Analysis
-
max time kernel
72s -
max time network
74s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
19-10-2021 16:57
Static task
static1
URLScan task
urlscan1
Sample
https://bvmf-my.sharepoint.com/personal/thaisplima_bvmf_com_br/Documents/Blocos de Anotações/Correções Versão?d=w764cf6a2642c410b905b2216ea0b7348
General
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
Processes:
IEXPLORE.EXEdescription ioc process File created C:\Windows\rescache\_merged\1847152663\4112857022.pri IEXPLORE.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "341394362" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30917782" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30917782" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1654662784" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40d4ad6896c4d701 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF683106-3369-11EC-B8A2-56739040C57A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "341426353" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f9406ff0332db44b36b7a7c571692eb0000000002000000000010660000000100002000000006ee82c3166ffb3731121859cde970cd05cff7e712e6ac3b92bfb64f47262271000000000e8000000002000020000000ce5107379117cf967289ab2dba00c47d4c71c7506fa0646d752a5a4c27f3bcef2000000061519a83d0cffb5252b57bd178f4cf293bd599dc09b0d466b9345567e6d1710e400000008a206ba4f164e71e409af3e4722cf9cc3cc2f0656b8174603d1f0f3ad394168869573e00cd2a929a5157e6d7ad6fd9f691fc1abbda13901f5c687cb9e2dbdebb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f9406ff0332db44b36b7a7c571692eb0000000002000000000010660000000100002000000009bc9961228596390629989d093c94cf528ea8e471b131e08b7ef43f0b06c060000000000e8000000002000020000000408b4ffd1408951e9f90aca6d3076f6441540026134777d072a2b9dd5846637420000000e0af4d31062b05a55ab80c37e4a94f48e7d7373731bec5332ffabad48212d5ef40000000abe165b517a94f82b998847a6a34ccaafb59fb9634a630bd531219f147557a67988b9c0d162a3d511635399ae9c20d48609f378c7fb5fd053c204d39fd76bb4d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "341377767" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1058c36896c4d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1654662784" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1694060645" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30917782" iexplore.exe -
Modifies registry class 1 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 5072 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 5072 iexplore.exe 5072 iexplore.exe 4380 IEXPLORE.EXE 4380 IEXPLORE.EXE 4380 IEXPLORE.EXE 4380 IEXPLORE.EXE 4380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 5072 wrote to memory of 4380 5072 iexplore.exe IEXPLORE.EXE PID 5072 wrote to memory of 4380 5072 iexplore.exe IEXPLORE.EXE PID 5072 wrote to memory of 4380 5072 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "https://bvmf-my.sharepoint.com/personal/thaisplima_bvmf_com_br/Documents/Blocos de Anotações/Correções Versão?d=w764cf6a2642c410b905b2216ea0b7348"1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5072 CREDAT:82945 /prefetch:22⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_AD319D6DA1A11BC83AC8B4E4D3638231MD5
1aa709a5c2d1027da9fa0d912b05029a
SHA1f2c545133a8027656b71596fcb4cd80415a0da29
SHA256a7bfce367e1d2f12c067bec56f95f4b339b1e9cdc0b07ead3c298551f8da0595
SHA5125be46043bca875fd62b3ac30bebcc6c667495fe14f609a817ce111b21a02e5d6007657da28f37da6c765e55057981a03018ea2f390723580a870ff6bbd70dda4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
bcc1cc8e9989b87087d23e119f44f534
SHA15f1f9622769b1a11ea6a5a67af094b82d6052fd1
SHA256b4bb217e52ab6f7ddab1ccafda702ac33f338dfc65eaaa955afdb1979f19ca46
SHA51273e3befee1440cf382a23ab83f331f17ada79a72815c5f844336830857c385ead9883eb94bbe0cae9d910618d32964f61bb30650c7e367cea2e8e9bcf4f66552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_AD319D6DA1A11BC83AC8B4E4D3638231MD5
cfa13f283e59a988dcdccefd02ab3494
SHA14661e60f3afec6f40d09aa8614a13042fff53d29
SHA256c7f62578be162c49ebf2884fd4216c694c29e466bd96f1913d4bd6a9d6ed84c2
SHA5129d7dee369f8a8c33787756a2d9fa599eacc4437ac514d3a693c2198bde6a1efe09c78639a6a56d24ff8ad4fc22442aed909ff9d45badf220472d2fa08b1d34d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
ca8dfed346d571fe4130959cbca2daad
SHA1c791339be67969930d63b6b5a2d9274fcb3cf4d5
SHA2563fb700a8737ef753067ca43f3f0caca95a2bfc0ce5b9ae40c25f8deefb8162d4
SHA512d74abc74cf80d83558296e57e1f7578f1a42cba5b72ed21519f17eca8998d81ddc1d7dcbe65b7b600a687e4ac5ca8f8ca001233734736e978f0248a822e1697d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\9DALCFMX.cookieMD5
a222febbb15edbe47df59b16fbe868d7
SHA1b8d2d89a8f88631a7ce032e1a37dd9a6917d033c
SHA2564789dba48c394da9fcb5a891e8380b637ee353bbcd746a9a46e6e938c8f99dcd
SHA512df4665e04f9d7cbeda9415a7a484563df2ec3d1e3883505272e60fbc157dfe5bdd1554871561ff9ad3ad2cdc2552e5dd5089df7ceb3c81c508615a80c198b75d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\LF99VOW9.cookieMD5
6d7e12ade344b8f8c04b6ebef4f6f4a6
SHA1b403e2a930abeba3d97d6a33a7cbca2f9c14ce08
SHA256b421d7d7c46bb7bbd1f62f12c7496e0871592174f79fffe18e8eee6ab68b0779
SHA512ee2e5bbbc80f42e35ac50fe02f9d0fa6c1e083606f452e20ad346e416bd21c2004860eba5b41c159c08d5114a081d3dcc95874df5d4884ad5de18a6a92934310
-
memory/4380-140-0x0000000000000000-mapping.dmp
-
memory/5072-138-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-145-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-120-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-121-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-122-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-123-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-124-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-125-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-127-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-128-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-129-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-131-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-132-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-133-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-135-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-136-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-137-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-117-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-141-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-142-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-144-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-119-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-147-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-149-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-150-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-151-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-155-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-156-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-157-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-163-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-165-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-164-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-166-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-167-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-168-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-169-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-170-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-173-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-174-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-175-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-180-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-116-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB
-
memory/5072-115-0x00007FFF30C70000-0x00007FFF30CDB000-memory.dmpFilesize
428KB