Analysis
-
max time kernel
36s -
max time network
115s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
10-03-2021 10:33
Static task
static1
URLScan task
urlscan1
Sample
http://voland.link/XgHcsrfsm?cost=0.002¤cy=USD&external_id=21031004454cb2eb37c0864d9f84e2ae0000&ad_campaign_id=1735701&source=clickadu&sub_id_1=1711301
Behavioral task
behavioral1
Sample
http://voland.link/XgHcsrfsm?cost=0.002¤cy=USD&external_id=21031004454cb2eb37c0864d9f84e2ae0000&ad_campaign_id=1735701&source=clickadu&sub_id_1=1711301
Resource
win7v20201028
General
-
Target
http://voland.link/XgHcsrfsm?cost=0.002¤cy=USD&external_id=21031004454cb2eb37c0864d9f84e2ae0000&ad_campaign_id=1735701&source=clickadu&sub_id_1=1711301
-
Sample
210310-br6b22dzz6
Malware Config
Extracted
zloader
googleaktualizacija
googleaktualizacija2
https://iqowijsdakm.com/gate.php
https://wiewjdmkfjn.com/gate.php
https://dksaoidiakjd.com/gate.php
https://iweuiqjdakjd.com/gate.php
https://yuidskadjna.com/gate.php
https://olksmadnbdj.com/gate.php
https://odsakmdfnbs.com/gate.php
https://odsakjmdnhsaj.com/gate.php
https://odjdnhsaj.com/gate.php
https://odoishsaj.com/gate.php
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 528 regsvr32.exe -
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004b9a8c6b8a47a649b3ff6c42f014be9200000000020000000000106600000001000020000000a32d3b835c3aab33ee228ecac14ed25f7aa6c9e38a110b2a5235c96503435733000000000e800000000200002000000043b5f26224dc85a9eb6610227a84c2030de31eef0ba4f4ffc1016621666fb17f90000000c2462c6496e3dbdeb7d791da8dfd6f60b6666ced1d783a0fb187d70364f812541be1e4e453e82d6c3c88f8476f3ed7c8d349dfbf357097d858d9a4347cdd627a8a03e07dc2123c22dfe26b188dbf3d023a775b96111af64bd324dd16ec0143ee38cb31bb6288c760b0bfec82ee25b2d0d3417ab87a10c5b0b883c39ce4a4825c0465009aa59ef772762213b1719a6db040000000e216ae3c92086e006dd24d49e276088c08e354beaac01cb85a88fb3982d5b7692e972f51143c822a102fd90dbf8d93d0e66529028dec8e51e2ff0c3841bc9f2c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "6" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004b9a8c6b8a47a649b3ff6c42f014be9200000000020000000000106600000001000020000000e6e690fd335a8a6c6044a6feeb95cc586edbb8e2e59caa2098f3323b079bdd91000000000e8000000002000020000000b4ba28c0b263d1fec579dd4a785fcde62fc1dd3ca9615f2fe33002770dd51bb2200000001033418970787810368240f2430ba8a0d2d5593e706ab8c46f343e134b95728e40000000b6da81c125dc146e42cd979fd12a9c8a70972ebb86db134cd5760771a97d0f8285449bc02669bf203cc38b68b9e51e3b8e99843bb30d0c9102e9277f3730e28a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "6" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "6" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "886" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e01dd0aba115d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E0B3D3A1-8194-11EB-824D-DA78EDA9FF87} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "886" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "886" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
IEXPLORE.EXEpid process 576 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 1656 iexplore.exe 1656 iexplore.exe 576 IEXPLORE.EXE 576 IEXPLORE.EXE 1284 IEXPLORE.EXE 1284 IEXPLORE.EXE 1284 IEXPLORE.EXE 1284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
iexplore.exeIEXPLORE.EXEdescription pid process target process PID 1656 wrote to memory of 576 1656 iexplore.exe IEXPLORE.EXE PID 1656 wrote to memory of 576 1656 iexplore.exe IEXPLORE.EXE PID 1656 wrote to memory of 576 1656 iexplore.exe IEXPLORE.EXE PID 1656 wrote to memory of 576 1656 iexplore.exe IEXPLORE.EXE PID 576 wrote to memory of 528 576 IEXPLORE.EXE regsvr32.exe PID 576 wrote to memory of 528 576 IEXPLORE.EXE regsvr32.exe PID 576 wrote to memory of 528 576 IEXPLORE.EXE regsvr32.exe PID 576 wrote to memory of 528 576 IEXPLORE.EXE regsvr32.exe PID 576 wrote to memory of 528 576 IEXPLORE.EXE regsvr32.exe PID 576 wrote to memory of 528 576 IEXPLORE.EXE regsvr32.exe PID 576 wrote to memory of 528 576 IEXPLORE.EXE regsvr32.exe PID 1656 wrote to memory of 1284 1656 iexplore.exe IEXPLORE.EXE PID 1656 wrote to memory of 1284 1656 iexplore.exe IEXPLORE.EXE PID 1656 wrote to memory of 1284 1656 iexplore.exe IEXPLORE.EXE PID 1656 wrote to memory of 1284 1656 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://voland.link/XgHcsrfsm?cost=0.002¤cy=USD&external_id=21031004454cb2eb37c0864d9f84e2ae0000&ad_campaign_id=1735701&source=clickadu&sub_id_1=17113011⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\259313020.exe"3⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe4⤵
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:340994 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
610d94d779298831dca531702438a1b0
SHA16a983013430228c6cef45ec24175b36683670d1b
SHA25664ec5fe2ef9cfe1e3c3c3a4152b56c76b92f1b046e6aa719fe4c5ebacb2912a7
SHA512aaaf209b74ab38a54af59f01605eafd0b9a398b3a416e17d65d333fd2f06dea1fd912f6e074571537fa3b020d7edaa546ea4c07986563745c036a5eaec8ebe9c
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\s7iy1jn\imagestore.datMD5
eeeb0f7e6e731ed42d4fbe57691ceb1e
SHA151bff0acfd7023bbaaa588e0665dd0c47933ecf2
SHA25658b15f36c3a2ee56c584aae6743b626a975c33c314b7ee54401823029b0ff937
SHA5126a9859a47ee49dcf024811a50db72d0f228027db1e39680645882788bf1e45fd02e437316e3a065a7abb5dc7296a4e8a86ebd43e6833b46737bf872b5ff99a90
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3O0J2C38\b1695k2fglqu[1].htmMD5
e56926e926ae14372bbf846021a4f34e
SHA13de941e5e20ec55e6ee8e48d87d4bc5194401e3a
SHA2564010f2a7826f734ec579af52a96a75e32af21c1c5cf6e38be36240d522f71a2a
SHA512b916f5a321833d1b00bc980666e66e9da1a4ff28959ece447330417091d069cd69ed01919d8d54e6fccb54c7309b1c7bb0d50bddef4517bf94d783c701b3ec2a
-
C:\Users\Admin\AppData\Local\Temp\259313020.exeMD5
7a4334c164c28530b28858559643c6b9
SHA1ee3ebcb8b28702c50b0083db163ba5876f40f54c
SHA256b250b1ccb8194ce1ccc86b4a88bd7279f6804fac990758e95d203fdd1d97dcc2
SHA512e58a00c9b7b947d573632097eb056b5791b0b3d4577ff5e4635b8056076d599240e128ac948a995c2c8102b2a2d4550c0d7edbd3d684f5364c44467f64e50c45
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7T853VIE.txtMD5
db8586b5bcac56f0c0495f095bbe33ff
SHA1a793ae3598880d936b73b53f3eeb8f0d0080bca4
SHA2568a90f9128167931175fc8aaa614ca5858d16d4f32d57527bff90ab6a42e41c0d
SHA5124dca210fe3fd299e9a5fec740e49387b8a0746bb35886371cc329368a94b6f32c6114ebfcba1745023130a7be229175a6c526c0969e7ab7b7c3d25ec6ec3707f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\SBK6GT8Y.txtMD5
45db68dfdcf5d5b5338d0b8095727661
SHA1cfc54b1b5d8c5dd8d2112dd7451268818c03f664
SHA256cd01d4e534a12ea748816ab67ed4fa207463f005902a24a0b179af5f10f83ad1
SHA51280c9e92e1ff1a5e10db55ef8b84447469a82db83820a41c6b7d6072af71a37c309baf39d1c971db16ea47856818995056f4d69c2c88cf0cef2e100efa56086cb
-
\Users\Admin\AppData\Local\Temp\259313020.exeMD5
7a4334c164c28530b28858559643c6b9
SHA1ee3ebcb8b28702c50b0083db163ba5876f40f54c
SHA256b250b1ccb8194ce1ccc86b4a88bd7279f6804fac990758e95d203fdd1d97dcc2
SHA512e58a00c9b7b947d573632097eb056b5791b0b3d4577ff5e4635b8056076d599240e128ac948a995c2c8102b2a2d4550c0d7edbd3d684f5364c44467f64e50c45
-
memory/528-7-0x00000000765A1000-0x00000000765A3000-memory.dmpFilesize
8KB
-
memory/528-5-0x0000000000000000-mapping.dmp
-
memory/528-12-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/528-13-0x00000000001C0000-0x000000000020F000-memory.dmpFilesize
316KB
-
memory/576-4-0x0000000000000000-mapping.dmp
-
memory/1040-3-0x000007FEF7BD0000-0x000007FEF7E4A000-memory.dmpFilesize
2.5MB
-
memory/1284-6-0x0000000000000000-mapping.dmp
-
memory/1292-17-0x0000000000000000-mapping.dmp
-
memory/1292-19-0x00000000000F0000-0x0000000000116000-memory.dmpFilesize
152KB
-
memory/1656-2-0x000007FEFC251000-0x000007FEFC253000-memory.dmpFilesize
8KB