Overview
overview
10Static
static
URLScan
urlscan
http://hillmag.xyz/
windows7_x64
1http://hillmag.xyz/
windows7_x64
6http://hillmag.xyz/
windows7_x64
1http://hillmag.xyz/
windows10_x64
10http://hillmag.xyz/
windows10_x64
10http://hillmag.xyz/
windows10_x64
10http://hillmag.xyz/
windows10_x64
10http://hillmag.xyz/
linux_amd64
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-de-20210920 -
submitted
30-09-2021 23:52
Static task
static1
URLScan task
urlscan1
Sample
http://hillmag.xyz/
Behavioral task
behavioral1
Sample
http://hillmag.xyz/
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
http://hillmag.xyz/
Resource
win7v20210408
Behavioral task
behavioral3
Sample
http://hillmag.xyz/
Resource
win7-de-20210920
Behavioral task
behavioral4
Sample
http://hillmag.xyz/
Resource
win10v20210408
Behavioral task
behavioral5
Sample
http://hillmag.xyz/
Resource
win10-ja-20210920
Behavioral task
behavioral6
Sample
http://hillmag.xyz/
Resource
win10-en-20210920
Behavioral task
behavioral7
Sample
http://hillmag.xyz/
Resource
win10-de-20210920
Behavioral task
behavioral8
Sample
http://hillmag.xyz/
Resource
ubuntu-amd64
General
-
Target
http://hillmag.xyz/
-
Sample
210930-3w5mjaafdj
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{910A0241-2249-11EC-BBE2-FA57589C9660} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005f45a3407a6eee4cb6062dddd85478a6000000000200000000001066000000010000200000006ec7d4f0069e0a1a882266da7b777de3563ddcd10748c129e7bccae054de899c000000000e800000000200002000000000168854499f8b9b6673454f90a6a011996c33d1be34e17f2a6a79ecfefcd470200000000cf24e67a6b17a01bee3eeb7a4344466c4362184a7352d8df8079c4b2ac02a094000000095e7fe2d98ebc0a648f7cb376f21678acae1b88b0502fc8e1ceaa2b4a913afe9fbc2cb3909eb6055f93e263a2f3f537d61fb6aeb22fc9eb83a80fef4359a6948 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0c9bf6c56b6d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "339810968" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\de-DE = "de-DE.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 1724 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1724 iexplore.exe 1724 iexplore.exe 1320 IEXPLORE.EXE 1320 IEXPLORE.EXE 1320 IEXPLORE.EXE 1320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1724 wrote to memory of 1320 1724 iexplore.exe IEXPLORE.EXE PID 1724 wrote to memory of 1320 1724 iexplore.exe IEXPLORE.EXE PID 1724 wrote to memory of 1320 1724 iexplore.exe IEXPLORE.EXE PID 1724 wrote to memory of 1320 1724 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://hillmag.xyz/1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015MD5
ab5c36d10261c173c5896f3478cdc6b7
SHA187ac53810ad125663519e944bc87ded3979cbee4
SHA256f8e90fb0557fe49d7702cfb506312ac0b24c97802f9c782696db6d47f434e8e9
SHA512e83e4eae44e7a9cbcd267dbfc25a7f4f68b50591e3bbe267324b1f813c9220d565b284994ded5f7d2d371d50e1ebfa647176ec8de9716f754c6b5785c6e897fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
29a9c289f0a6d52e9cfe65ff272c053e
SHA1e00cb22bab6ccdc4a11955b195b8170cd16afb24
SHA256d988101c6777d2eed20da6a61aeac83b7fa086b5cefc2351b270be2d08f4bea1
SHA512fe0c16912d26ec894cf07c3d2d38c5b8c1b6b089ef0a6596a7b349abce1682acecbfd98c3345e78a9c8d4afe2173e702d8002ef9bd951b67d07230ca4d0a4b8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
cb5bd920a818cf5f2ac421406cf25330
SHA1fb306ca6875caa18df9deaabe9f34a315fd2887c
SHA2565abacad3647361eaf81d7b71a4cdbe882047aafc7508bd3d99347d7cb87eeccb
SHA5125ef5b29f1a67ca184f049e7b818645e583c2a80025295d7b684e68c28d544ce727be4a00bb772f54eebfed187bdf77fd702c9c12fbaed1b33f81d95880b7d4ed
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\QWNJH8ID.txtMD5
c89e3a6bbea6bf2c3b35d07db3b9ba91
SHA18360f8f7d838f12b7725637ff5ee59581d2be76c
SHA2561f22a12bf1d3f09a9901188cd06943d61318390819c26b1fb834f436303491dd
SHA5129b8d86976ea38a9d5f2aff1792aa85e30a7a0cd650371b35c7d06294f1d4f7e4929b6d29d9ea8eea0643618a9861b6f866dada9fe7b42bc60fc6939a27b00684
-
memory/1320-53-0x0000000000000000-mapping.dmp
-
memory/1320-54-0x0000000076391000-0x0000000076393000-memory.dmpFilesize
8KB