Analysis
-
max time kernel
73s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 19:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://s3.eu-central-1.amazonaws.com/mailingservices.documentaribvall/securedpaymentportal.html#justin.jelincic@kp.org#anVzdGluLmplbGluY2ljQGtwLm9yZw==
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
https://s3.eu-central-1.amazonaws.com/mailingservices.documentaribvall/securedpaymentportal.html#justin.jelincic@kp.org#anVzdGluLmplbGluY2ljQGtwLm9yZw==
Resource
win10v2004-20220414-en
General
-
Target
https://s3.eu-central-1.amazonaws.com/mailingservices.documentaribvall/securedpaymentportal.html#justin.jelincic@kp.org#anVzdGluLmplbGluY2ljQGtwLm9yZw==
Malware Config
Signatures
-
Detected microsoft outlook phishing page
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 205a1d02936cd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "359848102" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000962422cf799f2f46a7e75b376cef3c3c0000000002000000000010660000000100002000000030f7fe7e93c43ba7516beca80f015fdaddb4b6d4bed367fffb536ccca55053c6000000000e80000000020000200000009612c14f9936d2d5c3a0336f2f0dfabf90d9f03c886ea72184b506e075dbfb9020000000fab98c5ff684e2cb8676cffbdf8d96df1eace8dde32e297d4667a43711ade999400000005981e7bea17a5ea6e01306a52f7b1606a29bd95bd372f6fbf528e350f61d316195ec3245ee7714588d1a34ac67ca405e58e3e368cee8e65bbeb2c7fc1fbbc791 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{25727C81-D886-11EC-884F-6AE7990DC39D} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 548 iexplore.exe 548 iexplore.exe 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 548 wrote to memory of 1648 548 iexplore.exe IEXPLORE.EXE PID 548 wrote to memory of 1648 548 iexplore.exe IEXPLORE.EXE PID 548 wrote to memory of 1648 548 iexplore.exe IEXPLORE.EXE PID 548 wrote to memory of 1648 548 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://s3.eu-central-1.amazonaws.com/mailingservices.documentaribvall/securedpaymentportal.html#justin.jelincic@kp.org#anVzdGluLmplbGluY2ljQGtwLm9yZw==1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:548 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
60KB
MD5b9f21d8db36e88831e5352bb82c438b3
SHA14a3c330954f9f65a2f5fd7e55800e46ce228a3e2
SHA256998e0209690a48ed33b79af30fc13851e3e3416bed97e3679b6030c10cab361e
SHA512d4a2ac7c14227fbaf8b532398fb69053f0a0d913273f6917027c8cadbba80113fdbec20c2a7eb31b7bb57c99f9fdeccf8576be5f39346d8b564fc72fb1699476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
304B
MD50678982351506ef3ef2f066f35ecc56e
SHA17403750eb2298bae9f41b7b58638186d7ecc16fb
SHA25600748700e452f284b967a3a59ba21d7d581b5a30a71ee4dee8e1ab05ebe12fb0
SHA5122a886c23eefcc8fa9ebb22e5cfb039380cdcc5472862153dac10106276399f284eb5d1fe423b98907e0c723b7a0ed9db0e2b506cac8a83c4624ab86e6520b0e9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\YPWDFVMS.txtFilesize
603B
MD574e87796e4f4b4a373a69187c1cb05c5
SHA1ff58998d27dd011ac211c4570d5e3a1844af16f7
SHA256df7c30e83077cfcf2d837ab9d7e6bf377ce51bb612e49cd42645832005fdb050
SHA512d1b88d7dd98a360833535678ab113f37fad07fbb6c931cfdecd534a67c56bd355bd0347d82a1f325b7c0fb9fdf83d3d89547ecbdc38ba30a362a1d543d36b612