Analysis
-
max time kernel
121s -
max time network
134s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
23-10-2021 07:57
Static task
static1
URLScan task
urlscan1
Sample
http://etkg.me/95xMIr
Behavioral task
behavioral1
Sample
http://etkg.me/95xMIr
Resource
win10-en-20210920
General
-
Target
http://etkg.me/95xMIr
-
Sample
211023-jtjgqsdbdk
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "341789426" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DOMStorage\delivery3xzjh78ajkhcx7.ru\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "18" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DOMStorage\delivery3xzjh78ajkhcx7.ru\Total = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007dce5df328d2b3428465887ea00eec2d00000000020000000000106600000001000020000000529440f48ac5978cf788b8ef004a942476621f3f30bb0a80394d50df6edbf577000000000e8000000002000020000000492cd140a907940f4933a3e15db147bfefa01591a4acdc52f53dbbb10545839b20000000377f67dc8428021875c12730992fcec32a1bb6706b884b3697c11ffb344ab758400000009fa14cd40a3ae9abeb4013c12c258ec1433537ba0c73bafc45e7f6b3308bd5b464ff5de3c118a8478a0ae2d82959dee7bc4fbf78222d7eb573b23820d658288b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DOMStorage\delivery3xzjh78ajkhcx7.ru\ = "18" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{646A474B-3632-11EC-AF2E-6A0AF100798D} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DOMStorage\delivery3xzjh78ajkhcx7.ru\ = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "341757434" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DOMStorage\delivery3xzjh78ajkhcx7.ru\Total = "18" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d07a75bfe3c7d701 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30dfb5bfe3c7d701 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "341740840" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007dce5df328d2b3428465887ea00eec2d00000000020000000000106600000001000020000000924601e5b7b0b5385e5081811e955efa198dc4f89f5befae16de3dcae162b145000000000e8000000002000020000000bb81532398b3da48b4eb966c13475a1617eafc757cbb93b798c01b58fc9b1d4d2000000018b0e99f3a78fb9c94d168b3df7c9d5947f942d9a7e309d15e6df77bf39db1e340000000efd4528df6562d6c934da54a33ec546d0ac6c020ce766ae3e84d0c5cd6cea4c63bd25d2df67d0d32f43624e2c3db5c0250e86ff62049033db6c210a073359ae8 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DOMStorage\delivery3xzjh78ajkhcx7.ru IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2844 iexplore.exe 2844 iexplore.exe 912 IEXPLORE.EXE 912 IEXPLORE.EXE 912 IEXPLORE.EXE 912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 2844 wrote to memory of 912 2844 iexplore.exe IEXPLORE.EXE PID 2844 wrote to memory of 912 2844 iexplore.exe IEXPLORE.EXE PID 2844 wrote to memory of 912 2844 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://etkg.me/95xMIr1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751MD5
54e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0FB8B902ECD4D598D57DDA6A947F6EFMD5
609a8f37deb3558d1793983b45e954cb
SHA150adf3a55f7afe7e7d6cb979cecc1527fd4f6e4f
SHA256983aa753443de5d291cc8f5de15c5857278124366cb547f51b0117d8d7eac447
SHA512eb503ab783487999d8665319e1689c8c30e6ba687517c6cd4367c4ab1edb802276f42d62d584f5a98bdc5b8d2ea916f5128885b4ae1821374e9c9d884d699703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751MD5
7401597e10d524a75808b2078aad191a
SHA1ba6f054be545e468bccc72b3ac4022746ee53f9a
SHA256598ced8b655c132640be7651eb4476d79c465a671c83970e7672775f77546be5
SHA5128ad688f07f79f9c441f66f342f45e49f48a7ff0ce95b0e4f85774530659ebcaa4ba94346ca112fc65ce9941187d695165094896a9dcf8cd1a61980f2a5e5dcdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0FB8B902ECD4D598D57DDA6A947F6EFMD5
2366f4ca9b05fb4464112a3f109c97c0
SHA154e8447ef041f8ce5c9a79c3421d4cfe397ecdd6
SHA256ee72d6b9b63552d6d1f363480190012c85e8b76f763c2beab0b044b8e1eb904e
SHA51291d5e1da3895b464ab61bc6928bc3b995b1841de4a5166bbf1840f0e3545c1975437f47e275f872c2f213feb8572d242317c0e6bd6bb20b1d91d27170d0c4bcf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\NAX4YKR1.cookieMD5
4a74b7f97f532095edd58339f510d24f
SHA1f8f925fbe690b6700f333958099abc990be5c43b
SHA2568aa7787e444a9111a3e1ebbf571308ae5e8aeb2e43d8463a50f7844d3e25ab4e
SHA512b8bdeed6e44ba7d377850460a0eccd203e1a9b05d195529b276b2a9a98a16efc7816cb733be43abf6eea1e9c9a45626d25589fd72061f16e036546db3a044b26
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\UKJ2TOF8.cookieMD5
60cf170bef0467b9b5881359ceeb115f
SHA16e6f9b3629602cf1c026f4429d1ec603b9f73b33
SHA256031c527a2c76bbfbeb2fa21f2b45bf1870fd8c58bb332188e5785cfa8b7044d4
SHA5125e2de1407f3c74f6822a75ebdf0fae10e97d2bbac4c13fc0966e72e2eea0753e004b0f446e5e8d6d4bd696ffac2b6eb864651c177991689930a6d139d18ae7ed
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\ZXBZ3R2D.cookieMD5
40503f550c671a762c1cff9c696841e3
SHA19788fd776a414b8066c5c277ed627e190d21c485
SHA256ae563c5d66bc47e53e94497ca65e2eb305ea91f6baaafb7cc3e032075a0c5221
SHA512beba92ce8c8b3295588ca51c59f13cb992d4294f2116f4e78418fe7154b808b1d6faf5de4e9b8a66c38dde75e1feafe68d42520d8de728c08cbd72e520a4b1d5
-
memory/912-140-0x0000000000000000-mapping.dmp
-
memory/2844-138-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-147-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-121-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-122-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-123-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-124-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-125-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-127-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-128-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-129-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-131-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-133-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-134-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-135-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-136-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-137-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-119-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-141-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-142-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-144-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-145-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-120-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-149-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-150-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-151-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-155-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-156-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-157-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-163-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-164-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-165-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-166-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-167-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-168-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-169-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-173-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-117-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-116-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-115-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-176-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-179-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB
-
memory/2844-180-0x00007FFEB5100000-0x00007FFEB516B000-memory.dmpFilesize
428KB