Analysis
-
max time kernel
121s -
max time network
134s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
04-11-2021 18:37
Static task
static1
URLScan task
urlscan1
Sample
https://institutotrasplantecapilar.com/wp_includess/srotummmm/clementdondscar/vloandiscoo/[email protected]
Behavioral task
behavioral1
Sample
https://institutotrasplantecapilar.com/wp_includess/srotummmm/clementdondscar/vloandiscoo/[email protected]
Resource
win10-en-20211014
General
-
Target
https://institutotrasplantecapilar.com/wp_includess/srotummmm/clementdondscar/vloandiscoo/[email protected]
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "342828535" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "342877121" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f9406ff0332db44b36b7a7c571692eb000000000200000000001066000000010000200000007b980f85f77b8d5dd48294dfbdd6a929a32e8845673a782cf98e4080fb854744000000000e8000000002000020000000f6c35f054e37ee7a3a9bd88c403b43a647eb950edb9153ea491d826b142b419920000000d92774541ffd48c98735d92f60aa9f15acb69d4ef4189fe5a2f87cfd4203eb1a40000000ddd15d16bdff3c872d62f849551c522bdb88ecad511b9f8313800ca66697732a0e37c832d2964183647f36ca61d7006bc84978f2f1ea36b9d150d6514f85d680 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{320BBAF6-4002-11EC-B8A2-EAD496D17CC8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "342845130" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 205c392cc8d1d701 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 2740 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2740 iexplore.exe 2740 iexplore.exe 4064 IEXPLORE.EXE 4064 IEXPLORE.EXE 4064 IEXPLORE.EXE 4064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 2740 wrote to memory of 4064 2740 iexplore.exe IEXPLORE.EXE PID 2740 wrote to memory of 4064 2740 iexplore.exe IEXPLORE.EXE PID 2740 wrote to memory of 4064 2740 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://institutotrasplantecapilar.com/wp_includess/srotummmm/clementdondscar/vloandiscoo/[email protected]1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751MD5
54e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751MD5
09fb003154ad1618e4bcd28deb3b27ab
SHA1df3419f3a46e3848cac6877c5046b98b3ad14c3f
SHA25671e83af8bab42123f743ae127c3e76585fc0ebeb94628d8f8d0fa7c44d0b4ae4
SHA5120387aa4f517e51f2d549ff2027a36ecf6a1841f5e6eba5d32f5bd567c7c1a5dd75f7a2b8a31ea6544b56434c6194b89987f3ebfb574bc16d66b47b80f5277b86
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1BA3P8U7\logo[1].pngMD5
4f4d7b75b014adb01168d73e92e42e96
SHA169939f37f12fda183d1dee49f88babcb7a6bc115
SHA25639a3fdb214d89ccb143210ffd8b48badbda7e6d53feaec2b0b3185d569890e2e
SHA512f583684c9520b41532a6767e43b6f70d5afa4c62c69350388e47c38b7c287d121f91704bbd68d0faf0febb2865f21f8874725ddcc51d82b9f6f689bb445cd547
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\RT5AHH46.cookieMD5
1df175db4eb8fe1c1c0827f7d2fea65e
SHA10525402c10ef2e69fa74d30e28ceab41cd9bb056
SHA2566bda54bd433ec5ea2db68bf504f060b8d8341ab350c1c929482b7eead356ea76
SHA512c25e5ef3b332ac8f65a4bfa964fc2a00d72ffd7ede9764dfeeb4214a85681a7d9c422d970f6588ddf1e180b3b17823c5d0b42e5ea77e5ab67d0ffe0bb1d6530f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\U15EXE5N.cookieMD5
19a0617557ca816e08affcd69254dba0
SHA106645f5007f3c1ed9d451fb0db41dc3edb3048c1
SHA256504d931ac19f69c4d50b2cd6320d7955dd6c8242dd2135fce134055c6fdcd174
SHA512acd0ae06f8a52bb70af967bf5b3b6ad89e83d5fc50451c598ce0a494d2c654f5b0fc64b27c02b991f96663224cbaf8a30cb7fa8d7a131b0a97e7ca7bb81538a2
-
memory/2740-141-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-179-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-119-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-145-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-121-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-122-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-123-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-124-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-125-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-127-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-128-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-129-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-131-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-132-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-134-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-135-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-136-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-149-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-138-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-116-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-142-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-144-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-120-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-117-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-137-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-150-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-151-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-155-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-156-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-157-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-163-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-164-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-165-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-166-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-167-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-168-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-169-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-170-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-171-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-115-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-173-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-176-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-177-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/2740-147-0x00007FFB41010000-0x00007FFB4107B000-memory.dmpFilesize
428KB
-
memory/4064-140-0x0000000000000000-mapping.dmp