Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
04-11-2021 12:27
Static task
static1
URLScan task
urlscan1
Sample
https://forms.gle/8pLPXPxLgFBBCWz7A
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DOMStorage\support.google.com\ = "32" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "32" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4057a5437fd1d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "342797194" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "342845780" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DOMStorage\support.google.com IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80898d437fd1d701 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "32" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007dce5df328d2b3428465887ea00eec2d00000000020000000000106600000001000020000000b0ac04d370aa9d972fbf9e9ffc57d37f8c55d98085b71a0e785d9ea180e884fd000000000e8000000002000020000000743804a5545f7fbbdaa20de337adaa668d3ee906cb7159e4125a59898724db2b20000000740fcd62bebc662a022052163d61fb5acf4fcc75108ea41efff3b6b071724d4e40000000ed3b6ef1faf5164aa68c5cdbaad21466e1a733540b67557017c978dd9c3fed115100f66dbf71df32e708b6c58a6969cd466654c925946c72f105afa2dfe5ba48 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{176314BC-3FC6-11EC-AF2E-C21CE4F78BE2} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DOMStorage\support.google.com\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007dce5df328d2b3428465887ea00eec2d00000000020000000000106600000001000020000000a64a08c0a33d1a6b1aa1d5cf55114ba85fdf5dc6e80bb07557a442316455ae96000000000e8000000002000020000000d41cd07cddbf35a95127687b2d1842266821475808b89102bf5ddd024c8fd0b9200000006b0b26753f3fd168af589f323ef16b343fb2be8c17e247fab6f09426d27b654840000000c9de45e436d475597358c8a020d42bf604733b36937de1ebd46dad3d39bc299197b426405a20565b07deec15daf98493cd13b458c310109c9bf53c2d437dc029 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "342813788" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3104 iexplore.exe 3104 iexplore.exe 1168 IEXPLORE.EXE 1168 IEXPLORE.EXE 1168 IEXPLORE.EXE 1168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 3104 wrote to memory of 1168 3104 iexplore.exe IEXPLORE.EXE PID 3104 wrote to memory of 1168 3104 iexplore.exe IEXPLORE.EXE PID 3104 wrote to memory of 1168 3104 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://forms.gle/8pLPXPxLgFBBCWz7A1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3104 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAMD5
2a276649c48c9798edf3c34e5ca4ac98
SHA1673fb27211b89efc4ec796017a3787c887a5163c
SHA25627c29537046db2b23b228ddebc1368e6df2a43dbfac8f90f90e094f8376a2dce
SHA512516e00636025b2be73125275c2fed0d74b520b56fe4ae1a3d3fac3e035f7382428f17457c7aa3252342219fedf0b1f741da5a0d98376f8c1bcd4e55a7f84dd0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_5411BDEEACC3999569FAE2A91A33551CMD5
cfe01e13f2beee80979868556cd03b5d
SHA1b9ad0d7e46a9e457b0d827c9a76dabde260f0b53
SHA256e325b253f2423fc79f0f6a92aef0c573f9f76a9b733cfdca6828f9b15ce3b125
SHA512af74857499926e0dbf430f9e4e9ece03a61e67bb5b37fdfb4b3cfffecd689aae60fa862541a64d0d928701a1a2ae46cdaa49bca7080626827c2c328bcafd93c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAMD5
64e9b8bb98e2303717538ce259bec57d
SHA12b07bf8e0d831da42760c54feff484635009c172
SHA25676bd459ec8e467efc3e3fb94cb21b9c77a2aa73c9d4c0f3faf823677be756331
SHA5128980af4a87a009f1ae165182d1edd4ccbd12b40a5890de5dbaea4dbf3aeb86edffd58b088b1e35e12d6b1197cc0db658a9392283583b3cb24a516ebc1f736c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAMD5
3772e42e90599d2d38d91716e08cbadd
SHA1993dcfd4897b2459cbb3c4cab336da9339f0e4e0
SHA256ad315216a5cf6daa968bcde4c7bc1334542aa92d65c57f3316b3c4f0ccdb726a
SHA512fbfdd23b5605a5c1774dd84da95b3f243d79ec7203d0e0fd4a19ebe23c0f6307e63eb1e481143e27c911d81952356946df696e7438f5c3d2e6d88b3ef0b08213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_5411BDEEACC3999569FAE2A91A33551CMD5
c53168b1ae12e1f3188a0e317d36848a
SHA1aaf7997f6e9dec2eedda7403be3e40375e47526f
SHA256d494561bdc24dae30b9bffb7328a2a55d125df00ad47abc45c492401dbd10e0c
SHA512b7e7f72a017de933a2ccc968bdefa9b9c5646f6b666bcb4ea28710ea3464e4ba11068331f9555361b232a483ea29b65e56945f71e33726de1ea0f9e591d16d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAMD5
9c612aa8adbc12d2776fc3423c1df934
SHA1e7e7999e1e3301b02d783d8ad882e47572d27607
SHA2562c5e9fb6151175640d6cc81d56ac2830a73a1441fefa526ee18b09e257e16758
SHA5127a5ecb733b44e1ca90e5551f2032df7b6bd43b71fddf284c204f8d6fbdfb13cf6cb347964f2912ee861186beca6feb19643d2914a310724afbc8fb3647839464
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\D3SGE3ET.cookieMD5
cccf0a568cc996b8d9e78f40464c0d99
SHA1ddeec0c4d2712e4014b9258418699a56f981d988
SHA25651ec3b0de4a5ca3d43b6cfa429c4cecd2730acbd342d67e85886a3ea420cd4f3
SHA51244dcf3784b763b4999a3f95ea2291095edd9297f0103ce584625566d4b153e49d1adb5022bc19e4e55740a755d0a5256dfa4ca70af02281ab2b8873103ac58ab
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\I2SLMG7D.cookieMD5
5c0b3175d375c87dffc9e97e017d7121
SHA1492d3232a9c0fd98560c0d4a2e67121c155c3f03
SHA25661be7d3013cec29269595d510cc537fcf10008df9784bf3a7de5138ae8d524d2
SHA512db2e468a754bb340ba3f44adedd8146fbd210b08f8e7017936df564f93c4b9f0efd154a5aeaaac0bf87376d5ce62f3388c13b8617f980cec880123e93c921763
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\U7AL69K4.cookieMD5
e295582eb35f9c607d9cbc57e86d069d
SHA1c5f73d045353b359a441392acef67b9ff30f1096
SHA256e4b94ca726ce2ae63c2a0f25a5584091631a6f58f1ffe0b5582e451f95add505
SHA5126d3819ea1e2f67c0b078cf3248270ccf67676595d3b3d51a01ac767b7960afdac4596ed65309154140d36c8810b2ea222233b1d6152d7a78164dcde890170865
-
memory/1168-140-0x0000000000000000-mapping.dmp
-
memory/3104-149-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-157-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-128-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-131-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-132-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-133-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-135-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-136-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-137-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-138-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-127-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-141-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-142-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-144-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-145-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-147-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-115-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-150-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-151-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-155-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-156-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-129-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-163-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-164-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-165-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-166-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-167-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-168-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-169-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-171-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-125-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-175-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-176-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-179-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-180-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-124-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-123-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-122-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-121-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-120-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-119-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-117-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB
-
memory/3104-116-0x00007FFFA03D0000-0x00007FFFA043B000-memory.dmpFilesize
428KB