Analysis
-
max time kernel
153s -
max time network
153s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
13-01-2022 10:14
Static task
static1
Behavioral task
behavioral1
Sample
PerformanceReview.html
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
PerformanceReview.html
Resource
win10-en-20211208
General
-
Target
PerformanceReview.html
-
Size
1.1MB
-
MD5
08287096d731608c6d79e58d5ec6db23
-
SHA1
a9e51f4649739bf75740fc9f755563cbe3780bfa
-
SHA256
1eca90b11008621f5ce811ec2af5df1bf277162ddcbb217302d36e8fab4b313e
-
SHA512
30cd4b79f95cfceb3556f7251ba7ff04037dc17b3c5a2cd15db22dc5103de3ee59924e48c51558f9585ffe96f7ff6f5b947e65d525b4ccea9c268c7a7b8ec8c1
Malware Config
Extracted
cobaltstrike
2026047692
http://www.stackpath.com:443/gp/aj/private/reviewsGallery/get-application-resources
http://stackpath.com:443/en-us/p/book-2/8MCPZJJCC98C
http://tracking.boostbank.com:443/v1/buckets/default/ext-5dkJ19tFufpMZjVJbsWCiqDcclDw/records
http://www.bankalsharq.com:443/api2/json/access/ticket
-
access_type
512
-
beacon_type
2048
-
host
www.stackpath.com,/gp/aj/private/reviewsGallery/get-application-resources,stackpath.com,/en-us/p/book-2/8MCPZJJCC98C,tracking.boostbank.com,/v1/buckets/default/ext-5dkJ19tFufpMZjVJbsWCiqDcclDw/records,www.bankalsharq.com,/api2/json/access/ticket
-
http_header1
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
-
http_header2
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
-
http_method1
GET
-
http_method2
POST
-
jitter
23040
-
polling_time
15000
-
port_number
443
-
sc_process32
%windir%\syswow64\WerFault -a
-
sc_process64
%windir%\sysnative\WerFault -a
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC9Ardq2bQHj9fPwtDjldcNQ1sHFEhpeHV6Oli9QHCc5hlE4zse5KwiLv5ufpdRxLzTeYZpr8jcvY6eNRKgukGpCUaeScNBjCU0e+yVZgr0IyCdbtUxeR0VWYcKA34vp42AVPaimH7ioVKXk8KJSb22eNbkGTZa/iokb4xD/NdWsQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
3.0086976e+09
-
unknown2
AAAABAAAAAEAAAADAAAAAgAAAFQAAAADAAAADwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/v1/stats
-
user_agent
Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
2026047692
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
mshta.exedescription pid process target process PID 964 created 1436 964 mshta.exe Explorer.EXE -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 20f5358a6608d801 iexplore.exe -
Processes:
IEXPLORE.EXEiexplore.exemshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e02b989a6608d801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000029a8fa03d77d0143b95f148165a5bc92000000000200000000001066000000010000200000008962f84d97a90fa49893059ea49f3c2793cf78d9a1a3385d4452c3d07b892973000000000e8000000002000020000000197ba5c7f0652feef332c13db2a6743f6a845ffbc68e4f142e21706e3f2e37a22000000055da778e2334d3c0e0412095521b3f56f8a97af369c21e3a7ce1f4bac033945340000000147facfa4ea824fc629fe58d972e0b0cba10545b9129063543e69df4e0bdd2cdf0fc1e311ec9a0c5dd110945e5fe26b1dc1d8d60740b24a50cdb42a6cdaa7467 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BD7D3EC1-7459-11EC-8BCA-C2BDF263E411} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "348833916" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
mshta.exepid process 964 mshta.exe 964 mshta.exe 964 mshta.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
mshta.exedescription pid process Token: SeDebugPrivilege 964 mshta.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 576 iexplore.exe 576 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 576 iexplore.exe 576 iexplore.exe 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
iexplore.exemshta.exedescription pid process target process PID 576 wrote to memory of 1192 576 iexplore.exe IEXPLORE.EXE PID 576 wrote to memory of 1192 576 iexplore.exe IEXPLORE.EXE PID 576 wrote to memory of 1192 576 iexplore.exe IEXPLORE.EXE PID 576 wrote to memory of 1192 576 iexplore.exe IEXPLORE.EXE PID 576 wrote to memory of 964 576 iexplore.exe mshta.exe PID 576 wrote to memory of 964 576 iexplore.exe mshta.exe PID 576 wrote to memory of 964 576 iexplore.exe mshta.exe PID 576 wrote to memory of 964 576 iexplore.exe mshta.exe PID 964 wrote to memory of 1076 964 mshta.exe WerFault.exe PID 964 wrote to memory of 1076 964 mshta.exe WerFault.exe PID 964 wrote to memory of 1076 964 mshta.exe WerFault.exe PID 964 wrote to memory of 1076 964 mshta.exe WerFault.exe PID 964 wrote to memory of 1076 964 mshta.exe WerFault.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\PerformanceReview.html2⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:576 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Downloads\PerformanceReview-v20220101.hta"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exe"C:\Windows\System32\WerFault.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
9440b73e47a4f891eb51c68b0cf45982
SHA1950cdc876ffe4f507e7798dfa3854ae5b63b4381
SHA25618f396ea1e08a2c7e8a05b9c93d908b932c468ff52ef3c4109ee0dfca12537d7
SHA512f42aea2e37b290cf8f020903b969a371612476e41d30cf1b7b2d4947980d7736b058124e50b88f8071824b46474845c9137fc7f9136af30e2db0b88312a87cec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
e9d5e1f07facf04a7ce3569dfa7ec952
SHA17d158b31b39c1a15ce05fab8228f27f2d9360511
SHA2561c13e2d22103bd940f42203670d7d9fa2de2efbd0201b65c23c9926fc51524e6
SHA51262065f11bbee68dd49ae5a758ed9200b002d04c5ea2afb06a9264427350a7a6247bb701549edcbde834396c549819c3b6dc089f79805569c5640d37b3249fdd2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\5JBUC0KQ.txtMD5
739d466bf18487a19b4249a0849c9511
SHA187d5ebe8ddea586a297107025f5fc3ed65ff8e67
SHA256f28b0b4d1c1498f190e4dd5c9c80d58a9faba9586e4c0e1caefe40c09021d017
SHA5129e3e085c07124f6a5a69c71bf374ce474985cc5ecb8d9f5db406d8f3c2df172bf84dd9ce1bac88e09dcf07e31130dc79af18a4f264f91b76a8d90c436c8e20e4
-
C:\Users\Admin\Downloads\PerformanceReview-v20220101.hta.qgur3w1.partialMD5
160b7d982e3526a09e202f0d61b3fdfa
SHA173db938ca6749ce32e7b64e18d80551876e2d291
SHA256f38bd16013de4b9da3603b2425173db9bcc1865f381351b2ba62fdeeb6d5af00
SHA512d51c9f2bf74b9551f088ec3830c385001012f37ef76fc5e33335374ad1832fc486cc4341d9f89e6233e7a197b97c6b49cf0744191dae2706188d03206b5a2b69
-
memory/576-55-0x0000000004E70000-0x0000000004E71000-memory.dmpFilesize
4KB
-
memory/964-64-0x0000000004D92000-0x0000000004D93000-memory.dmpFilesize
4KB
-
memory/964-57-0x0000000000000000-mapping.dmp
-
memory/964-58-0x0000000004D90000-0x0000000004D91000-memory.dmpFilesize
4KB
-
memory/1076-60-0x0000000000080000-0x00000000000B5000-memory.dmpFilesize
212KB
-
memory/1076-63-0x0000000075F21000-0x0000000075F23000-memory.dmpFilesize
8KB
-
memory/1076-62-0x0000000000340000-0x00000000003BE000-memory.dmpFilesize
504KB
-
memory/1076-59-0x0000000000080000-0x00000000000B5000-memory.dmpFilesize
212KB
-
memory/1076-61-0x0000000000000000-mapping.dmp
-
memory/1192-54-0x0000000000000000-mapping.dmp