64
7asf.exe
windows7-x64
7asf.exe
windows10-2004-x64
7asu.exe
windows7-x64
7asu.exe
windows10-2004-x64
7asuf.exe
windows7-x64
7asuf.exe
windows10-2004-x64
7frsu.exe
windows7-x64
7frsu.exe
windows10-2004-x64
7sf.exe
windows7-x64
7sf.exe
windows10-2004-x64
7su.exe
windows7-x64
7su.exe
windows10-2004-x64
7suf.exe
windows7-x64
7suf.exe
windows10-2004-x64
7Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 21:42
Behavioral task
behavioral1
Sample
afrsu.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
afrsu.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
asf.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
asf.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
asu.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
asu.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
asuf.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
asuf.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
frsu.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
frsu.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
sf.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
sf.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
su.exe
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
su.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
suf.exe
Resource
win7-20240704-en
General
-
Target
frsu.exe
-
Size
13KB
-
MD5
4c49677e80c4bc831ab50fefc7079a44
-
SHA1
038d23a3bec8e4225d9b3029af5ab98a83d5e532
-
SHA256
1827caaaf4f9286ad28339bba1a9e45b54e358e3a335defaf9e940bfb265fefd
-
SHA512
4d0d43b798d74311e4f10d8cdc318df03933d2b1bc1ba91276c19d57acd66588afd2c5eb6a07fbf2c610feaffe1a54f434fbd91c161e5ae8785aeb8473bdd473
-
SSDEEP
192:L89dBH9j/sAacK4oua7Rt77iztuO4Wu7Br9ZCspE+TMIr3/bjOg+vtwJrGTU8YNm:2zacJe7GBVJLeME/bjH8YNm
Malware Config
Signatures
-
resource yara_rule behavioral9/memory/2232-0-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral9/memory/2232-2-0x0000000000400000-0x0000000000408000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frsu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d1704edcf4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{771BF381-60CF-11EF-9F09-428107983482} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd0000000002000000000010660000000100002000000012c309f1a03398ae089edb1847705a597df436b2a92d4d7c607c4e976bb498fe000000000e80000000020000200000009c7ebd217942e55d2fdcd5caa106be9a10ec905f88b073722297fd5b801952bd2000000073571c07f796d50d92ae6eee87a5ca532f44b79b907a07ba88c2ae6094e1beae40000000ebe3f06bf9c4c8bded6491f66ac241be8a3f5ce15912415e75c684bc8141fe455194b97c78410df1772945e0b07a694d2ca7a00befaadc2b95fcdf3d51ead6c7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000fb301039356eb07972c4493400ae79f4af27a7c0c8fd30d03e95f3e093c235d1000000000e8000000002000020000000743718b86afaab7881fab576a1e61e16e7a670d83c4f27d2bc4e9b014d997c569000000065ab0dd5b319142668fcb9f385f72cd4ce6a3e8a08ed521f3e93962e56e3de73a277c6e46fa93f7861e59c327bc8f137e342cee668084c444e9426ae9303c134971b6b31ee9acebb96d141b138e069a38964fa7c4bf347d8aa4ada54c737a1acb6b907b07059e287a3834a11ac6eb09fa370abc7607534a31e66e89cc2119c29c744ceba80f1bcf8a5096e4d16690f2b40000000379d3e415b1f7a08598adca5b30b8b59456546af34d516b699cbd2f2ccc48ba3b3c03f641b4f97038af201d39ad2bbfa4692c3657adda888becb8893dff9be86 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430524831" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2700 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2232 frsu.exe 2700 iexplore.exe 2700 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2700 2232 frsu.exe 30 PID 2232 wrote to memory of 2700 2232 frsu.exe 30 PID 2232 wrote to memory of 2700 2232 frsu.exe 30 PID 2232 wrote to memory of 2700 2232 frsu.exe 30 PID 2700 wrote to memory of 2712 2700 iexplore.exe 31 PID 2700 wrote to memory of 2712 2700 iexplore.exe 31 PID 2700 wrote to memory of 2712 2700 iexplore.exe 31 PID 2700 wrote to memory of 2712 2700 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\frsu.exe"C:\Users\Admin\AppData\Local\Temp\frsu.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://ads.eorezo.com/cgi-bin//advert/getads?did=10772⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58172d9af289f541798258369086d2943
SHA15713a31cf10caf0736ed777e063b56944b21cd32
SHA256839be1445686154c01363a477865a39a6adc51fdc7f00f6f16b8ea5849604dfc
SHA51267c9bffa2615b9b1020fd36f019c6142eea23cd457dd12744ad5c7ab1d1167487b263b527e78f1765acb9baa8c163749622350b19c3c6afb2fc2e788a082799b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bffc7d8efacdff70c31849fd99f4202d
SHA14746fb02361a9493e900da3fa2d4d353b7a806ec
SHA256f6a2a20964fac9f4f1056f306eaa25c8dd4018d75239c57e19a541c6ccfeffb9
SHA5125eff9e654b964c0944f16253e70a66f3054274c13cb8a51c22bf6899e149c4a0b42881c5ead26f5a5d0222ead5e55a51bf6872d93921c36d9ab5c13c0a11c23c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5645d9255b67d7115018b0c7540d829fe
SHA1d416fb61b3bf9235b4e1620bc1f3bd03c0ec3016
SHA256199e7c3fc8c6098d47eaa4b55bde0636647c5770fde479758eb6296c07077ead
SHA512cb16343e3b9661870e65a9abcddb62eda3c95d97e3aa90356b04991436f100d106e11103fb4915eeb58b74ddfbaa2fa86d9aa04fa629b3d0517b66f57b67d1a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51be8f19a09ae644ee0cb7755b6ff83db
SHA12ca3302d1090da1c81c7bf9ad62e261d0152c6e9
SHA2564f7941919f6a3d2ab6444e010fcb75de37cb2d4dcd7c2c273fc4cf8625fe1038
SHA5122342b0f976e90218f596733ad3f5e016d4321035ccb1f5ca498e21c83c6cd1169705900e0c913ea25ee3698f951e4e3c06aa2bc00188ee4e5810869830d4f505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdc9dce9abd777b4650e6c96ad50e805
SHA183c39e62bffaa2c5ce9dc6a572250348b1853e40
SHA2561d422f26c5694df24e585a73660b4b1ad1c01c3ac6f6d2565aa692d44f7e594b
SHA512700009ca28e266e70b202966ad353dc5ab8f6b3bc113623fee33f825fef1826d4b63e7e5596d29fc2235185727162d402ce592ae8083fb59413506d0596a26a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c6d3cb3acc1aa88560e239d20de48cb
SHA1dfeb3c992beb709202f57d43f0b07115723f33ba
SHA2564d658ce0791ee6ba6936f16c738a3ffa5d74583146693dbbcbc35a10b478913a
SHA512f01365c47c96e99c1e40d01b50f0f5e12debacc0a8bd97e6961aaee7b1c43942a0df1975e49e8a0bca5f6c47d761f34ce448a218d07a1ff32532bd0a902edfc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a912e4f6e08169c178e464ec849650ac
SHA1bb8958b9f90f6f2462010396e81341848da69e9c
SHA2568cf3c84a7dc42591b9d081cdad2d2f5fc7fbd3659c91b3331d7a36ddc80cfbb3
SHA512f0806a2942bddab2e084bb38a16046964ae2a26c9559a508a5ef465824495933af9cc895ebfee8a2186406c398ed1244dfc1641cfe2169e38e802024b044cf7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53045d2b4aa0b5712936ec94c2e27699a
SHA1be87bbf60406e3f0d4be21f323a978ac3ef56595
SHA25688e3fd53f3dc7318c14ccb28f49ebe8bfa20bee460ce96310263d22e0503f4de
SHA512cb4ec6871f2e6d52d7aafd369fac149b06d5afc8bb415645cc1b8c3084bafa2da5807f8bde05aeb689bfb600292c2b0b4b097222539287fc84220aee97208fa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5773956ce4cbe68c888f8f17b898c3726
SHA1f0030b5a229fd04dc7b9a40360a3846c39eb855d
SHA256c773ea7b0e54e49d26c9dd7ea02a8a643c34c87bcad9167411fb3c1b496d7315
SHA5129608887b6658b18dabe9a5e14e47fa3d981880b16d0ff8c3d157f790e50ba25b452345a08730870adeaf92f1cf322e7eb151f05c8fcae7a3617556915c24b56a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53335c2bdb842e1418bcd5cbb503f6363
SHA14f217cd423fa3dc32acfaf351e0be96f231504f2
SHA2561de9da30cbe04fcd5fe3dacdee359044069017cf64161dc55c885431acef2915
SHA512ed73eb1f94e73d7fb4dd15909a6bac9ee7094137a2bf032bcf4d42e474718837bed4d0497c3bb1558c246e990b283e1b6ce33a44e2afc6cdd7a106d79e3fa3f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c289e56c9b8153f11e151573dc70b060
SHA10ef6c2145abcf31f47817a79669d5e4b73241a0f
SHA25629f56b51aaf1749363d8964fabf1f49c40ccb6469dc77941412309f36a16a9d1
SHA51217a9c61d51fbaf435f2ca5ac2d7924592344a4edad267d82633c2d1bb9a9331263f8918d3ead065cf9f5cdf28f924fd3d0edd8f8116d4a666c001f66d48a526f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56185f77fcb7a3ed2e18eff7029254466
SHA1a161054a515111cc9f8b573a6c2075d7b9af6759
SHA256efbd7b997235f9b9803620efcb838cf5e3a90285a1340f2a3a167ea34521316e
SHA5129421a95c9d65a25c52969e0d6b8f6a7f265692a777c05669d776d4d8ac5b43fbbc7e5ed0fb29da869dad9393f1ba0e5b58cab821f04132d62775ac8cbb561b00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5881ef3fe651f0345205740083b75df02
SHA19017b11d939d87d7049477da24dc0df7c9ae5802
SHA256f420ab4770dd1234bf12f86bc2533aa3fc9e382b88a0afb8634e3af6eace9b96
SHA512b0b20dd130f7a74a38928ff1b1e9b1ec5de1932a8f695cab907a9cf4c55b053dc2c47c7f5edb5cbadd43e6d49c7c944858b053b5f62835bc63d13da0337cb5f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e423686109f93f8872f6f0458e24942
SHA155bae05fb776fa86c96432984fb92ea60e79622e
SHA256d867777d56a1cb46cb843432d9a03bc0dfb214386f48f8497a265d531655b774
SHA512a1df45276efbc4c3dcd624f2b871f4b9354bf75a5b6cbdca29387fecad254744aa30e9b8995e5b5a3c065d390d2e48571147b3456d11fc8ef8c1688afc3e079a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b