Analysis
-
max time kernel
131s -
max time network
144s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
09-11-2021 08:44
Static task
static1
Behavioral task
behavioral1
Sample
https://599116.selcdn.ru/general.verify/[email protected]
Resource
win10-en-20211014
General
-
Target
https://599116.selcdn.ru/general.verify/[email protected]
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "341209906" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f9406ff0332db44b36b7a7c571692eb000000000200000000001066000000010000200000001bfba7eae8aa7470a3ac4d8bda58b020b8d54c9a639b75aba67332a28c6d7ecc000000000e800000000200002000000021655de99f7e54d095240825c2c90feeb30f489111650336ce0bc9b813f6808b20000000e6a1ee188f95cc939ab7d9785707aa867afa00f3915422b06204d949274dc67040000000ddf0223b6eb881fe20e56073ffc17307788fcb918f66c359d9e73a63be7484170cc387e070a296ad1892dcf8c14bdcfce8788c91d185284abb6e92cb43948541 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30fd26efe8c2d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30917352" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3933097916" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30917352" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f9406ff0332db44b36b7a7c571692eb0000000002000000000010660000000100002000000024e8bb49ac6ffa3cd5c9d9abce37140257c06d7354e51c8de2da62d2140dc9c3000000000e8000000002000020000000864339fb26346b88665425405adcdb0a3bc1cdb196b054594ed334b50ac7683e20000000626e806944a71252c7c367b5ef0207d71a2fa4a3ea987c367b40783f2fecf34740000000fdda9dfc1fd4e22e816efdf8dfb293abcba2159bee8267bac61d1c56d652d86eb6ab64430040f702e7fe7d859c4db0deeb73469da48340df996aa7402008359a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3969817189" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1546D47E-2EDC-11EC-B8A2-6E8637DC7581} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "341193311" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30917352" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3933254084" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "341241897" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a08dfeeee8c2d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 2732 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2732 iexplore.exe 2732 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 2732 wrote to memory of 2640 2732 iexplore.exe IEXPLORE.EXE PID 2732 wrote to memory of 2640 2732 iexplore.exe IEXPLORE.EXE PID 2732 wrote to memory of 2640 2732 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://599116.selcdn.ru/general.verify/[email protected]1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2732 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\709A8EC0F6D3194AD001E9041914421F_60179D6E33955BC3D863DDA528D5DB6DMD5
186192d2798fabd53d239731c2c7756f
SHA1f41b4e6858bd88fa7ac42173a692d2dc6618881b
SHA2569242b5e0e1e239c044bf6ec7c7c5c80b82a4a78bed8126c5d12f4e32941cf9a0
SHA512cdbb5889ebd712938304dec1c916bd5b578098454abff19fa1dc2cea494dd1a413ca5ee4c3c77d7be13368712f1798b486648fc505ac5d3aa9bc431d10b6603c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_86C2A03C133240EC4C95180B9FD368BBMD5
d891626afda4c12ebf18afdcac6912b6
SHA19cfb3d23ce1a06da698a4b656a0f1687926e57f9
SHA2568d3bd60042bea2c11e5b91e739dc497f63410e22b589c69297be48fffbbd9688
SHA5126bf12d6d0618a58468069421fb7644b8c951b48f344d486b03122e49c6b05d470c9fd7b5be96b03cb8f055d53dfa2594ad4394c105d109475ebd94bac55f34b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
d633bf57f34a752065c6fdd8dbdc3c5a
SHA1bfb545f43eaa28e69eef2c32c660cdf00455c996
SHA256a2ea371aa04230abe844fec44d8aadd66682f66dadd5b96a96a5072c2f4446c4
SHA51293306b566a3215a66d441d280f8131269618894b393c552f3695616891b1e34d5b67a4d09167779fa4df41811a3e84b8ccf17d25f1b666c4ecea55f7a8a9a1ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\709A8EC0F6D3194AD001E9041914421F_60179D6E33955BC3D863DDA528D5DB6DMD5
5de8fb18a9c8a7118bb59975aaa15eea
SHA15fc5da1899fe71d512d2e66a64a462697645674c
SHA256a0e9d42ad951d27814f745d5f21c61facfc80b1ba8d5c0b8d0214322b30bec1d
SHA5122df8b1fd8682aa678fc92d2c35171f5e3b6e2bd04310a6c2a429f96243998139d552f9af74cf3fde65f0a362a80542292713165886bed1fca074aada07544f6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_86C2A03C133240EC4C95180B9FD368BBMD5
5418c96d3f576b2960bc475d5847ddc4
SHA1447b11ba3d20bd20b1414aa5b1d573b130c90968
SHA2564233f4acdf5b816f6da353be616e00b9429778bdc1976e367468750bc754861e
SHA5129f4f58f4a60cca5bf219fd46b1e408fcf20540f69e51101f9b5137f033e0d26117dab07fef5403dd120b7179be9b3b9e9feecdd0d2c46c009461bd626b6cab05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
34a22c056ca862ecf50aac29bc102d73
SHA13bc48e7e028ea1c39440b22f33e9da531da07b0e
SHA25675aae6bd6354eb0b66bc0ec49d8c5b0ccc8703405da8b7f797b4bcbb131b7144
SHA512482c7ee53b1846a09e9bd6310bc2c593aec081462b8edf9e4fa6f1abb47ddd30a99672d5c637d86559bef42b1a85a95c3b37625559810aac8cd65cbe6bd434df
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\NVX2P7N9.cookieMD5
44d21d006785f52bff7f4e726c6c55a9
SHA140d557abf6e50be252a753601ec2dfaf80584cd6
SHA256b2108ce4d8a2b17de774be9a194d6c8ab4d9975f82f972baf96fbf899de46c22
SHA5122c8dd77e623836b7e23b418a90ba7ea4935cac541e4800c956ef1f463f2204ceaaa50abcdcb42701e7e0df8c9058b7dd0010c11e864155be5c80c47de5f7f9f0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\YPIBJ91F.cookieMD5
08591c4717097af05e8c226cc18b13d0
SHA1ae7216b6c6f1dea4846c31dcdbe82cf6c7a2ffaf
SHA256b61032c53afdee7f83dd40c2299a048f21007103b3d9b1eaba40ef1e1f07d38b
SHA51238acd296f14403eee5b5be546b02d93c68a8e64cd6970daad9687c8bf1ae418f6245764ffd6ba21f36abf595ad8fd8aa2821d728c458a36b0f31f05b7703db31
-
memory/2640-140-0x0000000000000000-mapping.dmp
-
memory/2732-142-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-149-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-122-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-123-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-124-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-125-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-127-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-128-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-129-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-131-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-133-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-132-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-134-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-136-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-137-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-138-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-141-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-120-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-144-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-145-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-147-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-121-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-150-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-151-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-155-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-156-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-157-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-163-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-164-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-165-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-166-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-167-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-168-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-169-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-170-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-119-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-117-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-116-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-115-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-171-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-174-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-176-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB
-
memory/2732-179-0x00007FFDC4260000-0x00007FFDC42CB000-memory.dmpFilesize
428KB