Overview
overview
1Static
static
mypepsico....s.html
windows7_x64
1mypepsico....s.html
windows10-2004_x64
1mypepsico....min.js
windows7_x64
1mypepsico....min.js
windows10-2004_x64
1mypepsico....min.js
windows7_x64
1mypepsico....min.js
windows10-2004_x64
1mypepsico....kie.js
windows7_x64
1mypepsico....kie.js
windows10-2004_x64
1mypepsico....min.js
windows7_x64
1mypepsico....min.js
windows10-2004_x64
1mypepsico....min.js
windows7_x64
1mypepsico....min.js
windows10-2004_x64
1mypepsico....x.html
windows7_x64
1mypepsico....x.html
windows10-2004_x64
1Analysis
-
max time kernel
102s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
09-06-2022 00:57
Static task
static1
Behavioral task
behavioral1
Sample
mypepsico.com/SSO Login Services.html
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
mypepsico.com/SSO Login Services.html
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
mypepsico.com/SSO Login Services_files/bootstrap.min.js
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
mypepsico.com/SSO Login Services_files/bootstrap.min.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
mypepsico.com/SSO Login Services_files/jquery.min.js
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
mypepsico.com/SSO Login Services_files/jquery.min.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
mypepsico.com/SSO Login Services_files/js.cookie.js
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
mypepsico.com/SSO Login Services_files/js.cookie.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
mypepsico.com/SSO Login Services_files/mdb.min.js
Resource
win7-20220414-en
Behavioral task
behavioral10
Sample
mypepsico.com/SSO Login Services_files/mdb.min.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral11
Sample
mypepsico.com/SSO Login Services_files/popper.min.js
Resource
win7-20220414-en
Behavioral task
behavioral12
Sample
mypepsico.com/SSO Login Services_files/popper.min.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral13
Sample
mypepsico.com/index.html
Resource
win7-20220414-en
Behavioral task
behavioral14
Sample
mypepsico.com/index.html
Resource
win10v2004-20220414-en
General
-
Target
mypepsico.com/SSO Login Services.html
-
Size
19KB
-
MD5
3e60ad01a435dcde22a00e86453dfc6d
-
SHA1
5d9b1bae68f38e6f45e8a2c7365d3567831235fc
-
SHA256
8015b6f0f6d4d25b042d7789f6bb6a24819c1e6b662a3d1a67e3c0c289694e9b
-
SHA512
c88e7bf10185089b9eabfee32ec2a9f648b69bae099c86e130fb5039b56576571f7295d31de1831dca860d5a5184eb5055798ba5798a6a60a6547b4fd9eee579
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 700f14cde97bd801 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "361534640" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ED49A251-E7DC-11EC-9674-D2F97027F5CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000962422cf799f2f46a7e75b376cef3c3c000000000200000000001066000000010000200000005964a4b43450f67ef405474f118b1c30fcaf832df5ec4898909a7faca32f4e5c000000000e80000000020000200000006d180995682a21162a050e269cb8feb1247168abfc27629284093d06e77e2da020000000959e161a9dc4a83f25b1b05209cf58564fb46287f5540b1fbdb3987eca0fe93e40000000ebc6168d23e2cc770dcbd97388f649badd66b2e33f7fbfc73f882139d683c88ec4cf38141c3543dc2e1035dab9117d6747081b829bea74c8248e8467fbcb5966 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2016 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 756 iexplore.exe 756 iexplore.exe 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 756 wrote to memory of 2016 756 iexplore.exe 28 PID 756 wrote to memory of 2016 756 iexplore.exe 28 PID 756 wrote to memory of 2016 756 iexplore.exe 28 PID 756 wrote to memory of 2016 756 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\mypepsico.com\SSO Login Services.html"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:756 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2016
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD5685772c667bfda99eac170bebfaec721
SHA165ed439026f871b8f47a74e9f1f55b567df1e135
SHA256ad52f7c29aca4d4aa93632c3312b945899f9b3bd96ce870dfa610bb88868e021
SHA512186dd17de3d081a0044a56b2604e894f0a146451b400ac8ed9c6bf4ed5dac5b0381a9f9c00de3b06faa3b5deeb0b44cef721fa4fae9fbd6a9bee4f678813aeb4