Analysis
-
max time kernel
141s -
max time network
185s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
27-07-2021 19:03
Static task
static1
Behavioral task
behavioral1
Sample
Payment Receipt 143047.html
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Payment Receipt 143047.html
Resource
win10v20210410
General
-
Target
Payment Receipt 143047.html
-
Size
395KB
-
MD5
349b929eb818020e25e9e9caba48d037
-
SHA1
4ca79257f94c77051e4423227c9ae7a89c39384a
-
SHA256
d2f547411e755379465b33ed201bfbe94a2b50f470d15fb8eb1282069fbba48f
-
SHA512
bd7cf623914642925e0b75d39ad9fa015782efb6c3229dcecbafcfd72a8f5edc94f2ef937c45889f5c504ae4809e4ce8ea760007491d9f47db71803b4e781368
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E5EC4EB1-EF0D-11EB-A787-52BBEA82F32C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10584cbb1a83d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "334177831" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd405dab4c778045a989e0007d6a83970000000002000000000010660000000100002000000062538f4bb6fd73a8e2adc228f097a87e4157947f9ae99329dc15e5f4f154db0d000000000e800000000200002000000070197e0343ac988dbcb4784a842b19b168f7e2e776584d0d89dfc5d28df4b5c7200000007c084aa6a44f30d2f5ba27e0016c11097b6e89750d1a2f311d251a800bfaa27540000000d5081b10e3357b91c6408bfeb598669ded9e28b30ad36b23282ed4cb3dc22e4c90ffa08745f739194007716425ff2eb6a0f783d66f2dfbaf705520286bcc08be iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 1092 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1092 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1092 iexplore.exe 1092 iexplore.exe 1840 IEXPLORE.EXE 1840 IEXPLORE.EXE 1840 IEXPLORE.EXE 1840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1092 wrote to memory of 1840 1092 iexplore.exe IEXPLORE.EXE PID 1092 wrote to memory of 1840 1092 iexplore.exe IEXPLORE.EXE PID 1092 wrote to memory of 1840 1092 iexplore.exe IEXPLORE.EXE PID 1092 wrote to memory of 1840 1092 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Payment Receipt 143047.html"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1092 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\YSVKTN1U.txtMD5
3423d2800da8d2ff45f039ca19045144
SHA18f8bf61d7522aec7ec5b66de41ab93377c8a4d9d
SHA2562d3ce5e85ddd3d8590c9007cbf31cdb8d9e2ad8fcb3b7a4d57f83f50229b14a7
SHA5125854e0993555993e7b00784a45c1b0beab7d549701f515702dc4453712ac466108affa82b584290187d56e0d3304a00192c37a44ff28672714c8eada5b1bcdda
-
memory/1092-59-0x000007FEFC301000-0x000007FEFC303000-memory.dmpFilesize
8KB
-
memory/1092-60-0x00000000020D0000-0x00000000020E0000-memory.dmpFilesize
64KB
-
memory/1840-61-0x0000000000000000-mapping.dmp