Analysis
-
max time kernel
125s -
max time network
132s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
26-10-2021 06:33
Static task
static1
URLScan task
urlscan1
Sample
https://www.coinbase.com/accounts/9ccc56a7-72f7-59e5-a9de-c92268c0149a/transactions/6fadebe2-51fa-5ecd-ab3f-d5d5293deb02
General
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "341994995" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E7F10D0F-3892-11EC-B8A2-DA737FEC8C9E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f9406ff0332db44b36b7a7c571692eb00000000020000000000106600000001000020000000c903a20277fbacf3de694ddbb991df8990ac2893a8faaab2a059672b80295fb0000000000e800000000200002000000092630b04fff45ca5114aa7313fe4d792317dab8fac6ae2ef49a519006d2b3f2a200000008f9a7328d219d6793d9087d6a54ef159d5c34f11701eb1a2d3f0516884793b3140000000b1d2748f6ca70cb81b57acef70db02d9986a54662fd69786e5a29e9a01f688fe6c3156ced2b2d4bd92f37ca57c4155a79134b875ee9bbe1ee69d12a0c786f17c iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0fc997f33cad701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a059af7f33cad701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "342043581" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "342011589" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f9406ff0332db44b36b7a7c571692eb0000000002000000000010660000000100002000000077f8f2032d5ccec6c3378b3a8ade020ed5d1b96bc776b0299d68d71c1ead52c2000000000e8000000002000020000000f1141b45e5f920e41151a95d0c3f31909f8c770192a37d87892eebdbd1e335f9200000008f2f4a1719087179b42c943db09ddc8e1b91a0a3ea66a634502d9a274ec1e4eb400000000cbc0032c60a8bee6c7219e8bdc09f31017806ce02b135c21fbf5de8fd95533fe6e778e07dfecdaec2b000d53a67d7c82e9a14bb080e4d667db25720f35a1d89 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 3404 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3404 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3404 iexplore.exe 3404 iexplore.exe 428 IEXPLORE.EXE 428 IEXPLORE.EXE 428 IEXPLORE.EXE 428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 3404 wrote to memory of 428 3404 iexplore.exe IEXPLORE.EXE PID 3404 wrote to memory of 428 3404 iexplore.exe IEXPLORE.EXE PID 3404 wrote to memory of 428 3404 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.coinbase.com/accounts/9ccc56a7-72f7-59e5-a9de-c92268c0149a/transactions/6fadebe2-51fa-5ecd-ab3f-d5d5293deb021⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3404 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
0bb9633d7cd76baa735473052f61aad0
SHA199fe3252b0d121c6eaf41471710401ef09d6222b
SHA256565d5fa72ba1dce92a850a73d0e85d05c90542e4e58e897c1ff1245e427641db
SHA5129e5df54ed0e4e27f68b3b74d467946c8fbaf020e97d3b0ed65f5f37d768af26cef7e6f633bed045fe9d6284eb4f09e7b2656e0805ba83c356eabfc0fd726a341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
ed22ec8992801644d9f922565b633acd
SHA18dc7142753428b32bb21718268590276fc1412d3
SHA256ac16267d249c51cf194397c6c1f598419da95ce73226688d06bb2e74e69a21a2
SHA512ddb60fcaf7802152fd1bc08c97a1ac9e4c68d8bc5810d779ef49a617039727ff325a47b3ba6fa39a3aa0e6ff993329fe5011dbec91af2cfac2b38a874e97aaa7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\9D40VNMT.cookieMD5
c8dc13f35ffee2f5fb5a2975c8e2de0e
SHA1b6a4b4e1496a7b7f3d7e8f4f4850af4dc9ff9ce0
SHA25688a5311b1b902f39236725c9ad9dcb5867dc303bc78108e1d576674e874c697f
SHA512a717bd7f5d15a978c7250e9f6da5773099d31b53249ea4cbd5f550ae654527c4fb2b0da182ee36532eaa327d2af0cb05602833eb62f936f2eeedb3e824064f3d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\HUIROKOG.cookieMD5
6b4340aec83c3acfab8ea30139aee096
SHA19673ac455e8073b557be209fb504b0a02e828b24
SHA25670afa2ac061947b06bb1d705ff930107d69b05dde86044d9f869bd5f5a772bb9
SHA512a20be0239a821b7a3143fa84a40d23792ad8d51c0375e64eb5c03e04d87432fcd3079c3541c35a86afa80ba87cf4c0923fba00010aafb182f444969e79e83b5a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\LOGOYTVA.cookieMD5
65a0a756934eb377cf55ca61c978da9a
SHA1a64920d439cfc69277cfb6930c7c84b6475a1054
SHA25608ee73b61930447d15f93ab7c06717a9db00a179e47855295a29ad5a06150d89
SHA5125917def73b8fdfa592ac08d5eb57b15d2bd3a80ccf35415a86324601bb2673412274f6fcfb82a0fc9e443f2d656bc28e64f4a02bbbb9a2d387894905fee5fe98
-
memory/428-140-0x0000000000000000-mapping.dmp
-
memory/3404-145-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-150-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-124-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-125-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-127-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-128-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-129-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-131-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-132-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-134-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-136-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-135-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-137-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-138-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-122-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-141-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-142-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-144-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-115-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-147-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-149-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-123-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-151-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-155-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-156-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-157-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-163-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-164-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-165-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-166-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-167-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-168-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-169-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-121-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-171-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-172-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-176-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-179-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-120-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-119-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-117-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB
-
memory/3404-116-0x00007FFB28450000-0x00007FFB284BB000-memory.dmpFilesize
428KB