Analysis
-
max time kernel
42s -
max time network
40s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
04-11-2021 10:07
Static task
static1
URLScan task
urlscan1
Sample
https://bit.ly/3k5Uc81
Behavioral task
behavioral1
Sample
https://bit.ly/3k5Uc81
Resource
win10-en-20210920
General
-
Target
https://bit.ly/3k5Uc81
Malware Config
Signatures
-
Detected phishing page
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D5CCE00-3FB2-11EC-AF2E-EE29200C20B6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DOMStorage\discord.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007dce5df328d2b3428465887ea00eec2d000000000200000000001066000000010000200000008c43aa61969c8e3343496760567dfc0d782d0147fe25a8f10fa6b99da5ba74d3000000000e800000000200002000000090565e2721f3160240d872944c96428b0aae6cfc0e30b59b6991886373e21b79200000000162034331cd10ef211efee9dc8514f1e399f48f6450ebf887c4765c1cc2646b4000000054b5940ecfb0f1591d027499d533b809216e5de47ad2e79f9ba765eeb0c0bfdcbbf32f29d5ed2ba952928c56fcea5439e5dabfcfc134fae2bae5cf07c0510e83 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 603da0cc63d1d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DOMStorage\discord.com IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007dce5df328d2b3428465887ea00eec2d0000000002000000000010660000000100002000000002493cc7d2a1ccde0cd969133decb37aee607046096a10f6cc9fb45442f95b78000000000e8000000002000020000000fbedec1cc27d28440a9b70e56c47d8acd279b5af9b927feeba680076c7ba105c900000005fb883935f258e82c75091413e527a5580d3f1cfcad0e28b8d161de06ed7d7a1c7f4ab72c7cc1121447adc379f997b9c5ccef378909f549b68e5e8e8d6e61eebfb4499be64728a821515cd08deec86b574ff7a1d4ecaa8fe0f1cd609fa76eb62c8e69ba7a65ccf95454828868968c0b8571ed2c2010f8b610c3ad56e1f1ce7cc84f5ae55d0d3ca3eea7462dc46fe54f240000000bb9cca3a66c686214cb342a77e9c36acc31ef11c1fb2c51acc09c49e72d74dee57fdacaf39ff040fd45140144927d0ac06f31d295dd514028a82b738ffa05ba2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007dce5df328d2b3428465887ea00eec2d00000000020000000000106600000001000020000000fc53407551fdb47395824ceefc1891a5229f6469092b45a4b4a70bf112f1120e000000000e8000000002000020000000dce7378aecab510a822ad02141cc1379c58735757a7c9391664a6f4bb28bf4f590000000ea6bf25806fd9f69c8e319908683553c73116af959f95ce3f8f7a3b509ef892986f1ba391355593b85f882bd6d035ffad2d0a871a127875da575e30d7c794f3eb8dac0fc1db78a0f54acb2d9c49c6b9e7cdd5f60347153c8a02c97ac82556fe29c3a8ca93a09fef59c70947b8b34eadcfcdb7f57f7b58727a296b252d82427e7a6362594f99eccfd5aea3fea4994176040000000d194d2c3065228c5bd721bda54fa8495beb3dfae70672426f478b2969d18acf82619fa848c85884c149fb0d642fd5d418d9d17cbb8ffd7c9d8788da1af27b1be iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007dce5df328d2b3428465887ea00eec2d0000000002000000000010660000000100002000000092dc1cf788ba240750964bacc089d62c48fc96d3037e2c64f6569bd58b90eba8000000000e8000000002000020000000d1b5010ff1d47138e85e4345dd2936c73d3338e667c154c8a16d728d1d38240d500100006a89b29c8e73222597965e21c06a7231147d5c8dc949ecc1b1c3fb79f2c890157f181f9f17f84c8effeadf39ce49d12cc61ae6bb5486c45f78f4d7bc0b6d624c32014f254cabadd026f4894f61df5bb11932bf0a5358b9eab2913abcce36685ac6ebc6e435c5dbcd40a6269beaf824ea1b3504617c4d64b24f3798ddcb4ddbacec3b4fad67288e68ed7ad5b615e8b1e37e4536ee172fb2e1268d857b5ce5584d575ea035b55f68b51de64e9fea46a4b918ad7403bce6e1e25aae5cfc8a500b9faf5a5179e46d381224ecc0a9079c2b2ec9da558dd7926134954cd1e486ed8a5cbd06d7db0605d7c925f5be3cc02610004c7fcbad390943feb37a0e28c55381ba6755c74be1e09f93777c2b55502e7aea9a1552ca86435b789ca05b4ede13b048202b147f02d15e1acccbd5a6d92bd1e68a141c99f8e35e0cdf3028a3f737b8b2b3b02b34f61d03f191e2378896021675400000006d2d5482c2df535d51bb223123c8dc659277890967c490cacb07b0b9edd717340598192280cd8284444576d7a7c7704e5dac35093592b24b7c56d918ef321c6b iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3800 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3800 iexplore.exe 3800 iexplore.exe 1460 IEXPLORE.EXE 1460 IEXPLORE.EXE 1460 IEXPLORE.EXE 1460 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 3800 wrote to memory of 1460 3800 iexplore.exe IEXPLORE.EXE PID 3800 wrote to memory of 1460 3800 iexplore.exe IEXPLORE.EXE PID 3800 wrote to memory of 1460 3800 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://bit.ly/3k5Uc811⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3800 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
10722f5f107620f615d87c823edfd93b
SHA19eef1faa0aa3a76f4744c83a41f04b58e3804cda
SHA2565fffa98fc644da59163b790900935b6142720fde254d8d377e6be299b3da473c
SHA5120d2b612cdee25f06db6280f11037421de54b8b244018fd121c66e8dd788aa314912b83882621accb0029c16c8d1af351ebc36b365ecc76f2de029403150e59ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
67c30fd05f0f17b5769c1fc4a8475d6e
SHA101bb6f44b2cdf76a32706767b695e6c0a109212f
SHA25698268a91eab4daf8f890ca05ddf1c089a86489d409148eb33b5aab798f41bef4
SHA51247838957de9ced38fb4a33bf20c90c37254860b3a7c392313c8e246a32e9107c8a670d2e35233660efa39700003fbcd39e9ae6b41f6eadb3f5fa77543f3d3bf0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\W7BMSTPC.cookieMD5
09f6d1b9ba5d00d3b42ad8ebff47f9a1
SHA17806e3886a0c44abd315fa83e4b2c110ac7071ec
SHA256c6b3dff2c43bf0ced28088269b049428aeffb074cd7b14b3c38da46924bea48d
SHA5121e8648a4f2182dd80b37128ab2cf27f51406b2a54b6c3fc09773e0e03e2252c97cd8e9aaf89dbf606412b70a97e1a00d3c5901b0338319c9f7fa9430826f3ec8
-
memory/1460-140-0x0000000000000000-mapping.dmp
-
memory/3800-142-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-128-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-149-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-123-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-124-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-125-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-127-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-147-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-129-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-131-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-133-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-135-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-145-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-136-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-137-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-138-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-120-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-141-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-115-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-144-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-134-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-121-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-122-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-150-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-151-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-155-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-156-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-157-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-163-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-164-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-165-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-167-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-166-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-168-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-169-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-173-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-175-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-178-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-179-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-119-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-117-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/3800-116-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB