Analysis
-
max time kernel
137s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
31-08-2022 06:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://212.83.163.95:7777
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
http://212.83.163.95:7777
Resource
win10v2004-20220812-en
General
-
Target
http://212.83.163.95:7777
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
c.exesysdvx.exepid process 1032 c.exe 1880 sysdvx.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 803ce5bf15bdd801 iexplore.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "368700359" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062e6ef0d45f4454ab79548c962d74cdf000000000200000000001066000000010000200000009237386c94e6f8f33d0fa75bbf3f0e355d13245782c57095a6e4195ccb8d9a8a000000000e800000000200002000000055e309ed4e1c46fbecd9d5ec9c364976193cb8ec4a438cf22daff9c4994e1185200000007749d2138349b165b8af8892244479e8f91a5f4b6f194292cca645411a633b5340000000af366f464033c55c6decd205f39f704a6f3b366e7fccd44eb93aa189a36d2e711dabf1b3a14a11152fc8c80b47516b5e17c4b73b780154dbf7041b8f88a6f871 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60bce6c715bdd801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ECD172E1-2908-11ED-B4BC-4A12BD72B3C7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
iexplore.exepid process 1628 iexplore.exe 1628 iexplore.exe 1628 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1628 iexplore.exe 1628 iexplore.exe 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
iexplore.exedescription pid process target process PID 1628 wrote to memory of 1740 1628 iexplore.exe IEXPLORE.EXE PID 1628 wrote to memory of 1740 1628 iexplore.exe IEXPLORE.EXE PID 1628 wrote to memory of 1740 1628 iexplore.exe IEXPLORE.EXE PID 1628 wrote to memory of 1740 1628 iexplore.exe IEXPLORE.EXE PID 1628 wrote to memory of 1032 1628 iexplore.exe c.exe PID 1628 wrote to memory of 1032 1628 iexplore.exe c.exe PID 1628 wrote to memory of 1032 1628 iexplore.exe c.exe PID 1628 wrote to memory of 1032 1628 iexplore.exe c.exe PID 1628 wrote to memory of 1880 1628 iexplore.exe sysdvx.exe PID 1628 wrote to memory of 1880 1628 iexplore.exe sysdvx.exe PID 1628 wrote to memory of 1880 1628 iexplore.exe sysdvx.exe PID 1628 wrote to memory of 1880 1628 iexplore.exe sysdvx.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://212.83.163.95:77771⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1740 -
C:\Users\Admin\Downloads\c.exe"C:\Users\Admin\Downloads\c.exe"2⤵
- Executes dropped EXE
PID:1032 -
C:\Users\Admin\Downloads\sysdvx.exe"C:\Users\Admin\Downloads\sysdvx.exe"2⤵
- Executes dropped EXE
PID:1880
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD52d7764b1bdf6d8cb250bd4a9cd6f4ec0
SHA1fba7c2a08d2caf7005b051a3cc557a683591fdaf
SHA256bdf7a01cab60560191fab1005a1df16c589ea754356a549c09140e8be9e9d9e4
SHA512ee5f81e33da7f42ad8d5b776db664dc949f1b5a5254a91cb55b78770891703b8bfba134fb38ab8ba5f04fb55d08d6f8331b668850300f218b0eb3ea53e7593a1
-
Filesize
72KB
MD5148e93aa23ccd06a56e308743d3e46fa
SHA1565b7e2935c11ac1780d4b0a2afd0b15f62d7ffd
SHA2569f45d0617825b8b60672eb57351a73ae09f1e9d0a966bc82d95a82bd4a3c2dfd
SHA5127a9129c43a559734e6948b33add728ae262d1b4b22bc1cfce104560e338fdecac83b394b3c118e32247f338d6dee80fa0ef37a4176dc31667745157e309a1354
-
Filesize
72KB
MD5148e93aa23ccd06a56e308743d3e46fa
SHA1565b7e2935c11ac1780d4b0a2afd0b15f62d7ffd
SHA2569f45d0617825b8b60672eb57351a73ae09f1e9d0a966bc82d95a82bd4a3c2dfd
SHA5127a9129c43a559734e6948b33add728ae262d1b4b22bc1cfce104560e338fdecac83b394b3c118e32247f338d6dee80fa0ef37a4176dc31667745157e309a1354
-
Filesize
573KB
MD50554bb64f82b5627c462e93bc429ff4d
SHA1653de64978dcca54d5ee89a9662390fdc14e91f7
SHA256eb580a26823d80a1777d9f9f10ca3e13b74c676c0f867835ad39d137c01027f1
SHA5121af7c18fb8bc52cc83fa17a3b1d2102739a78e931ea0035624aa78b5a7cb913cc41b5de76c6410e4440ded842bd7bd953966ce880dc5335ca23b1a91d1014201
-
Filesize
573KB
MD50554bb64f82b5627c462e93bc429ff4d
SHA1653de64978dcca54d5ee89a9662390fdc14e91f7
SHA256eb580a26823d80a1777d9f9f10ca3e13b74c676c0f867835ad39d137c01027f1
SHA5121af7c18fb8bc52cc83fa17a3b1d2102739a78e931ea0035624aa78b5a7cb913cc41b5de76c6410e4440ded842bd7bd953966ce880dc5335ca23b1a91d1014201