Overview
overview
1Static
static
irs/bank.php.js
windows7_x64
1irs/bank.php.js
windows10_x64
1irs/card.php.js
windows7_x64
1irs/card.php.js
windows10_x64
1irs/confirm.php.js
windows7_x64
1irs/confirm.php.js
windows10_x64
1irs/images...vg.xml
windows7_x64
1irs/images...vg.xml
windows10_x64
1irs/images...vg.xml
windows7_x64
1irs/images...vg.xml
windows10_x64
1irs/images...vg.xml
windows7_x64
1irs/images...vg.xml
windows10_x64
1irs/index.php.js
windows7_x64
1irs/index.php.js
windows10_x64
1irs/js/boo...min.js
windows7_x64
1irs/js/boo...min.js
windows10_x64
1irs/js/jqu...min.js
windows7_x64
1irs/js/jqu...min.js
windows10_x64
1irs/js/jquery.min.js
windows7_x64
1irs/js/jquery.min.js
windows10_x64
1irs/test.html
windows7_x64
1irs/test.html
windows10_x64
1Analysis
-
max time kernel
116s -
max time network
200s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
30-08-2021 05:46
Static task
static1
Behavioral task
behavioral1
Sample
irs/bank.php.js
Resource
win7v20210408
Behavioral task
behavioral2
Sample
irs/bank.php.js
Resource
win10v20210408
Behavioral task
behavioral3
Sample
irs/card.php.js
Resource
win7v20210408
Behavioral task
behavioral4
Sample
irs/card.php.js
Resource
win10v20210408
Behavioral task
behavioral5
Sample
irs/confirm.php.js
Resource
win7v20210408
Behavioral task
behavioral6
Sample
irs/confirm.php.js
Resource
win10v20210408
Behavioral task
behavioral7
Sample
irs/images/noti.svg.xml
Resource
win7v20210408
Behavioral task
behavioral8
Sample
irs/images/noti.svg.xml
Resource
win10v20210408
Behavioral task
behavioral9
Sample
irs/images/settings.svg.xml
Resource
win7v20210408
Behavioral task
behavioral10
Sample
irs/images/settings.svg.xml
Resource
win10v20210408
Behavioral task
behavioral11
Sample
irs/images/success.svg.xml
Resource
win7v20210408
Behavioral task
behavioral12
Sample
irs/images/success.svg.xml
Resource
win10v20210408
Behavioral task
behavioral13
Sample
irs/index.php.js
Resource
win7v20210408
Behavioral task
behavioral14
Sample
irs/index.php.js
Resource
win10v20210408
Behavioral task
behavioral15
Sample
irs/js/bootstrap.min.js
Resource
win7v20210408
Behavioral task
behavioral16
Sample
irs/js/bootstrap.min.js
Resource
win10v20210408
Behavioral task
behavioral17
Sample
irs/js/jquery-ui.min.js
Resource
win7v20210408
Behavioral task
behavioral18
Sample
irs/js/jquery-ui.min.js
Resource
win10v20210408
Behavioral task
behavioral19
Sample
irs/js/jquery.min.js
Resource
win7v20210408
Behavioral task
behavioral20
Sample
irs/js/jquery.min.js
Resource
win10v20210408
Behavioral task
behavioral21
Sample
irs/test.html
Resource
win7v20210408
Behavioral task
behavioral22
Sample
irs/test.html
Resource
win10v20210408
General
-
Target
irs/images/noti.svg.xml
-
Size
656B
-
MD5
627361e7f33ba48cd231cd59e2b9a309
-
SHA1
039512bfcef1d44e22b5d4433f34bb713a9949f8
-
SHA256
3780ebbc08342857b88aab9941cbe8158c0ba2e3eb76755daf3c7377af71be65
-
SHA512
2a8b967d038c48e8d54c96edd1002fd4b08a642af87c39677123ff6fbe34b02c1a46a1e8e3811b3b28bd3389506a283c25ff9e5456ad5a79669a525262092980
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "337106232" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40fc3df2bc9dd701 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1CE02D31-09B0-11EC-B675-6249F4ABAE7A} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d62383751ba7ab48970eb86bc6ad9b7200000000020000000000106600000001000020000000f174d2546dbf5e0e5881aed1ba45a0e358e3f72fd8fed45aa7ffbdeb97440db4000000000e8000000002000020000000e06d5d4eb59c9d617f1e2e2ba700b02a2e23fa4fb9463f4dd8a1f49001c2ecd820000000cb25be3fdf30136893ceae12044aaa4d6dfc106472530c519df5e7b2d92552cb40000000e0545caaa0887f8d5e2357636f00c100f2f6c62144581ab3359f1ed47a2dc242d1a1e214dc25bd043ea7266bebc882bdc49d556fa901226f0dbb4eace40c8e70 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d62383751ba7ab48970eb86bc6ad9b72000000000200000000001066000000010000200000009b05a5fdb53fc603818c2ea23af1699edd6e70dff83274c9c19a4495b5c7e1aa000000000e800000000200002000000063288b23759307425f3d3ed7fd473f7952d524c2183607dc8ed43da875dd4daf90000000311f040d159863ea08c44a338742317d319cf50b3655cd41cdc55e6e3cfc00ee3681d6109d04db9939b4a35034ec09d28df6dab02e24c2d3a3080a624664694a07eaa55d88e7ed00acfd1533a99b7b4235e4a37686ca2047b93b3640b392472f9f01bd7233803eda98487be3cd5e16dd5453b143c202e8e47958d46ee57359e53e46baa07b39c3355c1216764c397a5e400000005bcebf619b85d0825d66fccb4fe5167b6bcfa6619ec2983dc2a733ebd8e2ec1845a5b4e36f8397e2c90093585a020b6d1173194ec9fc1318d69bd6ea659a4eac IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid process 628 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEpid process 628 IEXPLORE.EXE 628 IEXPLORE.EXE 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
MSOXMLED.EXEiexplore.exeIEXPLORE.EXEdescription pid process target process PID 1972 wrote to memory of 1720 1972 MSOXMLED.EXE iexplore.exe PID 1972 wrote to memory of 1720 1972 MSOXMLED.EXE iexplore.exe PID 1972 wrote to memory of 1720 1972 MSOXMLED.EXE iexplore.exe PID 1972 wrote to memory of 1720 1972 MSOXMLED.EXE iexplore.exe PID 1720 wrote to memory of 628 1720 iexplore.exe IEXPLORE.EXE PID 1720 wrote to memory of 628 1720 iexplore.exe IEXPLORE.EXE PID 1720 wrote to memory of 628 1720 iexplore.exe IEXPLORE.EXE PID 1720 wrote to memory of 628 1720 iexplore.exe IEXPLORE.EXE PID 628 wrote to memory of 1764 628 IEXPLORE.EXE IEXPLORE.EXE PID 628 wrote to memory of 1764 628 IEXPLORE.EXE IEXPLORE.EXE PID 628 wrote to memory of 1764 628 IEXPLORE.EXE IEXPLORE.EXE PID 628 wrote to memory of 1764 628 IEXPLORE.EXE IEXPLORE.EXE
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\irs\images\noti.svg.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:628 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1764
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
672968ba3963e20fa6507d7fec878772
SHA1b36b212c733fb98aeb2df110af239d2034fac749
SHA256bfae90c53313d33adb0d9efbe23f29b4d7ef2e69783b804aa9eb50e3efbb05f5
SHA512445c62cec78b3a84716cfbdfbc5611fc63a8e1a044f691b0f974206d959967839de31fc17d0737d885f082329e96624407e208ce518b9649c3ad2b1d48065683