Analysis
-
max time kernel
118s -
max time network
144s -
submitted
01-01-1970 00:00
Static task
static1
URLScan task
urlscan1
Sample
https://www.ismyrotaryclub.org//Click/?_uid=800004603&_ctid=1972187&redirect=https://gy3tq.codesandbox.io/?af=Ym1vbGxveUB3eW5kaGFtLmNvbQ==
Behavioral task
behavioral1
Sample
https://www.ismyrotaryclub.org//Click/?_uid=800004603&_ctid=1972187&redirect=https://gy3tq.codesandbox.io/?af=Ym1vbGxveUB3eW5kaGFtLmNvbQ==
Resource
win10-en-20210920
General
-
Target
https://www.ismyrotaryclub.org//Click/?_uid=800004603&_ctid=1972187&redirect=https://gy3tq.codesandbox.io/?af=Ym1vbGxveUB3eW5kaGFtLmNvbQ==
Malware Config
Signatures
-
Detected microsoft outlook phishing page
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007dce5df328d2b3428465887ea00eec2d00000000020000000000106600000001000020000000f1930f53dcef9c28649f8b2e5f69682bef4e339f2fdad9f15cb09e5be1cbbe63000000000e800000000200002000000018cb00b786ebca0984bed12fa62198fef769dfcb321e8defa55a454db59ca5d72000000088c52870cc42980f61d6a01b2e7504c33606c6c29c58a8fdbd6582fba5e58e2d40000000e7c551f5540c450c6285f26e60d9fa4e2fa586841ebc6ac4fd1342ecf4b2095a7f7e51db275fcb4d73d37db0af93d5bfdfc15a77b50d89d1cad0ae4458cb7438 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20fa869641cbd701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "342110997" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40137b9641cbd701 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "342159583" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "342127592" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3C5F738E-3990-11EC-AF2E-DEC7D0DD9661} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007dce5df328d2b3428465887ea00eec2d00000000020000000000106600000001000020000000770fdd2cbe72c7dab3f0a1a4958eb72fd8684cddbd7f2d29749d6944ce03fe08000000000e80000000020000200000004a0239cfbe592c9b63472bdabfb043c56005c8baf2e142a41da1371e0cdd2fee20000000aca722ccd318130fabbedda9fbb2bdba3b091086211fb9967a50589c7790a39e4000000066b5635ad9b086c86ab7238d09fe31b5d31a33b1e96397f35e8dcf3ce50405587fc390534734a0bdde2a4bd5098f6a51851412af7f8037787ed2ac4c504e29e5 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 3756 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3756 iexplore.exe 3756 iexplore.exe 1372 IEXPLORE.EXE 1372 IEXPLORE.EXE 1372 IEXPLORE.EXE 1372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 3756 wrote to memory of 1372 3756 iexplore.exe IEXPLORE.EXE PID 3756 wrote to memory of 1372 3756 iexplore.exe IEXPLORE.EXE PID 3756 wrote to memory of 1372 3756 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.ismyrotaryclub.org//Click/?_uid=800004603&_ctid=1972187&redirect=https://gy3tq.codesandbox.io/?af=Ym1vbGxveUB3eW5kaGFtLmNvbQ==1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3756 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4FMD5
e06bb2055b50cddf32580e1946d2c89f
SHA13a9d3114420f24445638b532d8dea26e2d4a0220
SHA2566348a7f9805283d31d37664dbb9a2ed9b75e4860d7c30337214d79bc139bb29c
SHA512c9a0c1b5b0e4e1be50e8670f93d06dd6d73b4d39882155ce6c2a2d3a8ea9bced2c77a78089c36661a3a6d9624cedf8104ae3ccf982098454189755cbcf46d3f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62MD5
4468de15dd18dcdf7ef4b3971c8d3afb
SHA144da0ac6d3fe79e2dcad3b8345da6df286f982f8
SHA2569bebbecd7699ef9441824ad950999b411cf51d02af35af97db5ebad10af0779e
SHA512196be39966f55c333416375157f749f8fbe3fbda7f27c1008bf6b8ca0906dc12d6ab1c974b22d98012a1e8766c0ce7b31151acfe9a938dd4009430b448ddda62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894MD5
115135090375ce11e830f02246064e12
SHA17433b7272f89d0db71c4b08ebdaca908ef330d07
SHA2569fb5073955f1640b556540c028a848487c868e915ead8abab1ebab1985c8731d
SHA512b8a06bc7826d076831c9b5a41506df533bb59e0a6cb2e1f1bfbfd5026221ea307a44712513578d3ac11dbee5988f02887ca6ba09c9771fad3cbf4ffcdb7ce34d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FC5A820A001B41D68902E051F36A5282_961E84E8253776F56FED44E0F7E5258AMD5
cf330544032b9f3f661b2632f3a6eeca
SHA1bcf35e63ac49aff5f1e785942119959bcc6794e5
SHA25654e9fe5312eb696a6137e535b7584c7634a4afd5105e3843dd0ac54da332b53d
SHA51210231ad50dc2ee73231934b1cc4dea38ef687139e363dffdf9891f5947608867208d326bbd88eb18ec4d95bf1edf0622427009e803b49d29cd4408127bed7689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4FMD5
129975c57ddf202b01be3ed997b32d0f
SHA1f763863eb2cdf8e2a80a8b9f64d724a1c212dbd1
SHA256c6def6b3c47d021a6710bca3eeedb9a75b61dbad39f2aa4420536a4d84ecae4f
SHA5127758a6071850e9ca5eadc8f7ab1aa0a21102b81deafb7ee4743865e549196dcc487626f4c98d975044eb3a954f0943425abc86b762552e4f1d05d518e5ea0711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62MD5
59b9ecfc2261748d997da534c8aeea51
SHA19396b14e2844606d245d26be8e2345f62c32cf8a
SHA25611329300cd09dcc50250a453f76c31507a16b22ea4e52620f505a9735a4aaf0a
SHA5128bbe4a3a847157511b46dbbb9337eed75b922726353f172c491c0c71276a52d9b746f3d570af1fb845301654a8c3ec863eb4d90f4d0e89c4dc3b5c5ef5115f3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894MD5
7c4274a4573931a12cc2842301fffd0e
SHA1a69cb59cfb6b6b2b9c9c891949c969af8115cc9a
SHA256b1b9f038db04d19333ba287d40889f2e3ee9439b2a8cd0c4251358b959ba1827
SHA512be5524d56ee3e0743b45fc6ff1a3b6faab80217c4babb65065cfe7902f989bfe7df690fc71c78b00350c90e569bd46ebd4c3df5eeace65ee5ba5c997bacf910f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FC5A820A001B41D68902E051F36A5282_961E84E8253776F56FED44E0F7E5258AMD5
67d45f30ffdbc0d2ae76d37e423373a8
SHA18296179474ac6fbc90776501ab96062ad6388706
SHA2568ea4a90210fb5dd78925117c469b6ff5f532e9216d83549c8461a2dbc75b9da6
SHA5129c9ea8d410966166ba5c0aabf20ae4497fbab5ea6891dea9f93f659891f836a5157912bd2a3e658a87d6803f7339c9e117926046a642d58293af956de97fdc85
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\PPS17VGV.cookieMD5
2c72b39c4999d171a9b06bb3c229c9bc
SHA103485a90da0ac8d0e8359e04b89603cb86fa0ae4
SHA256e110fc70eb7a94dbc6c35fddee73af25486796818ff551d944418b436cbd2705
SHA51235f72f275bb4778bfd7dec87b14dbcaf4ca58ac1ad14ffc28d58baa517147e262e372f54458bf1bc8a41818f807e4388736fb74cefd9b324275561451005df0d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\SDRRFT34.cookieMD5
a6868834620f6912fa6ed0a15d01e104
SHA12504b75696d615650a6bd94eb83649132fb5b1a2
SHA25684e0d3942f3db65213e7f06128a2607a54bf5a584be16c1fef0d96decb4931b8
SHA512235a6ca0556f66111c1519bbcf05ac1d801320918e6e3b0521f25f3f28092f6779c6cb84449087481d260f6d89505266e0247d0a7c347b6faaa52337f5bc6dde
-
memory/1372-140-0x0000000000000000-mapping.dmp
-
memory/3756-142-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-151-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-123-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-125-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-127-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-128-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-129-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-131-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-132-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-134-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-135-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-137-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-136-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-138-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-141-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-122-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-144-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-145-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-147-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-149-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-150-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-124-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-155-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-156-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-157-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-163-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-164-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-165-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-166-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-167-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-168-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-169-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-121-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-120-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-119-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-117-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-116-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-115-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-173-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-175-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-179-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB
-
memory/3756-178-0x00007FFE0D270000-0x00007FFE0D2DB000-memory.dmpFilesize
428KB