Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
23-05-2022 08:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://email.helmsman-properties.com/e/984471/ail-paths-one-link-Fax-Outlook/8brbr/107207830/pahr.johansson%40axactor.se?h=TlbyXCa91JBzWVQfQ7l-AvGJFbw9nbkEgvA_HVemZos
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
https://email.helmsman-properties.com/e/984471/ail-paths-one-link-Fax-Outlook/8brbr/107207830/pahr.johansson%40axactor.se?h=TlbyXCa91JBzWVQfQ7l-AvGJFbw9nbkEgvA_HVemZos
Resource
win10v2004-20220414-en
General
-
Target
https://email.helmsman-properties.com/e/984471/ail-paths-one-link-Fax-Outlook/8brbr/107207830/pahr.johansson%40axactor.se?h=TlbyXCa91JBzWVQfQ7l-AvGJFbw9nbkEgvA_HVemZos
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "64" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "260" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage\pahr-johansson.blastinginsight.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "25" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage\blastinginsight.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "260" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage\blastinginsight.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "64" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "64" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 509749f48c6ed801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14A094E1-DA80-11EC-8E78-5AC3572C4626} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "260" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "25" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage\pahr-johansson.blastinginsight.com\ = "103" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "25" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "128" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000962422cf799f2f46a7e75b376cef3c3c00000000020000000000106600000001000020000000f353801181caafa0d544484ba9f9143a68bcc929f5431f3e7e96ef5b55f553b6000000000e8000000002000020000000ebc984cfee6872afd6ff07c30dda43919071ec73df3bf724ae20063dc5f5a0b1200000003bb3a1b3b829074252cc372a6bdeb7e3096a76d87666bbf84a1c3549bd650ef040000000c209c02af223d527c3f76ac8e8c5fda8e8cc8430e98e162e9c016c7543daebdb17f17b6a9d925cc7559996f9a3e157065c96ef5b04872d11462aa2e6a07359c0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "360065394" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage\blastinginsight.com\Total = "103" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exemsdt.exepid process 1684 iexplore.exe 1876 msdt.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1684 iexplore.exe 1684 iexplore.exe 1452 IEXPLORE.EXE 1452 IEXPLORE.EXE 1452 IEXPLORE.EXE 1452 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
iexplore.exeIEXPLORE.EXEdescription pid process target process PID 1684 wrote to memory of 1452 1684 iexplore.exe IEXPLORE.EXE PID 1684 wrote to memory of 1452 1684 iexplore.exe IEXPLORE.EXE PID 1684 wrote to memory of 1452 1684 iexplore.exe IEXPLORE.EXE PID 1684 wrote to memory of 1452 1684 iexplore.exe IEXPLORE.EXE PID 1452 wrote to memory of 1876 1452 IEXPLORE.EXE msdt.exe PID 1452 wrote to memory of 1876 1452 IEXPLORE.EXE msdt.exe PID 1452 wrote to memory of 1876 1452 IEXPLORE.EXE msdt.exe PID 1452 wrote to memory of 1876 1452 IEXPLORE.EXE msdt.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://email.helmsman-properties.com/e/984471/ail-paths-one-link-Fax-Outlook/8brbr/107207830/pahr.johansson%40axactor.se?h=TlbyXCa91JBzWVQfQ7l-AvGJFbw9nbkEgvA_HVemZos1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1684 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\msdt.exe-modal 393552 -skip TRUE -path C:\Windows\diagnostics\system\networking -af C:\Users\Admin\AppData\Local\Temp\NDFC5DE.tmp -ep NetworkDiagnosticsWeb3⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\sdiagnhost.exeC:\Windows\SysWOW64\sdiagnhost.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63Filesize
1KB
MD5d69e0688754ca34b5cb349fe5f221157
SHA1ab341a7d908731585f981f9faea787778c60dbee
SHA256ce1a716d5582174251790c3e4f513b5759354cd2690f005bfac96390c30e24e8
SHA51215ba6681c549bef5ae03c9eda8e022bbee47056e186d010d30e6ee4eb7134f64427ec02ada6df4b329bd3f844761cbc8ec6a2baa63f0aefd2ac00a7eb6061260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
60KB
MD5b9f21d8db36e88831e5352bb82c438b3
SHA14a3c330954f9f65a2f5fd7e55800e46ce228a3e2
SHA256998e0209690a48ed33b79af30fc13851e3e3416bed97e3679b6030c10cab361e
SHA512d4a2ac7c14227fbaf8b532398fb69053f0a0d913273f6917027c8cadbba80113fdbec20c2a7eb31b7bb57c99f9fdeccf8576be5f39346d8b564fc72fb1699476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63Filesize
404B
MD519a86e39fcb11b0248b34edd4c581d60
SHA1398a62d9e6d33426d71cf56a74bbbf1c5287708f
SHA256876c8e60c2ae1ff893c3c7fba1087134ae7f2a1803f2da4c5cba0f9feca2bb43
SHA5120ad4c0d5f2add0304496d2d04512ff72536e7c58e2dc48f1aa9729d86b102e176dbfffcf789de4c7016361041edb48f40bdcb417158aaa1fac949c1931c9249a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59ecbae322ae3f8380f181a34d5454789
SHA142c51158af28bd6ddb8e8d854dcf70318c09eea6
SHA2569d7d6ea8db0dc3ac1c04f23939cb23cae5f53350f16a4cee1bc97aecf11bafe8
SHA5128bc51fddcddb91f303c3ea9bbc71237e2d030574fa05b9f25830d82888361ed546dfe86692d79c93b2e1b3e2bf4ee55d569b59c033eaa3a0b6839185257cfcce
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1b4wh1e\imagestore.datFilesize
22KB
MD57c73e471a4e6730d200237e9cb61f17a
SHA1597cabaae704eb17f378f597cc2a2c3ba2b30ba1
SHA256fc85399d3a6f785412e0e98f29256edbfc8b90662fc87d413f99b7e9842ff7e8
SHA512e66e7e2c8957198ed0fbf36abcf1a7d6e9fa81e9fd4fc1fe9d177cb17c0c02ebfa09b78b045cea4e87400b8e0f0a83e7a78902486df447c6cec0ebd194ef5fbb
-
C:\Users\Admin\AppData\Local\Temp\NDFC5DE.tmpFilesize
3KB
MD55761c4fb32cc8d1058d379c6f16c09c1
SHA149ee1513feeb4287e3e3100b77e8428e843eacc2
SHA256a928fb26703cc444233e27065d8f6e462c9bc0062a95e0331981ffc214cd4603
SHA51240b9caa5ed543ffe84779f36a7345ac70d32d39d97208b36bcc807322a18b882d9114957181ae682452a59470426e0d6c4cb227e42e0853154591feeab513932
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\JF3NM9VN.txtFilesize
608B
MD59440e0b11e9828c8116cedee0a99636a
SHA1745873093981a65bb2509920bcfd98b34719c1eb
SHA256d949025a3dd051aec8b527a580a1a3d7a68d4212a3f006a694c33997662903ee
SHA5128f4986e370a4f807b07da68bdb2a3aa5915acd1fee8efde035ed5fc472109792f4fa7f48acff636ba00d50f99bd05b8db137aefd08b852cc27e011a88e46cb36
-
C:\Windows\TEMP\SDIAG_a34dca3e-0804-439c-8bc0-eb7ee90c618f\NetworkDiagnosticsTroubleshoot.ps1Filesize
23KB
MD51d192ce36953dbb7dc7ee0d04c57ad8d
SHA17008e759cb47bf74a4ea4cd911de158ef00ace84
SHA256935a231924ae5d4a017b0c99d4a5f3904ef280cea4b3f727d365283e26e8a756
SHA512e864ac74e9425a6c7f1be2bbc87df9423408e16429cb61fa1de8875356226293aa07558b2fafdd5d0597254474204f5ba181f4e96c2bc754f1f414748f80a129
-
C:\Windows\TEMP\SDIAG_a34dca3e-0804-439c-8bc0-eb7ee90c618f\UtilityFunctions.ps1Filesize
52KB
MD52f7c3db0c268cf1cf506fe6e8aecb8a0
SHA1fb35af6b329d60b0ec92e24230eafc8e12b0a9f9
SHA256886a625f71e0c35e5722423ed3aa0f5bff8d120356578ab81a64de2ab73d47f3
SHA512322f2b1404a59ee86c492b58d56b8a6ed6ebc9b844a8c38b7bb0b0675234a3d5cfc9f1d08c38c218070e60ce949aa5322de7a2f87f952e8e653d0ca34ff0de45
-
C:\Windows\TEMP\SDIAG_a34dca3e-0804-439c-8bc0-eb7ee90c618f\UtilitySetConstants.ps1Filesize
2KB
MD50c75ae5e75c3e181d13768909c8240ba
SHA1288403fc4bedaacebccf4f74d3073f082ef70eb9
SHA256de5c231c645d3ae1e13694284997721509f5de64ee5c96c966cdfda9e294db3f
SHA5128fc944515f41a837c61a6c4e5181ca273607a89e48fbf86cf8eb8db837aed095aa04fc3043029c3b5cb3710d59abfd86f086ac198200f634bfb1a5dd0823406b
-
C:\Windows\TEMP\SDIAG_a34dca3e-0804-439c-8bc0-eb7ee90c618f\en-US\LocalizationData.psd1Filesize
5KB
MD5dc9be0fdf9a4e01693cfb7d8a0d49054
SHA174730fd9c9bd4537fd9a353fe4eafce9fcc105e6
SHA256944186cd57d6adc23a9c28fc271ed92dd56efd6f3bb7c9826f7208ea1a1db440
SHA51292ad96fa6b221882a481b36ff2b7114539eb65be46ee9e3139e45b72da80aac49174155483cba6254b10fff31f0119f07cbc529b1b69c45234c7bb61766aad66
-
memory/1656-65-0x000000006E480000-0x000000006EA2B000-memory.dmpFilesize
5.7MB
-
memory/1656-70-0x00000000026F0000-0x00000000026FF000-memory.dmpFilesize
60KB
-
memory/1876-60-0x0000000000000000-mapping.dmp
-
memory/1876-61-0x00000000756E1000-0x00000000756E3000-memory.dmpFilesize
8KB
-
memory/1876-63-0x000000006EB01000-0x000000006EB03000-memory.dmpFilesize
8KB