Analysis
-
max time kernel
72s -
max time network
74s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
30-09-2021 15:17
Static task
static1
URLScan task
urlscan1
Sample
http://8ui0lafgkj.online/
Malware Config
Signatures
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 15 ipapi.co 13 ipapi.co 14 ipapi.co -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000914601b5c5fe6448b2037e85a597576c0000000002000000000010660000000100002000000006b7f4f7ca9bc910ee2c35024a3afbc48c42e9046825f8ff1445bfd6db32f0d8000000000e80000000020000200000002e57c87f2f498b93276a8695ed6a77e54ec0e7985adc6e3d621033cfb23f814d20000000cefbf1796fac60db1b5526095998c977c491a2a5e2873523564e44007c657caf40000000f6738f813b5da3028483add5aef8a19c43313cf228b263a13160498f54384bc8d2cf9b0c9a7cfb41f047c60ef6869be0822fdcfc9f53551e34bdd7579ef28440 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "339787211" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000914601b5c5fe6448b2037e85a597576c00000000020000000000106600000001000020000000d57587b0d8e6a685ca995ef8a75534c6121824222252704593115eeda86aec5a000000000e8000000002000020000000bbef2d3fdb818a8daeb473f25fe20a2862b9e8b8b9c25fedf2472ce89c141976200000009e819d45eaab1cec4006c13d7783bc527544407a3a298038111389a75c5072fa400000005c47c8d7bfbab4a0f31b9e9f030b1d4c2fa91a63f420558713b9cbf03d554685bcffbf8a84b05c9aa126d0ddc2c0492c33629918309ab31ffd6f43594c6ec616 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30914079" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 305cc6121fb6d701 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "340004924" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a064c6081fb6d701 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "395766030" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "340004924" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3F9BE2D3-2212-11EC-B2DB-D6D45E2F03D1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30914079" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30914079" IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
IEXPLORE.EXEdescription pid process Token: SeShutdownPrivilege 4076 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 4076 IEXPLORE.EXE Token: SeShutdownPrivilege 4076 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 4076 IEXPLORE.EXE Token: SeShutdownPrivilege 4076 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 4076 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1832 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1832 iexplore.exe 1832 iexplore.exe 4076 IEXPLORE.EXE 4076 IEXPLORE.EXE 4076 IEXPLORE.EXE 4076 IEXPLORE.EXE 1832 iexplore.exe 4076 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 1832 wrote to memory of 4076 1832 iexplore.exe IEXPLORE.EXE PID 1832 wrote to memory of 4076 1832 iexplore.exe IEXPLORE.EXE PID 1832 wrote to memory of 4076 1832 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://8ui0lafgkj.online/1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1832 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDAMD5
a82ea341b092497dcd9ca799d103e663
SHA15ef4d50ecee035c99d5b347f6203d70fe1bb30f3
SHA256016bb12b95c627a4524a2bd5abf18836070f5cd065925e64b8880d37774592bb
SHA51255c202e2bd3640547d226774ef68900a28e00277b3235175d3d462d00b24092320dd738f303a8daec545de9159ea4d69a8d6a68016f981c53b28a0b85b7bd1b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
d302a1fb716166b280c2accd4491966e
SHA19eff2394f8616a4567f3eb895747ddf81fa68207
SHA256ce29369602f384184b8fc7be24fa322fe70da4590f73921eada2cf12774a4afc
SHA512c2b90c30f558518426cd0135a06dfc7d1c986635a9effffa34af80a8adaf566002d17288409b838452510212f774f5b75f2772e4acc20d7b19ad6f99751dc9ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691MD5
c2f9315e025039524fd6bd6f4115a730
SHA149649564167aa881a06f8f1cd3907aeb54a14faf
SHA25681984c7c749b9d1ba9629d0975cd981654ad5b8142d7d73256000603e60b533f
SHA512abbddf769e5c5960b5f35be73d93480e1a3c800b92f7ef49ba024b05e5192fd69101864a2fb17a59d37c4de31a8df1a10ff820d2a7d89b6e05a826f650824ad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDAMD5
998071119a140b519c87feff9c3c75b6
SHA14cea3dadc7b149130d3ff901037bf6bd15dd12c4
SHA2565852a278e6a254236e696ab53229218952600a624ac4774adaa4767b34a00992
SHA5129e140be7d462aade55917e41195b87b7be80f609ad32e1e7d26487c9278a2dc7601287fe8957414c5c29159c1a84d0d32d692f3d7e41ab819c36dafaf8c3c441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
6809ce89483e9eb3b98c4528fc8d95fd
SHA14371f88d74f70f11a2693499a52f23fa1a0834ae
SHA256bc4a68100acca7e4784bab71865b2186812b4a38241c290668624d9573c9c589
SHA51246b13faba2845c2b5beac3cd2344e032053b6f8581148a68796699c630d0eeefa9d1295086ee9c896b346f534bec9b660583013a854b602cbb197236c00ac634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691MD5
c77be679bf555405d89cd444b019dad9
SHA1d785122e3a0ed5ba5ac109669188692dad86720f
SHA25618b2a6ddbdef685748dd6ca7216c1e274321d65cb3cc0af52911b69865a1129d
SHA512b4ef02278d72ab03144d7b4b4b8a3cea096c86cb1a31d48a796d6e7a984b1834784c3d1ef7ecde261163f2fa3f72b62be2225270a7007f6e5916a38ccf99d95f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\AYZ1ZD4N.cookieMD5
9802084355c884e61d378eaef66b3545
SHA1b698e89686cd0564e7577cfa46a86503a66d08c6
SHA256bd4a9167d966e8eeafe55424b0e9e9ff5adcbd41e2bb3ebd8d3c8ebe0eb92fe9
SHA5124104edc4668343604e2b66b1a289565351a916af43db820d2f503fe5678dadd7e4452470ca3bf14f1151fc2119156c8031623ec24b5d14c9ae6c9e1102e4de21
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\FMR8O0FE.cookieMD5
a8e0c9b500d709d2ca82e6b36cfb4c15
SHA167d952d89236f7f76481e6452e61a99b64663196
SHA2565d67b65d24b7435d8dbcca185a5668e5ad19131ca9ddec0900c41c777b7610bc
SHA512b8f7923fbe465dfe1eeb3ba324b8a77cb1926c78e7c5a243491eab66cc15d2a19330dec50c21706cca24550f6f74e97f63588115f448e6e5754824137250bd5c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\Q2L78LQF.cookieMD5
18f34adcb5193dc9e52f8c047882966f
SHA1bb77a573799b1cfe8b44eb0b568c41a33980b594
SHA256575f9cc2fc017fc44259bea3afb8b98dad462d8aa8cf2f6d3c4e14eebe931c62
SHA51209f15c768577642f510e69668285b5774397bb62bcbb24e7089e4435ffdd1549618f1b79580b45a040f0c16b19ccaa7ef8d26f00b26bb045068b13308b30dc4b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\TQEBO0MU.cookieMD5
60a21091c25c44ba2d24efa0be0ae523
SHA188ab82737d128899a7269c5b96283f81abb2a975
SHA256bd03973ae8fd8a014a36e5a648d30a9bd8f564916ed945859b4004e56272f1c1
SHA512371a2b3e3dee71c7dfe4744f8fdc25610066c73965ea2e65c941184b4334b363cd518a01ad2e8c651aca26a4a3f5260ac6915c13321f1829051d22a265ebe0bf
-
memory/1832-114-0x00007FFE0EAB0000-0x00007FFE0EB1B000-memory.dmpFilesize
428KB
-
memory/4076-115-0x0000000000000000-mapping.dmp