Analysis
-
max time kernel
34s -
max time network
32s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
20-10-2021 16:41
Static task
static1
URLScan task
urlscan1
Sample
http://b3.shivammills.com/p/dml2aWFuZS5iYXNzb0BiMy5jb20uYnI=
Behavioral task
behavioral1
Sample
http://b3.shivammills.com/p/dml2aWFuZS5iYXNzb0BiMy5jb20uYnI=
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
http://b3.shivammills.com/p/dml2aWFuZS5iYXNzb0BiMy5jb20uYnI=
-
Sample
211020-t7kl3aacam
Score
1/10
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E9889D65-3430-11EC-B8A2-62A5EE0E1157} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3284 iexplore.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3284 iexplore.exe 3284 iexplore.exe 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 3284 wrote to memory of 2288 3284 iexplore.exe IEXPLORE.EXE PID 3284 wrote to memory of 2288 3284 iexplore.exe IEXPLORE.EXE PID 3284 wrote to memory of 2288 3284 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://b3.shivammills.com/p/dml2aWFuZS5iYXNzb0BiMy5jb20uYnI=1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3284 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2288-140-0x0000000000000000-mapping.dmp
-
memory/3284-137-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-168-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-119-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-120-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-121-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-122-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-123-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-124-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-138-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-127-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-128-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-129-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-131-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-132-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-134-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-135-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-136-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-115-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-125-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-117-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-149-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-142-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-144-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-145-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-147-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-141-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-150-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-151-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-155-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-156-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-157-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-163-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-164-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-165-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-166-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-167-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-116-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB
-
memory/3284-169-0x00007FF8A1940000-0x00007FF8A19AB000-memory.dmpFilesize
428KB