Analysis
-
max time kernel
122s -
max time network
146s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
03-01-2022 02:13
Static task
static1
URLScan task
urlscan1
Sample
https://redirect-wait-services.blogspot.com/"
Behavioral task
behavioral1
Sample
https://redirect-wait-services.blogspot.com/"
Resource
win10-en-20211208
General
-
Target
https://redirect-wait-services.blogspot.com/"
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 807084af4700d801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\elkatibi.com\ = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\elkatibi.com\ = "18" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "18" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8db62ff13956941acf514a4778508d7000000000200000000001066000000010000200000000b24f268918c188359ecea23fdb706685e93160061a536cfd89a236af6586479000000000e8000000002000020000000e361d282bd1f4e63c27ce8139dbbae1b879da9641385d33e74cadaac132f53ca2000000084e92a98908db6ee57994c9312077f2b7676f440b36cca9d8282f19bb7aac74a4000000033c587fa10b5bc3e9da3ae47d4a1b766afa9e9d52e45537acc582f78ac43ca7f4319f29d32ce06b7263db35d9c30cdcd1bda534b15ca8e5e4244c260e4444a13 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0c067af4700d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "347989610" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "347957619" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "347941025" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\elkatibi.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4BE22793-6E96-11EC-9231-CAC7FE7A08DC} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\elkatibi.com\Total = "18" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8db62ff13956941acf514a4778508d70000000002000000000010660000000100002000000047dd5653c77369a116fb4fa18c0e57136c15215b87e09e1435f6719c6640d88f000000000e80000000020000200000009a871fd486caa659a5500a5114efeb27bc82922805613ef31cef3f39a30c3a3720000000f59e0e9d3950035aecac37c1fdf40dbe3600963d2419e36148ed4d4497c94e7f4000000008c5b3903e7724354703013eb8b78e69206b5171b80d3793a6beccce1218dc167775b53ed66a5ffd78aac9594485e631bdaebf2ecaa37f016cc362941b7aabd0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\elkatibi.com\Total = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DOMStorage\elkatibi.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 3328 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3328 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3328 iexplore.exe 3328 iexplore.exe 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 3328 wrote to memory of 1984 3328 iexplore.exe IEXPLORE.EXE PID 3328 wrote to memory of 1984 3328 iexplore.exe IEXPLORE.EXE PID 3328 wrote to memory of 1984 3328 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://redirect-wait-services.blogspot.com/"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3328 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751MD5
54e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\97EBCCE1665E9DD5B88457CAD3B73C98MD5
5bff7e24fa153e62b2711c5314a0607c
SHA13574b8094de5b88055462db070207e3f73256db1
SHA256df839a30e72a199ddfba2e72189a52288187c80633056c887633028129ccecd1
SHA5122c345810c0fa981b3573efa019656dee3704e9999e9cd39a0ce18969e1ecae96519bb0263c622aff6e6998c3878d1e902f44dc88105b812e780776bb6c5f4f39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751MD5
94e92161644ef8ac74267fee2c9bf651
SHA1dbba838fbe8838f7809869efb915586c03b8ef88
SHA2563f37f35bdcd3cece7ab11669cc3998ca7ca0560e1e3a9b6c16b9af42b7af9c45
SHA51202213e052804107ae2eb8fd955e3b984670133afa2af4187e82149dbb2918dede049da765a8d289154a6d0375bf2969cf15990671db485f95464be677318500c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\97EBCCE1665E9DD5B88457CAD3B73C98MD5
b853bcdefc3270a094e8177469e66ee7
SHA1157bc1d41016075145a8f6ad9c07023b0a4f9a9a
SHA25686af9097e35483e39ff2dbedd38a15bcf339f5d2b6ea6d3ef262391bff23717b
SHA512a21eb4f0a47b3de79fda8d877419218344edf1b4648b3686036cbf8193e62b7d1df6c8244535ca2d96e26587b42015a418fdf0625a63a60af98487f3a2a99481
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\HJNCJ973.cookieMD5
95b2ddfde6818622f416dd55fba35217
SHA16199cf732c92c4589e9a56b8cad6fb3b66832460
SHA2562adffb53ffd7e4d98a397fb9a0cf6a4303bfd8a338b4ac7cb585d271bb388375
SHA5127c83c22f7e0a7789fa754934f792fc7c2c16aaca38307edbd4e5bf8b71ea025360e562439f0a2d4348511c6f0e132cf7ca2673e9aafbf01e536e22e2d89e1d70
-
memory/1984-140-0x0000000000000000-mapping.dmp
-
memory/3328-145-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-150-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-124-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-125-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-127-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-128-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-129-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-131-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-132-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-134-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-135-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-136-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-137-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-138-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-122-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-141-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-142-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-144-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-115-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-147-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-149-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-123-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-151-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-155-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-156-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-157-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-163-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-164-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-165-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-166-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-167-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-168-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-169-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-173-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-175-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-178-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-179-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-121-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-120-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-119-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-117-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB
-
memory/3328-116-0x00007FFBF2320000-0x00007FFBF238B000-memory.dmpFilesize
428KB