Overview
overview
10Static
static
nizanmfts_fr/??.exe
windows7_x64
5nizanmfts_fr/??.exe
windows10-2004_x64
5nizanmfts_fr/????.url
windows7_x64
6nizanmfts_fr/????.url
windows10-2004_x64
6nizanmfts_...??.url
windows7_x64
6nizanmfts_...??.url
windows10-2004_x64
6nizanmfts_fr/load.dll
windows7_x64
10nizanmfts_fr/load.dll
windows10-2004_x64
10Analysis
-
max time kernel
100s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
16-06-2022 08:02
Static task
static1
Behavioral task
behavioral1
Sample
nizanmfts_fr/??.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
nizanmfts_fr/??.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
nizanmfts_fr/????.url
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
nizanmfts_fr/????.url
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
nizanmfts_fr/??????.url
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
nizanmfts_fr/??????.url
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
nizanmfts_fr/load.dll
Resource
win7-20220414-en
General
-
Target
nizanmfts_fr/????.url
-
Size
121B
-
MD5
40c8f56ca7896f633de17a04ebc1fb0b
-
SHA1
5b06588186b9ea6a66f02d8a90936a4a07e49157
-
SHA256
d357c51a3179360536f30b389e45b3892ff3a2d23ff42db7dd2145004ce51bde
-
SHA512
83c821dda348104708a8fee97e4822b7af3ee546faf01745f992b3b7b981543a4042ac8bd3429b53ef733b7a00cc7923fc9c9f53f26c57d16f5fe2608216dcb9
Malware Config
Signatures
-
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C8D17B61-ED5D-11EC-990C-726C518001C0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004863fcdc101a3947b120786fa95ba35b000000000200000000001066000000010000200000005c6518632296afd29b7883c2361118775320601172b29a59b7668080de579470000000000e8000000002000020000000bd60e94ffcae966ad3acb5a1210dda41f3102865c97d350991ca5333ea72a76020000000a093eaab1423066b7202afb13262d69e45ce495d26aced01f0b1d61923555f3b40000000a83f9cc26c10f22fa6033492d8bbb5071874d68a7520e616c793eb03e4697a4edda0314dd9ee522e464fa76b742659e09f39c7f3d7003574362007ee317080f6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50c2f6a86a81d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "362139735" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1652 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1652 iexplore.exe 1652 iexplore.exe 988 IEXPLORE.EXE 988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1652 wrote to memory of 988 1652 iexplore.exe IEXPLORE.EXE PID 1652 wrote to memory of 988 1652 iexplore.exe IEXPLORE.EXE PID 1652 wrote to memory of 988 1652 iexplore.exe IEXPLORE.EXE PID 1652 wrote to memory of 988 1652 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\nizanmfts_fr\____.url1⤵
- Checks whether UAC is enabled
PID:1672
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1652 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:988
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
606B
MD58189a12f7963f0e7b6f7733245271c84
SHA1e1e3a6cdbda6431d27cdfae916c86048f4f46da6
SHA2564adb9509f58534c9e03276c23303646163ba436384f387f51bffd75c76733675
SHA5124d2329a621b10e0eb80c737d422095e49da9eebff662d7e928718ceaedf4f70cc35f12dd235d1fe75b04f7c5f370661b7fde86812ec10fd7cff69f937a599393