Overview
overview
3Static
static
3Onedrives/...AO.htm
windows7_x64
1Onedrives/...AO.htm
windows10-2004_x64
1Onedrives/...GC.htm
windows7_x64
1Onedrives/...GC.htm
windows10-2004_x64
1Onedrives/...O.html
windows7_x64
1Onedrives/...O.html
windows10-2004_x64
1Onedrives/...P.html
windows7_x64
1Onedrives/...P.html
windows10-2004_x64
1Onedrives/...LO.htm
windows7_x64
1Onedrives/...LO.htm
windows10-2004_x64
1Onedrives/...FE.htm
windows7_x64
1Onedrives/...FE.htm
windows10-2004_x64
1Onedrives/...TR.htm
windows7_x64
1Onedrives/...TR.htm
windows10-2004_x64
1Onedrives/...an.pdf
windows7_x64
1Onedrives/...an.pdf
windows10-2004_x64
1Onedrives/...A.html
windows7_x64
1Onedrives/...A.html
windows10-2004_x64
1Onedrives/...bg.png
windows7_x64
3Onedrives/...bg.png
windows10-2004_x64
3Onedrives/...F1.png
windows7_x64
3Onedrives/...F1.png
windows10-2004_x64
3Onedrives/...ion.js
windows7_x64
1Onedrives/...ion.js
windows10-2004_x64
1Analysis
-
max time kernel
146s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-05-2022 22:31
Behavioral task
behavioral1
Sample
Onedrives/Onedrive1/AO.htm
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Onedrives/Onedrive1/AO.htm
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
Onedrives/Onedrive1/GC.htm
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
Onedrives/Onedrive1/GC.htm
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
Onedrives/Onedrive1/GNO.html
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
Onedrives/Onedrive1/GNO.html
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
Onedrives/Onedrive1/GP.html
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
Onedrives/Onedrive1/GP.html
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
Onedrives/Onedrive1/LO.htm
Resource
win7-20220414-en
Behavioral task
behavioral10
Sample
Onedrives/Onedrive1/LO.htm
Resource
win10v2004-20220414-en
Behavioral task
behavioral11
Sample
Onedrives/Onedrive1/OFE.htm
Resource
win7-20220414-en
Behavioral task
behavioral12
Sample
Onedrives/Onedrive1/OFE.htm
Resource
win10v2004-20220414-en
Behavioral task
behavioral13
Sample
Onedrives/Onedrive1/OTR.htm
Resource
win7-20220414-en
Behavioral task
behavioral14
Sample
Onedrives/Onedrive1/OTR.htm
Resource
win10v2004-20220414-en
Behavioral task
behavioral15
Sample
Onedrives/Onedrive1/Starting-Business-plan.pdf
Resource
win7-20220414-en
Behavioral task
behavioral16
Sample
Onedrives/Onedrive1/Starting-Business-plan.pdf
Resource
win10v2004-20220414-en
Behavioral task
behavioral17
Sample
Onedrives/Onedrive1/YA.html
Resource
win7-20220414-en
Behavioral task
behavioral18
Sample
Onedrives/Onedrive1/YA.html
Resource
win10v2004-20220414-en
Behavioral task
behavioral19
Sample
Onedrives/Onedrive1/images/landing-devices-bg.png
Resource
win7-20220414-en
Behavioral task
behavioral20
Sample
Onedrives/Onedrive1/images/landing-devices-bg.png
Resource
win10v2004-20220414-en
Behavioral task
behavioral21
Sample
Onedrives/Onedrive1/ojomu/OF1.png
Resource
win7-20220414-en
Behavioral task
behavioral22
Sample
Onedrives/Onedrive1/ojomu/OF1.png
Resource
win10v2004-20220414-en
Behavioral task
behavioral23
Sample
Onedrives/Onedrive1/verification.js
Resource
win7-20220414-en
Behavioral task
behavioral24
Sample
Onedrives/Onedrive1/verification.js
Resource
win10v2004-20220414-en
General
-
Target
Onedrives/Onedrive1/YA.html
-
Size
1KB
-
MD5
d67910f919cab028ece0910045d35632
-
SHA1
9d1bf565755997c23f78b61ec681ddb198bebe77
-
SHA256
3740c585d2066e7137f393771fd52f905d46becd7c33a492201316a33bc53f09
-
SHA512
816ea7debd32a5898cc6e423c83bc6c3e2fc91d7f562ef427e58bc7c425af3f44fb485e9eb2def03e65a6b6c7f6a9d98024339d742e7d876ca717b169813bae8
Malware Config
Signatures
-
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30958409" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2591426578" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2591426578" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{D36C2BFF-CF3C-11EC-A58B-66F9B3FFC396}.dat = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{D36C2BFD-CF3C-11EC-A58B-66F9B3FFC396} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30958409" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
iexplore.exepid process 4232 iexplore.exe 4232 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 4232 wrote to memory of 480 4232 iexplore.exe IEXPLORE.EXE PID 4232 wrote to memory of 480 4232 iexplore.exe IEXPLORE.EXE PID 4232 wrote to memory of 480 4232 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Onedrives\Onedrive1\YA.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4232 CREDAT:17410 /prefetch:22⤵