Analysis
-
max time kernel
119s -
max time network
156s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
14-10-2021 13:26
Static task
static1
URLScan task
urlscan1
Sample
https://koperasimaju.com/php file/index.php?i=i&0=user@metrobank.com.ph
Behavioral task
behavioral1
Sample
https://koperasimaju.com/php file/index.php?i=i&0=user@metrobank.com.ph
Resource
win10-en-20210920
General
-
Target
https://koperasimaju.com/php file/index.php?i=i&0=user@metrobank.com.ph
-
Sample
211014-qpyjeshfc3
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30917466" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3327634280" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "341242210" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "341290796" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3308201519" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30917466" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30917466" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3308044767" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0540FE7-2F4D-11EC-AF2E-FE4672F7746C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007dce5df328d2b3428465887ea00eec2d0000000002000000000010660000000100002000000068024aff5f665bc8175bca10c70f3ec75215b4e9de951246c2fb1918a154cdbf000000000e800000000200002000000046d11fdda591a202c4933f583cd57b98ada77e14530f3c5baf43089ab1dea18f200000005eea8ac23466283db181520a48850ee504c9a96c52acbc4724536dae799b399d40000000e128ebf9244afa88e02cf935889d295057e6bf5fa6d145d083bafda751a018123ae058eb92cbb28ce28c6241167bef12b2e17abf32ae82d3483d4f0a8741ebac iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6005a7ba5ac3d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "341258804" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1684 iexplore.exe 1684 iexplore.exe 660 IEXPLORE.EXE 660 IEXPLORE.EXE 660 IEXPLORE.EXE 660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 1684 wrote to memory of 660 1684 iexplore.exe IEXPLORE.EXE PID 1684 wrote to memory of 660 1684 iexplore.exe IEXPLORE.EXE PID 1684 wrote to memory of 660 1684 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "https://koperasimaju.com/php file/index.php?i=i&0=user@metrobank.com.ph"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1684 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDAMD5
d4717da32cdccb9f544386ba247a214c
SHA1ef50ed02110b66087081ee82f5bcfacddae5dc75
SHA256fae26c0dbf6f66fafb869c8391a54e8947b4abdb8d33a47d81ec2355625ec8b7
SHA51251f1e02d1b2b0ab0cf6c7a1852076d452167ec16514d09ffc6495563d587fe5c0c1563b3381dbaa150a1f888b8160ccab755c96726cbeae61b5b5a3cefe4fff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
82fa88e64877afb41dca1c1538103ad6
SHA10c0b5efc26de2c5459845e1855750aea1a253338
SHA25607bc4a1cb38272dc95952e6173fc9adc1cfea603c8cd5a0c9246564647437a8f
SHA512a3844380c257120275bd30952fdca990327afdca4fcc55828624a57204e36d389a88b63e473eec7382047098565f08c90265563c5bf79e634fc60b2beb3e0e62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691MD5
a9e3d15836e8084127a102f37d2a4ca8
SHA1c79df1bbc481f1dd21ff7db41effc13ec85f7c19
SHA25644b88cbf5cc4961b384ff8210da89e2d144dc85a288013d58ddb518929088a52
SHA5123fea475728306b2117b6a4ecf6cde5aa308114ac91002fd56be804b3d5ccb6e3b3a785b984a29d4ffb721bd483eead3e122bf92ee265dffc1853802b9929d7a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDAMD5
bff441569abc2dc19ec4e34921e74ad3
SHA19e99dda4cc2c3fbfcb118072e63422887a1a26f6
SHA25689fb629b9b34ab11a377a4bcbed25b4204856fb0f750d8c96a01566877ea4266
SHA512a79c36fe08172b25ae98c5672666f3bf36ec5a84eec4d420926e6a6cb80cea5c8f6dbf6da04cf642d92cc48a49304fc46b981cb3a9862c8087e2544cbf2ac65c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
2e25b40eb8074e35cd49c40b23ceb8f8
SHA19f7e5667983c7b65b8a53528c06292e32111a9f1
SHA2569767a6491c56514f73948fa7ea14fe647a0940df52608b85019b7e56d859e046
SHA512920b68ac74008b5cff2567017a55bff60230c41fd0cdd6399787fe5bf4a67534a29bd7a741055be85f9a5d05fb700d9a52e4569b6d0f2a63f1b9e0f575ab9aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691MD5
2cc8613aed5ba6c1f68e493602c486bb
SHA155b367e6ab9778ed606acaddaaea37c8d4707536
SHA256b93e48fab42632b8310e2245cea35b656fde25e0c4cdb617d0307c85ae8087b9
SHA512c4ec1dc4d1e5f1faac87b7ed14deaf9e5ae9e44aab77cd44aa5ca7d96d140260387d93086b0b1920076646851dd67c04e64f4044dcdf7a40d41176106573f7ae
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\5RG57X76.cookieMD5
edcc20c733e7df8d9e72b951dddb58c3
SHA198f2fdd4903a64f047977e7766a9d440c9915aae
SHA256431d51b59cb43b1d9a3c4c6a57750a4a419fcae85fa17a8c86a0670875edcab4
SHA512672fefa8469d76ad3974141f3e615c66571b8aadb6cbe74f4f404ef1c092a50ee323916d5ad0c373480cc379ef9784c8ed1df9eb89fda4a10ce0e6bc4fd6b137
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\8SH86MKM.cookieMD5
b70f2b55d6658aaad034b84010c8f249
SHA112e9488617c2cc467c1e5827b03d4ef8a365e7e2
SHA25656d54977616bf78f87505a6ac9ff65858b681bba2c47d4ff82c171c5540993bf
SHA512623907a6a6b424ffb991de5acf527e008100cfead938d09196dce9afb15700d4ebb32779a5f14c22a874b83ed6ae4f27beacccdc30d26207bdf7e04e1ab1e90b
-
memory/660-140-0x0000000000000000-mapping.dmp
-
memory/1684-138-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-149-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-122-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-123-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-125-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-127-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-124-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-128-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-129-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-132-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-131-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-133-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-135-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-136-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-137-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-120-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-141-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-142-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-144-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-145-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-147-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-121-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-150-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-151-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-155-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-156-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-157-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-163-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-165-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-164-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-166-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-167-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-168-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-169-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-119-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-117-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-116-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-115-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-173-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-175-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-179-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB
-
memory/1684-178-0x00007FFF144D0000-0x00007FFF1453B000-memory.dmpFilesize
428KB