Overview
overview
1Static
static
cdn-cgi/ap...E.html
windows7_x64
1cdn-cgi/ap...E.html
windows10-2004_x64
1datafeeds/...dle.js
windows7_x64
1datafeeds/...dle.js
windows10-2004_x64
1datafeeds/...lls.js
windows7_x64
1datafeeds/...lls.js
windows10-2004_x64
1dist/108.b...1b0.js
windows7_x64
1dist/108.b...1b0.js
windows10-2004_x64
1dist/177.b...1b0.js
windows7_x64
1dist/177.b...1b0.js
windows10-2004_x64
1dist/197.b...1b0.js
windows7_x64
1dist/197.b...1b0.js
windows10-2004_x64
1dist/205.b...1b0.js
windows7_x64
1dist/205.b...1b0.js
windows10-2004_x64
1dist/3.b2a...1b0.js
windows7_x64
1dist/3.b2a...1b0.js
windows10-2004_x64
1dist/34.b2...1b0.js
windows7_x64
1dist/34.b2...1b0.js
windows10-2004_x64
1dist/41.b2...1b0.js
windows7_x64
1dist/41.b2...1b0.js
windows10-2004_x64
1dist/68.b2...1b0.js
windows7_x64
1dist/68.b2...1b0.js
windows10-2004_x64
1dist/74.b2...1b0.js
windows7_x64
1dist/74.b2...1b0.js
windows10-2004_x64
1dist/97.b2...1b0.js
windows7_x64
1dist/97.b2...1b0.js
windows10-2004_x64
1dist/app.b...1b0.js
windows7_x64
1dist/app.b...1b0.js
windows10-2004_x64
1dist/defau...1b0.js
windows7_x64
1dist/defau...1b0.js
windows10-2004_x64
1dist/vendo...1b0.js
windows7_x64
1dist/vendo...1b0.js
windows10-2004_x64
1Analysis
-
max time kernel
106s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 17:37
Static task
static1
Behavioral task
behavioral1
Sample
cdn-cgi/apps/head/4iscdWRaXpzwz4RsvnwH5r2OfeE.html
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
cdn-cgi/apps/head/4iscdWRaXpzwz4RsvnwH5r2OfeE.html
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
datafeeds/udf/dist/bundle.js
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
datafeeds/udf/dist/bundle.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
datafeeds/udf/dist/polyfills.js
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
datafeeds/udf/dist/polyfills.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
dist/108.b2a854bdb02925f5e1b0.js
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
dist/108.b2a854bdb02925f5e1b0.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
dist/177.b2a854bdb02925f5e1b0.js
Resource
win7-20220414-en
Behavioral task
behavioral10
Sample
dist/177.b2a854bdb02925f5e1b0.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral11
Sample
dist/197.b2a854bdb02925f5e1b0.js
Resource
win7-20220414-en
Behavioral task
behavioral12
Sample
dist/197.b2a854bdb02925f5e1b0.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral13
Sample
dist/205.b2a854bdb02925f5e1b0.js
Resource
win7-20220414-en
Behavioral task
behavioral14
Sample
dist/205.b2a854bdb02925f5e1b0.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral15
Sample
dist/3.b2a854bdb02925f5e1b0.js
Resource
win7-20220414-en
Behavioral task
behavioral16
Sample
dist/3.b2a854bdb02925f5e1b0.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral17
Sample
dist/34.b2a854bdb02925f5e1b0.js
Resource
win7-20220414-en
Behavioral task
behavioral18
Sample
dist/34.b2a854bdb02925f5e1b0.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral19
Sample
dist/41.b2a854bdb02925f5e1b0.js
Resource
win7-20220414-en
Behavioral task
behavioral20
Sample
dist/41.b2a854bdb02925f5e1b0.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral21
Sample
dist/68.b2a854bdb02925f5e1b0.js
Resource
win7-20220414-en
Behavioral task
behavioral22
Sample
dist/68.b2a854bdb02925f5e1b0.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral23
Sample
dist/74.b2a854bdb02925f5e1b0.js
Resource
win7-20220414-en
Behavioral task
behavioral24
Sample
dist/74.b2a854bdb02925f5e1b0.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral25
Sample
dist/97.b2a854bdb02925f5e1b0.js
Resource
win7-20220414-en
Behavioral task
behavioral26
Sample
dist/97.b2a854bdb02925f5e1b0.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral27
Sample
dist/app.b2a854bdb02925f5e1b0.js
Resource
win7-20220414-en
Behavioral task
behavioral28
Sample
dist/app.b2a854bdb02925f5e1b0.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral29
Sample
dist/default_app.b2a854bdb02925f5e1b0.js
Resource
win7-20220414-en
Behavioral task
behavioral30
Sample
dist/default_app.b2a854bdb02925f5e1b0.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral31
Sample
dist/vendors.b2a854bdb02925f5e1b0.js
Resource
win7-20220414-en
Behavioral task
behavioral32
Sample
dist/vendors.b2a854bdb02925f5e1b0.js
Resource
win10v2004-20220414-en
General
-
Target
cdn-cgi/apps/head/4iscdWRaXpzwz4RsvnwH5r2OfeE.html
-
Size
315B
-
MD5
a34ac19f4afae63adc5d2f7bc970c07f
-
SHA1
a82190fc530c265aa40a045c21770d967f4767b8
-
SHA256
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
-
SHA512
42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000358f16e0538341458b70f68dad1eafd4000000000200000000001066000000010000200000001c935dba211d4549c622990f1bdd2affeb8c65d5dc6bcfd7f1db69a6a28650c9000000000e80000000020000200000002cf89aba74cd2de88677adbce569824c252c5aff517b54f9f95445bf95f300db200000003df9c428f003a86913c7bd64bafd16d76a22ea07b20af7d4de8efac62736a6f740000000f7f5f85bae3aa0f301f9c02290f6ab609ce1bc0469ddbfcb24332c971ec0457cdaa816ea59c69ddb93c9411dac504512a968a7fc009d0bb0e362671264b5874c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90e51a3d4a6dd801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "359926811" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{67220D01-D93D-11EC-939C-6AE7990DC39D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000358f16e0538341458b70f68dad1eafd40000000002000000000010660000000100002000000076394161c19783f3a7eb2f221021180b08b9f9724bf926d20de33996bc61406e000000000e8000000002000020000000d49049cc7ad5483d141d4604e6faaa5866ab31eb38c4b061384d3e3f1ed369c6900000009f0f324aaaf9e72d18c17be81bdd960638ae9dfc03bb85192623740a92cb6b46cbfbcddca85fe591ed7e3473c6279d23be04f4f50870d00fd1b4c1c0c9e1a2f8c5ab68267d7a5143bad28805980c0ce0ea4eac071ddadd557a2cfac5735d1e9fe8fbd024a7170a4fbd7c86d987c197de75e00840fd918b1566595ec7bc0005e49eefcf18ed53df63866ec866a3002d6a4000000090de5dc87ef467fc0425a7b00d852f1cbe566a3057f781e4c1f111c40ef41d47c392cc65e5c4b9ded89c855f77b9ca3c651af33d2e8200a97b5367b5e526b11a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1228 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1228 iexplore.exe 1228 iexplore.exe 908 IEXPLORE.EXE 908 IEXPLORE.EXE 908 IEXPLORE.EXE 908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1228 wrote to memory of 908 1228 iexplore.exe 29 PID 1228 wrote to memory of 908 1228 iexplore.exe 29 PID 1228 wrote to memory of 908 1228 iexplore.exe 29 PID 1228 wrote to memory of 908 1228 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cdn-cgi\apps\head\4iscdWRaXpzwz4RsvnwH5r2OfeE.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1228 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:908
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD548f0887f345431f13c46fce4a303e76a
SHA16e96a25d9b01b0b299e0d6e3af151f7874de7b76
SHA256e2a7e3db0d6d2a6d9c4223e44e8b5815ebad3a363ad7330c3dfa83af8e06a557
SHA51273c6f30d278c73e0ad1ad0c8383ee38f9ca98f52071485f38fd770d7c0141541561db3c73e20d43823276d59e8d348588ccb46956549c60ee4277ea690bc0a51