Analysis
-
max time kernel
122s -
max time network
137s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
08-11-2021 07:12
Static task
static1
URLScan task
urlscan1
Sample
https://nt.embluemail.com/p/cl?data=8d9cg%2BSyaNP%2FaRwH0uUoq0p%2FUOMcKb%2FlnNafQmcO2U7h7k790gBhUSpjU2Cc5aJ%2BJL%2F8Q9Qe0SwNUiD20GnvLai5u9vMEKGwxhAyvrDtC4s%3D%21-%217j6gn%3A%21-%21https%3A%2F%2Fwetllands.org%2Fi%2FamFtZXMuYXNod29ydGhAcmFib2JhbmsuY29t
Behavioral task
behavioral1
Sample
https://nt.embluemail.com/p/cl?data=8d9cg%2BSyaNP%2FaRwH0uUoq0p%2FUOMcKb%2FlnNafQmcO2U7h7k790gBhUSpjU2Cc5aJ%2BJL%2F8Q9Qe0SwNUiD20GnvLai5u9vMEKGwxhAyvrDtC4s%3D%21-%217j6gn%3A%21-%21https%3A%2F%2Fwetllands.org%2Fi%2FamFtZXMuYXNod29ydGhAcmFib2JhbmsuY29t
Resource
win10-en-20211014
General
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "343121265" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f9406ff0332db44b36b7a7c571692eb00000000020000000000106600000001000020000000042cddfbb0734a33b73d91381b02dd8793a8ac748e044e281e3e27ab6bf4d194000000000e8000000002000020000000301bb6a6361877f74caa164d01190952d197ced78287d1851ccb9355fa3c77782000000071d53c8d8c2c2e28ce13482258e6ad3aed8804f869a8aeff1002d1e942c31d6940000000a9b749e740e83eb787af1416d68ea99f1afcba4aa59ac65a8b9b72bb78c969d5b3919fbf5e31bb1c6ddc71446ebf2288e8e935ca9089cc02d1e39c5e5d796279 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "343153256" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f9406ff0332db44b36b7a7c571692eb00000000020000000000106600000001000020000000381171c5e7e07c138dcf4de4314460077a860f5f058a841da7c5cae29e83a875000000000e80000000020000200000000ca9afb81d1c050690c05f5fb627569dd0fa27291a30d2094aa7f5007432b16c2000000033b4582d444992e9f11516be26b099ba187b5ec47efe7275f3b54f24032d96824000000011e81e5c3f417d68646067e3cb60d6cab2726cfe2fe8bb66e7ca2af3ee95a4d7758162f8b578387f81b89a8578f302538f78005b28a58f8a4ca0b3787e756810 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0b4402d4bd4d701 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0084322d4bd4d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2D0813D7-42C7-11EC-B8A2-527FF4A17328} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "343104670" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2720 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2720 iexplore.exe 2720 iexplore.exe 3960 IEXPLORE.EXE 3960 IEXPLORE.EXE 3960 IEXPLORE.EXE 3960 IEXPLORE.EXE 3960 IEXPLORE.EXE 3960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 2720 wrote to memory of 3960 2720 iexplore.exe IEXPLORE.EXE PID 2720 wrote to memory of 3960 2720 iexplore.exe IEXPLORE.EXE PID 2720 wrote to memory of 3960 2720 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://nt.embluemail.com/p/cl?data=8d9cg%2BSyaNP%2FaRwH0uUoq0p%2FUOMcKb%2FlnNafQmcO2U7h7k790gBhUSpjU2Cc5aJ%2BJL%2F8Q9Qe0SwNUiD20GnvLai5u9vMEKGwxhAyvrDtC4s%3D%21-%217j6gn%3A%21-%21https%3A%2F%2Fwetllands.org%2Fi%2FamFtZXMuYXNod29ydGhAcmFib2JhbmsuY29t1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2720 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751MD5
54e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5F9ACEAA0635610A452E366DB4EF30F0MD5
63f7aff352f7689a856c243fa50bb8f7
SHA13bebd5d81f50525d3c25d1d3fb89990108631518
SHA2566698420aaf00d8791b8863b15b0fd8b8f242074577d4f7801533aa7e4ad6bb3c
SHA512185d9a09e03da9f36b38443c31c6517223369c92a08526390ddd5534363d23f044f8d456e31a3db7ce77befa643130fda390685aa7e77ec007ecd63ec4986d0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751MD5
f462e6c7abd8d54d9e1c93b3db0edcd0
SHA133f99a6904e94d90dea7142778a9a5f21a6e2f79
SHA2566d4e8ecd1e255dfd4d866c0d08dfdd863ae01da97a5ba885fa848213b54aa12e
SHA512caa9482ea71d798896a0a829c69672e0883534a889237f5ca9f8044ff153e15a97f396fb1adb89068d3b16954842d3e6187033a85390ca9bbb3d98af06f4f775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5F9ACEAA0635610A452E366DB4EF30F0MD5
11d4dca002ec339dc5233e6ac391328d
SHA1edc472dd5eb94c21654c8974a6f24fc277237ee0
SHA2560961b70a7794e869633cc11182299144cd7e03ba015c7bf9d57acedd48cb1ac1
SHA51220b3efb59a894706176d0c8dd139c55f0e50d3b382270d917d67118ceda26f56dbe3f7c2af51f415069ce2cb89cd6794ccfffb85c10cfab8a37cdac9213effce
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\E7Z8D09K.cookieMD5
bd1370604ef5078bb1929e80de430bc5
SHA161fa03b840f4c4503822933706cf840288db83b8
SHA2568f3afc0c8dac33344cf3ba93a8dad30d8c198ed4907f63dcbdcb8b8f6651e472
SHA512b9452a02b544324ba4fc55c0930c2c65ff9f38853107c0f479ebc8598eb89f38629cf26f5454a363f0d80db7a1822864c7f471ee8751a000cdbbfe6160c7e85a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\JS1S8A7V.cookieMD5
b2930ae706ea0f7c0bef07e171374237
SHA181ab8d413b2d692008895cc5b5782bb1b7f31f6f
SHA25601bb47f6e0792d332e08d477dff49e5db92cf51372fde75c08fd1182f1fbcd12
SHA5128c0057df9965ee075083fcd9856c2be8f9a9d6f8a2084a576ccd74e2d493e067cd60c214dd6878b6ce0333862b7ba022832940e7511aace36d671d38f3925fe9
-
memory/2720-145-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-150-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-124-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-125-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-127-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-129-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-128-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-131-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-132-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-133-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-136-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-135-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-137-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-138-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-116-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-141-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-142-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-144-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-115-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-147-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-149-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-123-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-151-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-155-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-156-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-157-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-163-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-164-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-165-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-166-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-167-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-168-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-169-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-173-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-175-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-178-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-179-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-122-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-121-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-120-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-119-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/2720-117-0x00007FF82D740000-0x00007FF82D7AB000-memory.dmpFilesize
428KB
-
memory/3960-140-0x0000000000000000-mapping.dmp