Analysis
-
max time kernel
29s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
05-08-2022 15:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://view.email2.office.com/?qs=742b7d34dcccc2ad81a02a1c36b240bda4489cc5f542a350b73cc0825902b819e805115a28b99d7015dce419f772588ab148be72e5bf950a1288a007a2620efee873837b8104670bc4712e3919244161
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
https://view.email2.office.com/?qs=742b7d34dcccc2ad81a02a1c36b240bda4489cc5f542a350b73cc0825902b819e805115a28b99d7015dce419f772588ab148be72e5bf950a1288a007a2620efee873837b8104670bc4712e3919244161
Resource
win10v2004-20220721-en
General
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.microsoft.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\DOMStorage\microsoft.com\Total = "124" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9CBEDDD1-14D4-11ED-AA73-6EB64412F54B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "124" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\DOMStorage\microsoft.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\DOMStorage\microsoft.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.microsoft.com\ = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e528c10875d4b347a30c038b2e32007f00000000020000000000106600000001000020000000cfa9eb82f5cafe00e3fa3502196eba900ad212a0d368351baacf00d1f1990754000000000e8000000002000020000000e85c4c6f4905f6d2867a2fa232fb35c26d2a1ac8a8e783019a5cbfd8ee19fd722000000085360eecb3b7c5552ba07d8386fd698c821567222c9f4d25ac63bca44dc18933400000004fc92027b470fab7e24440306e646ae18407f02883a88c14adc2e7e2acdb6d392c60612692dd2bd7fc6f565ee751108faa97f4353e3691bb9c1884ee58380b2a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.microsoft.com\ = "124" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\DOMStorage\microsoft.com\Total = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 502bd469e1a8d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
AUDIODG.EXEIEXPLORE.EXEdescription pid process Token: 33 1220 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1220 AUDIODG.EXE Token: 33 1220 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1220 AUDIODG.EXE Token: 33 1964 IEXPLORE.EXE Token: SeIncBasePriorityPrivilege 1964 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 288 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 288 iexplore.exe 288 iexplore.exe 1496 IEXPLORE.EXE 1496 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
iexplore.exedescription pid process target process PID 288 wrote to memory of 1496 288 iexplore.exe IEXPLORE.EXE PID 288 wrote to memory of 1496 288 iexplore.exe IEXPLORE.EXE PID 288 wrote to memory of 1496 288 iexplore.exe IEXPLORE.EXE PID 288 wrote to memory of 1496 288 iexplore.exe IEXPLORE.EXE PID 288 wrote to memory of 1964 288 iexplore.exe IEXPLORE.EXE PID 288 wrote to memory of 1964 288 iexplore.exe IEXPLORE.EXE PID 288 wrote to memory of 1964 288 iexplore.exe IEXPLORE.EXE PID 288 wrote to memory of 1964 288 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://view.email2.office.com/?qs=742b7d34dcccc2ad81a02a1c36b240bda4489cc5f542a350b73cc0825902b819e805115a28b99d7015dce419f772588ab148be72e5bf950a1288a007a2620efee873837b8104670bc4712e39192441611⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:288 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:288 CREDAT:209933 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0xc81⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63Filesize
1KB
MD5607c58f70686ac2fd8494b158ed7e32a
SHA13457e533dfc0acb0fba69dfb49d132399524c68d
SHA256675c4adafca2f070cc3173f560577170045e240dbf596408b3a5de2b8ab132af
SHA512c33f4e767d8867b841090a6cc9147eb23e44c8e850c1ef0d29eb0fc711983545ec3279b52a4b22bb1c17ef320ac398764cab71f3950dd4f884b5fad8acad0c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8A07532D6AAE6A04052D31515DB38D1D_2C59668D30D7B0A18568171EC9A8EA21Filesize
1KB
MD5c7b8391e082198f29bb4240aeb65a4e7
SHA1f2d7e425ed7f5e74af8549cff56a786d5ee338b2
SHA2565fa0df3fd555994274820dba02603c0a59bc39dbe88f24b74c8bc0d830f6efc1
SHA512714e6370d00dfbd475093a23c162f2d9a811a510c55ff1cbca35f9042c0d2c936afd608fe094f79bb8d959c79879302b9c615974f503ca29e0cff920e41e1d16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63Filesize
404B
MD525dc4cfc883591a935571827554bab29
SHA1efdc85c0b874fab8ab3c422f3ab29c84186a67a5
SHA256ec01b58bc64e9381cc9016022b8a12c7f5632c4cb1c29799bf0c5968e83f3f2d
SHA512f50f3fa20efec449a41b7002b03e0bb5285fa5fd328e5b845d0c4f710393300c94453e272d6c1ddb7ea7f4714e2a1f82dd1e2017c965f3b2986df5199acc5789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8A07532D6AAE6A04052D31515DB38D1D_2C59668D30D7B0A18568171EC9A8EA21Filesize
494B
MD5dd1db910ece3eb8fc10183f345a7cfff
SHA1e42564877b67b32286092e24f6b71daed8745475
SHA25620d6d0a3b21003eb31b8f48003d026a29e03e95f99a07450943c712ed79575e6
SHA512f76e2b3e8619428a78c4354a2fd8c27ce229e29ef2d7db05c484f033ed4f89cb865933486f01154279f245bb0148779db5b6e64686c1e393f6c91d8935c0338a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
340B
MD57bde6ae0a148ff38ff10eec33e0efc3d
SHA1c0a7946b7d160faa54044771de83ef74bb7e306c
SHA25651f27265e564edf5f7fbd8f6de3505fa77890faf1ddf5704e2e5195a5d7ded62
SHA5123ddad00326e36f367891e3f20d365573327262108616e2cb02e315e2de05154bc3b0a9585a68d70bb3a7074c837457bef2e1e89e63ee741bbd3c91e0b3743028
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lvx0ibj\imagestore.datFilesize
21KB
MD509367c3746a12ad5a28297783ab3db13
SHA1c7b1f2307c09f9a0c5f496fbb834bd8228b62cab
SHA2561679be88e71bf324bd76f3500310bd54c07e9c4ca07513ed250ec9c3ea6410df
SHA512b04f716be6b56a6ca538b78b641558ba0d846a9c92b01de750c4c23de910c1e866a49bbe6de1bd165006e97fee7977c6bd6549e330ad1e3a1ce3b301d6a815c3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\8NY8F8A3.txtFilesize
509B
MD57261494e48f99cfe270403bf3621a56c
SHA12b45d1d5a78939c402948820e26b3eeb1add0205
SHA2565b7ad4429de2c71aa0bb4bade2cf35bdc282820b43c721f430419f7d93fc6a1c
SHA5122a0b902f4fc6e42a8a4afebf9344a265961229c0fa003ee5a898795517d75c846f91cde8ebfe59702b27ed6b421110ff1f9ec272185facada0fd78d5064a0e76