Analysis
-
max time kernel
119s -
max time network
144s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
18-10-2021 09:06
Static task
static1
URLScan task
urlscan1
Sample
https://peshoja-ks.com/auth/logon.php#replaceCurrent=1&url=http%3A%2F%2Fmail.email.com%2Fowa%2F
Behavioral task
behavioral1
Sample
https://peshoja-ks.com/auth/logon.php#replaceCurrent=1&url=http%3A%2F%2Fmail.email.com%2Fowa%2F
Resource
win10-en-20210920
General
-
Target
https://peshoja-ks.com/auth/logon.php#replaceCurrent=1&url=http%3A%2F%2Fmail.email.com%2Fowa%2F
-
Sample
211018-k26gxadcf2
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007dce5df328d2b3428465887ea00eec2d0000000002000000000010660000000100002000000008b03e93b2e7f5c46e5a17bae9d35aec5d6d813f4a68977ce520edcf034aa818000000000e8000000002000020000000998979e382a70485c9a72e479de3b56b7883c513a5e91cf25e227d19a68445e42000000042899596ec1a636d3f422e5fecd2f657180d6ed1521be4f3ddc2adeacef5a12f4000000031e10df9c5503eec0cb1beed1f0dd9ff2ad9ca737449b713e8a725db6bf95847f98695a3347ca45c503d05e4122434b8b9ae006c629f86bd15240591283068de iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "341286504" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{465934D2-324E-11EC-AF2E-4AC12AF62747} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50b4a6d7c1c3d701 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "341303098" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "341335089" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 3556 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3556 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3556 iexplore.exe 3556 iexplore.exe 4360 IEXPLORE.EXE 4360 IEXPLORE.EXE 4360 IEXPLORE.EXE 4360 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 3556 wrote to memory of 4360 3556 iexplore.exe IEXPLORE.EXE PID 3556 wrote to memory of 4360 3556 iexplore.exe IEXPLORE.EXE PID 3556 wrote to memory of 4360 3556 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://peshoja-ks.com/auth/logon.php#replaceCurrent=1&url=http%3A%2F%2Fmail.email.com%2Fowa%2F1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3556 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
1455d22c553b285c8f185634919b1213
SHA142c08ceb4015831f59913382277b1d8049e6429b
SHA2561352ef5ad9f7d586e3f3e87f3d18520ed4387c92ae32162f6507410d47c3dbe0
SHA512ea9231f6723e8f76b6d8e1ad9ac9e95710996ab2878d6210a034721e12f88cfea5213325f2659d1cdd7a3181ef286d4aafdf9b0102786755ddcab84f9fab2975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
5e765e756aad15812044278a95ad05d0
SHA1c77ef6e50f91a47b2fc4df7c4d6fe8e994d48af8
SHA2563a068e431bcedc5f63ec470a5a86d39bb1ff7ffe166a2eacc6de94f66406164a
SHA512b3eff7c0a0869719844cea6721a3cf41b07ac0cab2e6002e24fa26d4aa6d882ecc5ac18f767c11c2a525fac6f021cca4344a62d59b993b37a87674ac4d909e30
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\M8WWZP5L.cookieMD5
25497a680e2d4aeeb8f0d2c37f16e531
SHA17608a078052c01372206dd19d8f3eaf98d5de37b
SHA256d2ce1d0a2c31c49623c1ce7b6dffdd98f3b0e5e585c9fe98289ec6dd138b7cb7
SHA512ed1def196c4ded044ec7855098227c168cbdb6b0988070113f3b95dc8700ed355e1f190b3fbfae77d24e68668c5c18cde1caabafa83f6da2a8e82ee5edf8a418
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\SRVLBVWB.cookieMD5
defc68456bddf9c0a73f754809b47a3d
SHA1acae47d5c0df45d8b46212cb9d453584f0ff2a06
SHA256b1c544a52915ca434734037a4b0e528992ab6a157f35065d0a983bec7a42cad8
SHA512773d88b03304f27be6e6f517680e01f1e0dcfdff723e0e217f1923dd02e635dbe0e235b747eaae699f0730a261ff771a3c3470be635824a6282f2b293132341e
-
memory/3556-142-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-123-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-120-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-147-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-124-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-125-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-127-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-128-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-129-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-131-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-132-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-133-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-135-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-136-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-137-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-149-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-116-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-141-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-115-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-145-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-117-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-122-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-138-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-150-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-151-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-155-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-156-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-157-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-163-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-164-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-165-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-166-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-167-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-168-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-169-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-173-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-175-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-178-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-179-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-121-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-119-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/3556-144-0x00007FFB85290000-0x00007FFB852FB000-memory.dmpFilesize
428KB
-
memory/4360-140-0x0000000000000000-mapping.dmp