Analysis
-
max time kernel
40s -
max time network
119s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
16-03-2021 10:19
Static task
static1
URLScan task
urlscan1
Sample
http://voland.link/XgHcsrfsm?cost=0.002¤cy=USD&external_id=210316043550f299aa48d24b95b3594e0000&ad_campaign_id=1735701&source=clickadu&sub_id_1=1711301
Behavioral task
behavioral1
Sample
http://voland.link/XgHcsrfsm?cost=0.002¤cy=USD&external_id=210316043550f299aa48d24b95b3594e0000&ad_campaign_id=1735701&source=clickadu&sub_id_1=1711301
Resource
win7v20201028
General
-
Target
http://voland.link/XgHcsrfsm?cost=0.002¤cy=USD&external_id=210316043550f299aa48d24b95b3594e0000&ad_campaign_id=1735701&source=clickadu&sub_id_1=1711301
-
Sample
210316-1ad7ax3a3a
Malware Config
Extracted
zloader
googleaktualizacija
googleaktualizacija2
https://iqowijsdakm.com/gate.php
https://wiewjdmkfjn.com/gate.php
https://dksaoidiakjd.com/gate.php
https://iweuiqjdakjd.com/gate.php
https://yuidskadjna.com/gate.php
https://olksmadnbdj.com/gate.php
https://odsakmdfnbs.com/gate.php
https://odsakjmdnhsaj.com/gate.php
https://odjdnhsaj.com/gate.php
https://odoishsaj.com/gate.php
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 620 regsvr32.exe -
Processes:
IEXPLORE.EXEiexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "898" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0730C471-864A-11EB-A4BF-D2299A5963BB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000735e701247ffb14a865499cafeedbd16000000000200000000001066000000010000200000001554f1230c5c55647eeb41742e3682e61f42d4690613f915b8c30a4289604c51000000000e8000000002000020000000d1be57334f5eca738c3bc43e5f9b3a3e348611f8f1e8206e46dce052cdeba3052000000063a1e9763a5cdcd108274389f57a88b5fac9e263f0ad8e1642c9063b7c1d22204000000040ca69b6962a7976b1810a0e48eda550e68be169a103221a12bfa52ccd0dad48de36c0129c451e4c04385880e0a1d13a6845e3aaf1f8143ea49bd0d0b2ea40d1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "898" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "898" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "6" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "6" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60bf09d3561ad701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "6" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
IEXPLORE.EXEpid process 1116 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1856 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 1856 iexplore.exe 1856 iexplore.exe 1116 IEXPLORE.EXE 1116 IEXPLORE.EXE 300 IEXPLORE.EXE 300 IEXPLORE.EXE 300 IEXPLORE.EXE 300 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
iexplore.exeIEXPLORE.EXEdescription pid process target process PID 1856 wrote to memory of 1116 1856 iexplore.exe IEXPLORE.EXE PID 1856 wrote to memory of 1116 1856 iexplore.exe IEXPLORE.EXE PID 1856 wrote to memory of 1116 1856 iexplore.exe IEXPLORE.EXE PID 1856 wrote to memory of 1116 1856 iexplore.exe IEXPLORE.EXE PID 1116 wrote to memory of 620 1116 IEXPLORE.EXE regsvr32.exe PID 1116 wrote to memory of 620 1116 IEXPLORE.EXE regsvr32.exe PID 1116 wrote to memory of 620 1116 IEXPLORE.EXE regsvr32.exe PID 1116 wrote to memory of 620 1116 IEXPLORE.EXE regsvr32.exe PID 1116 wrote to memory of 620 1116 IEXPLORE.EXE regsvr32.exe PID 1116 wrote to memory of 620 1116 IEXPLORE.EXE regsvr32.exe PID 1116 wrote to memory of 620 1116 IEXPLORE.EXE regsvr32.exe PID 1856 wrote to memory of 300 1856 iexplore.exe IEXPLORE.EXE PID 1856 wrote to memory of 300 1856 iexplore.exe IEXPLORE.EXE PID 1856 wrote to memory of 300 1856 iexplore.exe IEXPLORE.EXE PID 1856 wrote to memory of 300 1856 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://voland.link/XgHcsrfsm?cost=0.002¤cy=USD&external_id=210316043550f299aa48d24b95b3594e0000&ad_campaign_id=1735701&source=clickadu&sub_id_1=17113011⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1856 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\259302038.exe"3⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe4⤵
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1856 CREDAT:340994 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
fc9f4bcd8e3e8be7a86e0b4cc17bf230
SHA18583c9c8f287fc9daf6e3899ddebff92f9e72d49
SHA2567e40236f7af32e99643e8e1a79511487f8aef5bc17e559f450316ec16ab60f5c
SHA5128e58c768d30c4353c3fdeda24c1045c90899c7b50cb9b00de05d29435006dad97bd473181ec27ee6686c1ae42792d712bb693e69474030d9198141e4e52beebf
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\s7iy1jn\imagestore.datMD5
256b4bdc5e16af285ba69b119397b764
SHA1f09ebec409eb7b8d8595ae2c8ae2759e4c9053a8
SHA256c8251c3f4318abbbd0ea81d02c84e58ae54eb8f5e2504f6148b6605ef6c4be3c
SHA512ca0f6a0de01859e769fc9ce61d9cfd7a4414c974d85a598b9a84ce8aef2e4ca460de59ec74ab5edb93d61de5869999332a8d73b7c74d11c6a73627bc5c496f24
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3O0J2C38\b1695k2h0hjd[1].htmMD5
28be85a8360ac7487b0b986f92b73a2b
SHA10a137849dc08ca26d75ff8539edf49608cc3e484
SHA256c960fcb402381064ae191e1c323c4c5989046b4b753db0297e3ea3e855f98355
SHA51207ef6d16e73f9120389b2762418ceebdb3df8f9ed9b8153430ec22cbd7624b64bebce3ee3469e12cba1c856fcb8077ace0bb2e3d2cb2ef45e64c3ecdb2ad9c09
-
C:\Users\Admin\AppData\Local\Temp\259302038.exeMD5
c91aa7c80fa2e6fbf094040caeabca14
SHA1aaa87f6e2b6f923df5aa4b92ebe70bb744d1f311
SHA256e5af4868fc46a5a675d9e93c4e45b9fef7043fe2263ad0bd9469082c00d74139
SHA51210bef80585a6ca2cf32c3a526aeca4072d108c8c488a5b5e9744a487cdfc48a1f3ce5935e33f7ae5b0d961e2b291c0c79c882df3f1a64f54c4adb6d49b1e1ac1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\4H0BPTQE.txtMD5
2753ceb52df774b2d3e6fe66c5f84824
SHA10c97f29303b4caf0ec34f46a1ef26509d081be17
SHA256b6f636fc7ce47802312970b005486873915988f191045fe6d18a5a79dedebab2
SHA51288e1d13c7a57b0c3b085251f70d9b43391671f3259cffa1e79ce231cbb96daf5848625f234c3b53696e90d4364fee6566dfadd2e2b538ae22a5bf051647df4b2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\LWURR8T2.txtMD5
aaebd5227b1dbff93827b7b1a6108825
SHA1dedd6354d2643ab5cc4037bd7e076c7b054af55a
SHA256d97c24eca9c840dd70c0c8f94f05e0dbabc282fead30e96613d3092308ed9525
SHA512e5967cef4a7ace44c493dc07925c89d275eb71f742939a46caf90ccfb7b5db7c2c86f96c1a442e0f6755b64f7da42cb0f1124ed35a35e45e164e742eac4550ca
-
\Users\Admin\AppData\Local\Temp\259302038.exeMD5
c91aa7c80fa2e6fbf094040caeabca14
SHA1aaa87f6e2b6f923df5aa4b92ebe70bb744d1f311
SHA256e5af4868fc46a5a675d9e93c4e45b9fef7043fe2263ad0bd9469082c00d74139
SHA51210bef80585a6ca2cf32c3a526aeca4072d108c8c488a5b5e9744a487cdfc48a1f3ce5935e33f7ae5b0d961e2b291c0c79c882df3f1a64f54c4adb6d49b1e1ac1
-
memory/300-7-0x0000000000000000-mapping.dmp
-
memory/620-6-0x00000000767E1000-0x00000000767E3000-memory.dmpFilesize
8KB
-
memory/620-13-0x0000000000170000-0x0000000000171000-memory.dmpFilesize
4KB
-
memory/620-14-0x0000000000221000-0x000000000023D000-memory.dmpFilesize
112KB
-
memory/620-15-0x0000000000220000-0x00000000002B0000-memory.dmpFilesize
576KB
-
memory/620-5-0x0000000000000000-mapping.dmp
-
memory/1116-4-0x0000000000000000-mapping.dmp
-
memory/1188-3-0x000007FEF7F70000-0x000007FEF81EA000-memory.dmpFilesize
2.5MB
-
memory/1692-19-0x0000000000000000-mapping.dmp
-
memory/1692-21-0x00000000000D0000-0x00000000000F6000-memory.dmpFilesize
152KB
-
memory/1856-2-0x000007FEFC1D1000-0x000007FEFC1D3000-memory.dmpFilesize
8KB