Analysis
-
max time kernel
267s -
max time network
277s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
12-08-2021 21:07
Static task
static1
URLScan task
urlscan1
Sample
https://informationdeliveryshipping-8f3c3e.ingress-baronn.easywp.com/wp-users/
Behavioral task
behavioral1
Sample
https://informationdeliveryshipping-8f3c3e.ingress-baronn.easywp.com/wp-users/
Resource
win10v20210410
General
-
Target
https://informationdeliveryshipping-8f3c3e.ingress-baronn.easywp.com/wp-users/
-
Sample
210812-xgjb5jt84e
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.3m.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30904254" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.3m.com\ = "22" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DOMStorage\3m.com\Total = "22" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50abfab9be8fd701 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DOMStorage\3m.com\Total = "42" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DOMStorage\3m.com\Total = "837" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DOMStorage\3m.com IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E0DCD723-FBB1-11EB-A11C-7EF74584969E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DOMStorage\3m.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.3m.com\ = "837" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "335567672" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003093c25e80857d458d3a2986a79e38500000000002000000000010660000000100002000000082dfb076284279ed3364218bf8d9030c88a8f154cccdacb2b1e6ee4675ac0d02000000000e8000000002000020000000a6f53dc3c7b7d587f94b8b421a6667fb4718e549dcc36b922513045e01b53e9b2000000092b40dd3e53470b2086eaec1b6a3937cb4472ddd1c2ae151c7c87bc35a4f585140000000fdc486637d8bdf23d44ba8e9cdf6a86d0f8926635ef015a3fc9cb3e498c8c282778fcffb4f46b9edb8726281fefe1f4ef2eee15dfbc9e3ea9918875521428540 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "335616257" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "837" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3058026221" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "335584266" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.3m.com\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "42" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3046463104" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30904254" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3046463104" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30904254" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DOMStorage\3m.com\Total = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "22" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003093c25e80857d458d3a2986a79e38500000000002000000000010660000000100002000000061f717abe3cef25bcbee95af874dece5ea2a7c6d66540cde6e4d208edf02a34b000000000e80000000020000200000006e8c16296370d446e8b3192bff83f9b722e7ac869c861f0694fd7a8a99cd9ad520000000e36a4094943c615dada6e8e71ac79185c6f0f45097eadd39be060906691ea12f40000000a7dc2959cdff043aebc9d7732fb5266abf90a0b8ab598829a488db5f41b2fc538e4d76ed5f7bd1e2fd2438bf6a65719637d77fe07f69d6dc8272e1bd2a8b040f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70e2e9b9be8fd701 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.3m.com\ = "42" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 688 iexplore.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 688 iexplore.exe 688 iexplore.exe 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 688 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 688 wrote to memory of 2400 688 iexplore.exe IEXPLORE.EXE PID 688 wrote to memory of 2400 688 iexplore.exe IEXPLORE.EXE PID 688 wrote to memory of 2400 688 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://informationdeliveryshipping-8f3c3e.ingress-baronn.easywp.com/wp-users/1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:688 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_BACC6CD2B29F18349081C9FD2343833BMD5
9e51a98dcfb61f6bdab7819a587c98ad
SHA1e5abfb2df6288f4294d1ac4f54142b0877c13a0c
SHA2561b0da08626b5078280ac8ffc5210735914a0efeb84fa78a29e0b4f52500706fc
SHA512af91f920809dcc03eb3b368e567a5a7712eb7bf3bce8f7a6d188401bf05fade4c199062573064ce11927bef9d363368d4653f07908e417146e3ad0a4aaef81ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
3902d3f36dbbe6507d1ca44b60d9e888
SHA13d19803efd00a3f75a5ef84b1497cdbf0a738adb
SHA2566a8e80f06a7941fff1b4ddef4ed3ea534ed06a9f36e79e4fa546dc62231c0f11
SHA512ac46b2321da4925cbe4293560713d7273c85cd2727a935b7d0d7736e4e25399d34f937b417d3ae3d84ab59d40f9efc2ba94c10fc064aff1a10329fb3a212c755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
3e9f22cc690a8f0a85c77641e868fa63
SHA1fe20510f5f24bdcf66183653b9b8b4f12581530c
SHA2568f71c8b1d3dfc7997d945b8ffa1331874246cb0fc64f56eb2a25c9fa0b978ef9
SHA512a96110ee91309ab8a15df7e5ecef220cfc2289180c54c789ceb148cc6a74c2c1339a3271267611ee963556d2c8c824d3274bcdb92c7476bb10a7553ade121e62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_BACC6CD2B29F18349081C9FD2343833BMD5
c5e23ea82bd767d79bc5529b5a1fcece
SHA1fe0eef779fec50de6f0256ba75017a9e242c9636
SHA256dcda5eb321c4a0eb12e46a04e364a411ee5d6ccfcbd854d3dcb73324e76da70a
SHA51263188af4baaa61c7eda67d3d4f73534fb8e062d4904c893b3a6ed7063c8a6101d196da96f419adaaf5ffd4e23f971601d3ccba9e84e0f0ec1bfd58edb2af108e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
32e088f1209675ac7fd9bc7bc6688c98
SHA133ef88e1fb3b401e5cf4ed90dd27f9c40120b320
SHA2564754cba529853cedfef58456e9f569438899390295874333ef9047f2046bcb32
SHA5128b1dd19f18c7c7d2d3293c182c157bd32a308ce5144dda3bc1f5b159ffbd4675197e952b9daae7eae432b78abb8a9d95d95d9838a8a552cfc24ffa62f375b088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
451bb3a33d934e58a8c7b59e73255d06
SHA18a6c4328a92ff91c866aac1b3550fa4f0262f0a0
SHA256fbfda29cdc74673979a60cbea8ddb47129e026bd120d79ee4a2f8e6049494d4b
SHA51262eae75ce87ca67005d07f0bda256bc73cc3deb27751b8619ea9c74c9358074c3bec2404aa6cc41ffec30cb1a28b44408e72c8b375f044e93fe318bd413729c5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\1GV5S3IB.cookieMD5
cafdad3b0fabebf0a744c45106376118
SHA19dc0c678c1464c5b816336d5d7ac70400b9f8a2f
SHA256b3b4c39ab8bca00307df1a8d94654e6cbe35ddaac5ae2e0de0680dcf81bbb38d
SHA512399bca8d54e1b4d4e43f069e0b626318bb0783f036e0ba92253842043553aae994a64de809568161c06d6ca99b02f54ca9061c6fe0cc5db148907622e23ea432
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\93ZHEN7Z.cookieMD5
7d9934778c798318365ed7fe93e93c08
SHA1f3328da5dbb0a61b338806657329bb7eedc92d43
SHA2562cdaabd423db69544e92b2196d8f1231778ed58d9e7e0f050223a7a9162504a8
SHA5128a0d4be4235b785994e372bdb1b26166ffb6c18f2957cb36d946a17e14390577f85d202c818fefb4a7c7b2e8e53871f95bf5418fe2368b283c2d22cf97713fc0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\FLFQTDC6.cookieMD5
48dfe5b4745be8d43b8120cfc68c9f78
SHA13d0aae2d274b84b34fe626938e8f6f23e7d5afb0
SHA25648cbb40f742b2f09bffa65c5f92651ed6cd971970fcd69d5ca00341c4a3c624f
SHA512cd89e3e2d9bacb253ab20029cb11fae189ea431aba66fe31de48cf4eae5580c3e7b03aa7c938b689958bd1dfd7c403307495359643bf13a6b28607e19401bc4d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\OHYGJ36K.cookieMD5
5c81e7f2e5eea516e59cb93192687959
SHA146cf857f846ce5f36122e78b0ae857eeb0e806fc
SHA256664dd78cab4abafe728c0ead5a252752e5ad8fb368c146a5f9763e565667e9a4
SHA512aaf22b2bf62143e70953c543fc1a4a7e732354efd4e5da61495786edd5182e52aa609e7b7ddad3fefd1d7365dc4fca60615bb043421901f12496d778633fb01f
-
memory/688-114-0x00007FF96F290000-0x00007FF96F2FB000-memory.dmpFilesize
428KB
-
memory/2400-115-0x0000000000000000-mapping.dmp