Overview
overview
1Static
static
irs/bank.php.js
windows7_x64
1irs/bank.php.js
windows10_x64
1irs/card.php.js
windows7_x64
1irs/card.php.js
windows10_x64
1irs/confirm.php.js
windows7_x64
1irs/confirm.php.js
windows10_x64
1irs/images...vg.xml
windows7_x64
1irs/images...vg.xml
windows10_x64
1irs/images...vg.xml
windows7_x64
1irs/images...vg.xml
windows10_x64
1irs/images...vg.xml
windows7_x64
1irs/images...vg.xml
windows10_x64
1irs/index.php.js
windows7_x64
1irs/index.php.js
windows10_x64
1irs/js/boo...min.js
windows7_x64
1irs/js/boo...min.js
windows10_x64
1irs/js/jqu...min.js
windows7_x64
1irs/js/jqu...min.js
windows10_x64
1irs/js/jquery.min.js
windows7_x64
1irs/js/jquery.min.js
windows10_x64
1irs/test.html
windows7_x64
1irs/test.html
windows10_x64
1Analysis
-
max time kernel
110s -
max time network
204s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
30-08-2021 05:46
Static task
static1
Behavioral task
behavioral1
Sample
irs/bank.php.js
Resource
win7v20210408
Behavioral task
behavioral2
Sample
irs/bank.php.js
Resource
win10v20210408
Behavioral task
behavioral3
Sample
irs/card.php.js
Resource
win7v20210408
Behavioral task
behavioral4
Sample
irs/card.php.js
Resource
win10v20210408
Behavioral task
behavioral5
Sample
irs/confirm.php.js
Resource
win7v20210408
Behavioral task
behavioral6
Sample
irs/confirm.php.js
Resource
win10v20210408
Behavioral task
behavioral7
Sample
irs/images/noti.svg.xml
Resource
win7v20210408
Behavioral task
behavioral8
Sample
irs/images/noti.svg.xml
Resource
win10v20210408
Behavioral task
behavioral9
Sample
irs/images/settings.svg.xml
Resource
win7v20210408
Behavioral task
behavioral10
Sample
irs/images/settings.svg.xml
Resource
win10v20210408
Behavioral task
behavioral11
Sample
irs/images/success.svg.xml
Resource
win7v20210408
Behavioral task
behavioral12
Sample
irs/images/success.svg.xml
Resource
win10v20210408
Behavioral task
behavioral13
Sample
irs/index.php.js
Resource
win7v20210408
Behavioral task
behavioral14
Sample
irs/index.php.js
Resource
win10v20210408
Behavioral task
behavioral15
Sample
irs/js/bootstrap.min.js
Resource
win7v20210408
Behavioral task
behavioral16
Sample
irs/js/bootstrap.min.js
Resource
win10v20210408
Behavioral task
behavioral17
Sample
irs/js/jquery-ui.min.js
Resource
win7v20210408
Behavioral task
behavioral18
Sample
irs/js/jquery-ui.min.js
Resource
win10v20210408
Behavioral task
behavioral19
Sample
irs/js/jquery.min.js
Resource
win7v20210408
Behavioral task
behavioral20
Sample
irs/js/jquery.min.js
Resource
win10v20210408
Behavioral task
behavioral21
Sample
irs/test.html
Resource
win7v20210408
Behavioral task
behavioral22
Sample
irs/test.html
Resource
win10v20210408
General
-
Target
irs/images/settings.svg.xml
-
Size
994B
-
MD5
0504c83119eeed267d040d3d2810f3fa
-
SHA1
7989956f35cde6cfbe47643b1d7fd24e75647548
-
SHA256
ee1827eed4063223ff9e97ec96f199075b39188a47cf46c07e171ae836c87f5a
-
SHA512
ceeb62b538b9ca2dd1a6755a3b6dfc5141e81a962a0b105bf35bcfa1ac10a8dcb666b4a25f3ec0cfa9f65ede276b979ff40cfc1f63fc1e82d3ddf1745d604703
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004fc42791218af946b4eda47cd9bc6643000000000200000000001066000000010000200000009ecfe5b0c88e5adebade5e0108eee6e7d7ec23431143e317b1db058c3dbb1e23000000000e800000000200002000000093c98fdbce0b226d1179c26cf69e3f08403a034d3f9d95f758c08d0b0e8c6ccf20000000ad32b24692fba7ecb7a1d196d25944004db85645fa4c230462a5d7f3dc55217b400000002f131ae4bfe44b241348afc906e33ac63614a89cecfa1f83b296f4ed8598b2923d06686c6e54e4f42d431c4061fc2b071845004f57570e845df6612ff3a60f22 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{214EE961-09B0-11EC-9E73-C65640CBF56B} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90dd8cf9bc9dd701 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "337106241" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid process 1004 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEpid process 1004 IEXPLORE.EXE 1004 IEXPLORE.EXE 1008 IEXPLORE.EXE 1008 IEXPLORE.EXE 1008 IEXPLORE.EXE 1008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
MSOXMLED.EXEiexplore.exeIEXPLORE.EXEdescription pid process target process PID 652 wrote to memory of 744 652 MSOXMLED.EXE iexplore.exe PID 652 wrote to memory of 744 652 MSOXMLED.EXE iexplore.exe PID 652 wrote to memory of 744 652 MSOXMLED.EXE iexplore.exe PID 652 wrote to memory of 744 652 MSOXMLED.EXE iexplore.exe PID 744 wrote to memory of 1004 744 iexplore.exe IEXPLORE.EXE PID 744 wrote to memory of 1004 744 iexplore.exe IEXPLORE.EXE PID 744 wrote to memory of 1004 744 iexplore.exe IEXPLORE.EXE PID 744 wrote to memory of 1004 744 iexplore.exe IEXPLORE.EXE PID 1004 wrote to memory of 1008 1004 IEXPLORE.EXE IEXPLORE.EXE PID 1004 wrote to memory of 1008 1004 IEXPLORE.EXE IEXPLORE.EXE PID 1004 wrote to memory of 1008 1004 IEXPLORE.EXE IEXPLORE.EXE PID 1004 wrote to memory of 1008 1004 IEXPLORE.EXE IEXPLORE.EXE
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\irs\images\settings.svg.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1004 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1008
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
60a70ff04e547fa22822fbc9b555b0ad
SHA13eb692dbe4d55171d1e0e3ef6d0b2b6df854cfc3
SHA256e97e5ad4cb72ede853a4894194d18bf34ce68aa3b838d30b04c0ec8262de8369
SHA512ca49628243521d038d1d487ed54934030c84f9ac6c3c989e0686c49503dfb04e0aba81fe169ecdb91ec2f3844dacdd4e606c3a5ee90fe559ed0a7ccba3fae614