Resubmissions
06-10-2022 21:06
221006-zxrwaaaga6 1013-04-2021 12:47
210413-myxlaxh4ta 1012-04-2021 13:54
210412-6sz4v79f2x 10Analysis
-
max time kernel
1744s -
max time network
1744s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
13-04-2021 12:47
Static task
static1
URLScan task
urlscan1
Sample
https://keygenit.com/d/3e16ccf432109nspn247.html
Behavioral task
behavioral1
Sample
https://keygenit.com/d/3e16ccf432109nspn247.html
Resource
win10v20210410
Behavioral task
behavioral2
Sample
https://keygenit.com/d/3e16ccf432109nspn247.html
Resource
win7v20210408
Behavioral task
behavioral3
Sample
https://keygenit.com/d/3e16ccf432109nspn247.html
Resource
win10v20210410
Behavioral task
behavioral4
Sample
https://keygenit.com/d/3e16ccf432109nspn247.html
Resource
win10v20210408
Behavioral task
behavioral5
Sample
https://keygenit.com/d/3e16ccf432109nspn247.html
Resource
win10v20210410
Behavioral task
behavioral6
Sample
https://keygenit.com/d/3e16ccf432109nspn247.html
Resource
win10v20210408
Behavioral task
behavioral7
Sample
https://keygenit.com/d/3e16ccf432109nspn247.html
Resource
win10v20210410
Behavioral task
behavioral8
Sample
https://keygenit.com/d/3e16ccf432109nspn247.html
Resource
win10v20210410
Behavioral task
behavioral9
Sample
https://keygenit.com/d/3e16ccf432109nspn247.html
Resource
win10v20210408
General
-
Target
https://keygenit.com/d/3e16ccf432109nspn247.html
-
Sample
210413-myxlaxh4ta
Malware Config
Signatures
-
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 6ead5207ab2cd701 iexplore.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30879860" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30879860" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a014e79f7430d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30879860" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\RepId\PublicId = "{F55991B2-C06F-4ACF-9554-69D719D8EF21}" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007c369e1f7dd80e4a838305ff88bb1ffa00000000020000000000106600000001000020000000ffe1aed37f802d3c32e9eadf67d62c01afffe13c4d7193ab09d6ddec84165e26000000000e8000000002000020000000e6dd8c40cea34fcd6360035a99e6908f8541e4dd4d3e7b69ec486e7fdf52ff0320000000b7b0f1b87e213323330d155be0a18b319dabcfad998d328f1b625075d7f087914000000069a76d5857fbcac1409d20a46e9eb2dc740bcaacee163cdbbbe4669b2afe12b166c9ea54f71b343247d0ad8143a91a46f97e575f1cd61d4924e64b6ad9bcb8ea iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007c369e1f7dd80e4a838305ff88bb1ffa000000000200000000001066000000010000200000001e5063fc69a3004b28162855430b0e1ef24a42eee034c0e5e7112f2147fa4246000000000e800000000200002000000048e5d672c2aab566d43eb4db74e87fcf78eeb150fd69fefb9ef8d9f64585fbba20000000e610c6a72c3290362b3bda5f89c7f8978e56548a3e21dfc0531045d21451de9640000000e4ca813f955171a81b8d3e26c7a5f5bff7f6318a8dd11f7119f0661786e61eefcef70273b74b94b9cabe12ed41734d13448b3ca71c86bf9d6acee16a7d09ffbe iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30f511a07430d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C32619B5-9C67-11EB-B2DB-6AC8DF09D482} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "325090486" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "325139072" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2556003282" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2633190761" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "325107080" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2556003282" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE -
Modifies registry class 1 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 668 iexplore.exe 668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 668 iexplore.exe 668 iexplore.exe 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 668 wrote to memory of 2168 668 iexplore.exe IEXPLORE.EXE PID 668 wrote to memory of 2168 668 iexplore.exe IEXPLORE.EXE PID 668 wrote to memory of 2168 668 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://keygenit.com/d/3e16ccf432109nspn247.html1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:668 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\59D1C89B35882FB67B19C498B4BDBDE0MD5
bd5a6a2d0c9328b5f14da28d995d2899
SHA1857ce8657c508207fa4e7abd11c770654c52ed24
SHA256d319f5b42825ea80a24f371ee6081a9454e655c5738fde7c89a199da23cb4644
SHA5128597622f6a63bedab2b409834e6ae1e6c3068692baad0794b5205f476a94c783f1bcef9aed50945fc9491487e3e363ca9efaf41dbb46af43abeba8b0c7827bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\644B8874112055B5E195ECB0E8F243A4MD5
d1b1f562e42dd37c408c0a3c7ccfe189
SHA1c01e61a5c5f44fb038228b7e542f6a8d7c8c283d
SHA2567f468f04fe5a1b0616685f157a4285090b6ed3858d4cd9efe915aaeed83c158e
SHA512404d279fabd4886008e47e9138f799cf398f0aa4c8556192d6e45dbcde99eac2cd65c47b9e0b88bd6d3a6529818f6048a23a197a913fb917b19dffbbd5d75850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
92b990209682cc77ed43cd2e3b0dbb61
SHA1be61b32b4ee38fd6754286fb9018ba1a06259534
SHA2560c899d7123343b133b33441e4bfc3a07136680755e8d5177da56df74f3ade6d7
SHA51243f0a15f76f88d3c51cac576543b2725bd41e8a456ac5ef928ceb068560ce5c9297b5f4af7d99e82d25e59123f066bc3d1c0602372c4f4e090f4e6c173329355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\59D1C89B35882FB67B19C498B4BDBDE0MD5
326665bbda1477df1ec90aa1c8868915
SHA114fbd191a977bfdedcbb2b7a26b19a78a11507f2
SHA2563a2ad536434d5a6def8aedce8da6e32c64fd982cc4659a986176be440badffe8
SHA5120710e6772e50737686e68a996946cb7422a31f485ed459034d10f3518a3e41edef8ddecf0c2c4956e44a2178823321b6f08ded30331109c28653c716f511a6c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\644B8874112055B5E195ECB0E8F243A4MD5
9dd6ee67c7371e7153f100d64df7daeb
SHA12861ca44b3120f024f3547dc1900e10274743f4a
SHA256dfae28bdf209543ecaedca20b53e1cb81aaedeb82c67fed49e9853d71a00651b
SHA51241f687ad2f9a22bb7f168e245d386b9edcb42616a118d71e72180ef162ef059875377311e7d8949da8af6ba3cae7d23109c9e708b1af75ac69e47d285708afd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
870683f79a79944545910a13116340a3
SHA1d422b2af6e3226a2c1a1828c1130b2ca2f574e87
SHA2561ce479fc862fd109441c379859d66767b4032a64a58f14bfae4604cce49e7b47
SHA51297c41a992f2cee4bc1f4abaa390b9d292398c1ccc90e68becd2cab1e77b42579790a2e24d45c9e9c260ed3fbd8a5f70a49b5438db642398c8de522ee1bd8a86a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DRMDU4BX\R_wipe_clean_11_serial_key_gen.zip.n9yxmxl.partialMD5
19666eb40bc21505beadbfb2c2f70c46
SHA1832948f602398b5700ecc8e9eff6f3301f34278c
SHA256da08a353d0996d7c3f4007ba7900dd2b5515c06e126d04b4e79cbbbdcf5c4c90
SHA512e8d2defff2592b3b5987b67daa6f911e156401cc8839095c79588ee1d4642ea09c3d8c4357d591160ed4be378da064932c455a06b38df1f31b68567f34591eaa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\5PYT6DUL.cookieMD5
dd4cc5c726970ff6d66ed4412ff51af3
SHA18b2f0c96513e19e4d1fe20065227b27f00c1caed
SHA256a79deaa74d43373a2d0f9f016bcbce9e3361649d6dc6c95adc9659dce4de0860
SHA512ce5b2cd2637767d3db9c93d973ae9454b20914dfdd9a9ba0f08821afcc419380d24ce6ef23cc7f06270f40271e479722266147a60b1d3e12c85ce7f3ea8d46b5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\QODJYHPO.cookieMD5
095ba42e019998ebf71872225485080e
SHA13b12fc7ee84b732aa4968f39e30ddf89eeb40006
SHA25618ebb9be9e1a65b711fd729762230816ec4d84e466058a5e702226b5a641c1ba
SHA512efb3560b95468302b8bf7c62bacca2f0b35a9191115c1799f1a26bddbc175f9d83c07b32dfdad5c0e7fc2bf353ca24ecf28facd47a9aacbcdaceb2458858a8eb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\VS47S93G.cookieMD5
4c5ae1a4071550b9e98379e0b9b7d08d
SHA19ccb668e706b1a698cc7629bc055d43e8fc486a5
SHA25656e38eebacb35dca580636faa747ef350544b8f330a678f6ce4d829e1cc917be
SHA512a34a0cf3e011cd5048eab9daa961be518d80ff9bca0acf6427759c46eb90b49c30f3ba726d33bb0fb446f2168e8c0882ba906c712e2d0d970421873c8ea74b11
-
memory/668-114-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/2168-115-0x0000000000000000-mapping.dmp