Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
22-07-2021 10:13
Static task
static1
URLScan task
urlscan1
Sample
https://gpwealthca.godaddysites.com/
Behavioral task
behavioral1
Sample
https://gpwealthca.godaddysites.com/
Resource
win10v20210410
General
-
Target
https://gpwealthca.godaddysites.com/
-
Sample
210722-9txvneyhdn
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10d90ecde27ed701 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "333730618" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3647923586" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3725136576" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3647927101" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3659051538" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30899938" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30899938" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009dbe4ff4561bbe408a5ba339f7c4c6b7000000000200000000001066000000010000200000001a29bbc3de8cd54d34f5276482443eefc29909094cc1ef722d2a1b094ba6e944000000000e80000000020000200000008c50b5038812aa712643045f5db9e04e1fb4fc8602875a56eadcb2d8ef7f814e200000005f3aceb14367f170de324d41f6b7ee8a58e22d95b763583f3ff5768d892e5b57400000000f9d643c48243486db78059e26f37cf326734dcce6dae4aef37db6884e86c0c4040e83162652d018eec31bb81b69583be2047dfc0f9c13ddcf258caa8a2a5aa3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "333714024" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "333762610" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30899938" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30899938" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{04DFBE51-EAD6-11EB-A11C-56F1F4F21F1A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 4064 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
Processes:
IEXPLORE.EXEdescription pid process Token: SeShutdownPrivilege 1524 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 1524 IEXPLORE.EXE Token: SeShutdownPrivilege 1524 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 1524 IEXPLORE.EXE Token: SeShutdownPrivilege 1524 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 1524 IEXPLORE.EXE Token: SeShutdownPrivilege 1524 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 1524 IEXPLORE.EXE Token: SeShutdownPrivilege 1524 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 1524 IEXPLORE.EXE Token: SeShutdownPrivilege 1524 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 1524 IEXPLORE.EXE Token: SeShutdownPrivilege 1524 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 1524 IEXPLORE.EXE Token: SeShutdownPrivilege 1524 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 1524 IEXPLORE.EXE Token: SeShutdownPrivilege 1524 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 1524 IEXPLORE.EXE Token: SeShutdownPrivilege 1524 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 1524 IEXPLORE.EXE Token: SeShutdownPrivilege 1524 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 1524 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 4064 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 4064 iexplore.exe 4064 iexplore.exe 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1524 IEXPLORE.EXE 1524 IEXPLORE.EXE 1524 IEXPLORE.EXE 1524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
iexplore.exedescription pid process target process PID 4064 wrote to memory of 1808 4064 iexplore.exe IEXPLORE.EXE PID 4064 wrote to memory of 1808 4064 iexplore.exe IEXPLORE.EXE PID 4064 wrote to memory of 1808 4064 iexplore.exe IEXPLORE.EXE PID 4064 wrote to memory of 1524 4064 iexplore.exe IEXPLORE.EXE PID 4064 wrote to memory of 1524 4064 iexplore.exe IEXPLORE.EXE PID 4064 wrote to memory of 1524 4064 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://gpwealthca.godaddysites.com/1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4064 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1808
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4064 CREDAT:148482 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1524
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0F9490D9F9BD06FCD6FDFF4F73425CB5_1CB8BB112080DD01A59E09C86DBA0BAC
MD516bb32ce1f213048bcd15a6dccb15027
SHA1a8b8db327ab0a7a34dae8ca0c9a497763bb43277
SHA256cd6cd90d82ef7024c4fc1b717653c05fef6cb352d05b419ab155c435e100b815
SHA51246ca9ac455c1da57b66aae6b3ebd69cbf8855e41bce8e6c2238e07eaf7465d734f65fdca23298c5e57aab7ae08e8a41c3b20867917a35d0f6faf0c0bf9314a5b
-
MD5
0675c0d0da9a6eac284a10c2ddda636a
SHA16c7856ef6be6b6fce283423cf9d48e7d101d7fa7
SHA2567852903b2b3bd59c816aa0a74272a4c51bae13f38bb72a67f3fd04b50d061b50
SHA51209a3f652bd943a7cc3def436c9fe769bf5c30499b78d63598fc2fc23fa15932a08d545354129fc346133efbda456edfe8d4a10bab5a50abe7d132c2228815232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
MD5ff5f385510225a3bb2ac0595bcb62b3b
SHA15894f2849bac3aa352a8a834b8b51999ac8d1b73
SHA2562306ea9735b51ad05b09041ac9505996de50a43637dd09951e90e74d1ff55f4f
SHA512171c991c948388c1c0dd2ed06c27303042d5e03b4cc8c3114b57f05c7b83d14bb8e304a791608867a9768e36cb3b18b74927529d5205630f19d42e4ed047973e
-
MD5
d33394b86db2d590028ae542551b5a67
SHA1200fac7cc75d4da652d0918a6fcbae6f7ca2c5a3
SHA2564d5ff3d32db0d6e78c27f1de69f614c507a0928d24f1de79360cea58096b3859
SHA512114ceb2a930baeb652710387734691cf9d56d2f60d1db94d9095151b1f537b7c89f504c96f4591e863c0c218ad200485e97e77c06ebd4e60c33958ce24acf167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
MD54b8ffe79016c051a1fa57e4ab8ee0e0b
SHA1a06394b4c74aad7d296327a942729db01486ea26
SHA25675e171759473658cd648f09d099b249f99a7cb139732201576b07c4554a9c4b9
SHA5126a057cc6cc12715d6324e0cb8c22c3d1ff5a8bd20c5ecd10e64ae155a5a5936a972374fa8005d9cf195fdd44deeb24e54f27d3eba78aa0f3a82e03e272e39091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0F9490D9F9BD06FCD6FDFF4F73425CB5_1CB8BB112080DD01A59E09C86DBA0BAC
MD507a9cae99d5ae4c56f48ab49eef8de08
SHA1538d9dbe592731fa7953d088ba8be7af34cf1b55
SHA256dc93077e438d4862a712f04730098f9450a7fa6d386fbefdd297f615efd194af
SHA51287d1a4b48624f448eb8eb53b361710a963a87cebbbe51403274968028a54807910f580323596ffa4f451953e8d821290e3575d6588357b59faafd18617fc2071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
MD5abad80c3c75f53e0b76bf08771db2d6e
SHA130008c533192b685ca1007f5ec1ba5992f5ee22a
SHA256819acbde83ca88b4adb06c0da12b1960939b5756f0a635ba8ef6a719ef2ea1b9
SHA5127f6e0408e400ed3d81fe599b8164c77a3db720e3e7a589de1170dfc13677018ef7fc50b16b510fbf460d9b07cedae161389421377645c06ea02293f34da9e632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
MD51b7d30008f6be51625d55a8bd3fe070f
SHA1933374023ddeba8b13ba853637cd079866894fad
SHA25644146fff28f73e1c0a4efbd94e980adf8402d64a5f19154bf52b0a5f777dd4f2
SHA512853a966d3cff6e22cdcceb945eb29c552a683613a3ce925557d4c1e30d05c4792629ed81f1bd7010643a6b89440ad4f5b0af41d5c34a954abc5bc966824c17e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\644B8874112055B5E195ECB0E8F243A4
MD51560391184754faabf876640f103c0e8
SHA10784109958cb291e25abd68f72f3621f38d5c3d8
SHA2561a7e23a4b009a6abdee5bb797ee6d7e8cdee0039bf97d10b2d7cc9cfd1b3d899
SHA512d912865d5e81e3a9af70ce39c87b77dcb11ddcf0f7d8b43effd0112e7c546d012ec29e718e3bf57f2d55d37a22905c44cea1a3af16dc0da7bd70ff8627ff15d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
MD553967cadf01b66bc6ea2fbc8c0aec259
SHA1b7114056c8002737792b990e043e51303552780e
SHA256aa42ca9f7e8160c66cbea35a38a89e0bb5ce3d552ecfd09457a7efcb6cf116ab
SHA512615d29117e24335deec1427edaa4731efbb0ae5e4d6fe6dd4d527974d3499efcefb1376473a9e0006dba98fc94c22a7354e4f77ccf53296af049640b2ee452c5
-
MD5
9260343625ac845f29738fe50caefa41
SHA17890235ea278e9465f7ed1ed71822a989cfabf3a
SHA2565326c08da6b146cbf97955a7f6994ca7c017fccddcb55f6434cf53bb906fe23f
SHA512cc9a61b1a70027c01c75cbd1bf8426ad9d17fb91ac11029bb06ffbbbfce30e8267baa8a15eca226d67afa8a18a94455496a4435aaaeb659f26aa9da08e0d8b2c
-
MD5
01d75ab71216a29968db2faefd5833da
SHA193a301a83a8e34afe001325e885cb1bb9669454d
SHA2567df69d2dbb58e6a0146a3c0fbe450025d155e771ee4aa1227c84f343aa7dae04
SHA5125e4ffa28ded519c3b0ae4b70402631c0040e52cbbd164bd364a175330b502eacca20f3356180056938ea14012bbe7d06270bc478a9dae94b58c8ec5bd006a510
-
MD5
6b8be2502f78b5af0b1058527c59bd28
SHA1b3869bd13d1ce7703d7ba0d4fea361cc1536cc4e
SHA256e83592a87ecd179da4ec1546a505c0c899f3e82509f1d4b9b25c45cd4156aaff
SHA512840bf5ea4d1c60f95ce4b9467cf0eeece8f1b9aeeab6be140804de6c5af4d21010ca3767a2c703092fcdfad110777b788a85eb9bf3d391b91013f195a6e1be9f