Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
05-11-2021 15:17
Static task
static1
URLScan task
urlscan1
Sample
https://seusitebarato.com.br/owa/Outlook.htm
Behavioral task
behavioral1
Sample
https://seusitebarato.com.br/owa/Outlook.htm
Resource
win10-en-20211104
General
-
Target
https://seusitebarato.com.br/owa/Outlook.htm
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30921907" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 107a3bd8b3d4d701 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30921907" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002b5b008aa2024f4581a8e5e30df850c300000000020000000000106600000001000020000000ec6f6449582558d17c028f9bb88d1f2bfc185fb38ff9d2102670d80f17b5d6c7000000000e8000000002000020000000bee3613b4801f9438e267360d578461dff552572931e11379a47a491445d076720000000126f46bad9b1e42a8d5a924010d66e2c41b247121c8383ba6705a57c464b5cc540000000d3f100bebc1da8e15da9e40dd2d0324df8965efb506d75423843226a75438b648389f6c22238b40c7b3590dbf83bf1e88dc1482bec875f8418cf449a80d62e41 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FFF23E94-40A6-11EC-B34F-56E05CEBA64F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "343149632" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3595594865" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002b5b008aa2024f4581a8e5e30df850c300000000020000000000106600000001000020000000744fc13b9943781c6bd2cad8194a0957b0eb0c3deefc419e10244df658a171b9000000000e80000000020000200000007ba3a121361234324dd3482e81e79e5878954645d41fdda4dc19e91abdaadfd2200000005318016cb2ad6a6b40941673637146fdd451e8d1d5c53ab42c10161bdbd3053340000000459b6a3ca357fce8e717e11dff282da883fa18dd3c36ceaf08153eb1c1cd9333c74d9b8ab475c30d0e68f95af715383b8df3189996ed2cd642f949515ff7fa63 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c05af6d7b3d4d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "343198218" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3572469824" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3572469824" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30921907" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "343166226" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 2636 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2636 iexplore.exe 2636 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 2636 wrote to memory of 2208 2636 iexplore.exe IEXPLORE.EXE PID 2636 wrote to memory of 2208 2636 iexplore.exe IEXPLORE.EXE PID 2636 wrote to memory of 2208 2636 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://seusitebarato.com.br/owa/Outlook.htm1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDAMD5
735f5516b6f4b833c78b97de204c684e
SHA177184218fd742a12464520adee80aafa20dd0f2b
SHA25651123b73b33d0ce03da5127b241d89bc163178dd30501ea2a0c86332d0cf9eda
SHA512bf6dcbaad32bb36807e5989fc81ef9f575224a13767d5b09d7bdb129ebde1f8acf205bf8e2cbbb1f02f0ef5bc6b67b7595ebe6f40e0dce5815df0a06250e06cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
a46e27d1a674a729535408d54d78d4e6
SHA11ad0f6b6df35fcaf74aacb6195d93132d08ea74d
SHA256c95ecbe6c10d85cb26ea3272fdc61301e5787f74c4b94fbf893116776ca81e48
SHA512412d5ef57f201da817f15a7d7e091ca84a800934c7d33e83b878c363e70493b91119cd967b957099bb874c12ccc7879ce15f9ab81b813fd181d5d45e27b186b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691MD5
94713f6f61494d17306470f13e3847d4
SHA1243aa1f8f3813a8be97c9e9474df8eb18dd7f432
SHA256f166f11ee27a342b04dac2e62bff8cc3eeb80e6c0315f8f7312461b9f76971c3
SHA5129aa10220ace33968eb166b004721a72da3ee3432f1e2516617637269a1573d6f59d3d2963676f8218738e25e87fc12d0ecb0177873e148fd5f9d678fab109693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDAMD5
3e848dc30594e534c41761201916f2c6
SHA15a808a3e1320735f05b9ed3e111e68471bcf3282
SHA256352ecf4f1c0b73096b3c42845863aa1cba149c35e3e89217c4108d6de2e898b0
SHA512eaba649f754e7dc33059031ca3f0cc8d5fe00439ba953722328ff740992496969be4d9f810f4018a247cdc57d963b26db34dc795e35e6a8cb395704d81f2bdee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
6dbab6323082e846ae0753bb95c36180
SHA19ce696bca823eaca54139b703b746a902a05ca30
SHA2568dc50145a23fd5076bb8e1cdb4adcfdf759fd0952e3ebf1c0415507f36d29853
SHA512acaf64e720991b01c4d6f5feff798732071cfed9e9ab9cf9925930b7b04a33ab82130245987aafe9f7e418985e90f79f65a46eb2c69ef590222d8cb94ef12676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691MD5
d167dc8ef7e0d10c7257b0d57964d883
SHA120c2ad54c777be7f24ce8c2aef25167767b2b428
SHA256fae9ebba4e0ff0d39cc5dd04d3aeff60dc5bae8c4c98839381641626b99f637f
SHA512558ec461b7dcd2aa00c896176cd3cb3be3e5f1a054159cbc50fce9b1c7f20da09c53ded836a00a596968bea4715b723214857c4260a75734bc48cc283daab50e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\YMK8VWLG.cookieMD5
1a6e885ef7da6c306759a65edb881e23
SHA1154d14729154b86e14625e5db512b9375de7ccc4
SHA256afb574a430cfecc2f076eeea9abec70c76bb099f3b13a48ff5c0cb9e46f3db51
SHA5129c20ee2ac140176092b0b2ccfb0a07c3ee1755b0693b965c26d6a5edb66dc4df3cfc36120d282c76ee89c3ff67e8e50bbe9e8c6837ffc774978d435ec343990f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\Z328WLJ0.cookieMD5
519c0f2be2f4f99e83110c92cf172d42
SHA1a82a34e23d5f6c19f395d44ec4beb24e71f7fd65
SHA256d7eec06f381d3db80936e0b281f11afababe7298675a4e65a3ac6de02f1346c7
SHA512eef4f0a3e2ace6cfff9717e12be5a810104e0b542d4402aadf8d27c747c9eecf6980b48d17bb383e6dbc7262593e5a8fb4d39838379e961159fec1ee83b731a6
-
memory/2208-143-0x0000000000000000-mapping.dmp
-
memory/2636-145-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-152-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-125-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-126-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-127-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-128-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-130-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-131-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-132-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-134-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-136-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-137-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-138-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-139-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-140-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-141-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-144-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-123-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-147-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-148-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-150-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-124-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-153-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-154-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-158-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-159-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-160-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-166-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-167-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-168-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-169-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-170-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-171-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-172-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-173-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-122-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-120-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-119-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-118-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-175-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-178-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-179-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB
-
memory/2636-181-0x00007FFEF91D0000-0x00007FFEF923B000-memory.dmpFilesize
428KB