Overview
overview
7Static
static
7WhatsApp/A...me.xml
windows7-x64
1WhatsApp/A...me.xml
windows10-2004-x64
1WhatsApp/A...gs.xml
windows7-x64
1WhatsApp/A...gs.xml
windows10-2004-x64
1WhatsApp/A...ng.xml
windows7-x64
1WhatsApp/A...ng.xml
windows10-2004-x64
1WhatsApp/A...ot.xml
windows7-x64
1WhatsApp/A...ot.xml
windows10-2004-x64
1WhatsApp/A...ys.xml
windows7-x64
1WhatsApp/A...ys.xml
windows10-2004-x64
1WhatsApp/A...ve.xml
windows7-x64
1WhatsApp/A...ve.xml
windows10-2004-x64
1WhatsApp/A...al.xml
windows7-x64
1WhatsApp/A...al.xml
windows10-2004-x64
1WhatsApp/A...in.xml
windows7-x64
1WhatsApp/A...in.xml
windows10-2004-x64
1WhatsApp/A...ce.xml
windows7-x64
1WhatsApp/A...ce.xml
windows10-2004-x64
1WhatsApp/A...ms.xml
windows7-x64
1WhatsApp/A...ms.xml
windows10-2004-x64
1WhatsApp/A...at.xml
windows7-x64
1WhatsApp/A...at.xml
windows10-2004-x64
1WhatsApp/A...me.xml
windows7-x64
1WhatsApp/A...me.xml
windows10-2004-x64
1WhatsApp/A...er.xml
windows7-x64
1WhatsApp/A...er.xml
windows10-2004-x64
1WhatsApp/A...er.xml
windows7-x64
1WhatsApp/A...er.xml
windows10-2004-x64
1WhatsApp/A...gs.xml
windows7-x64
1WhatsApp/A...gs.xml
windows10-2004-x64
1WhatsApp/A...ay.xml
windows7-x64
1WhatsApp/A...ay.xml
windows10-2004-x64
1Analysis
-
max time kernel
126s -
max time network
181s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
22-09-2022 18:57
Behavioral task
behavioral1
Sample
WhatsApp/About/AppXRuntime.xml
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
WhatsApp/About/AppXRuntime.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
WhatsApp/About/AuditSettings.xml
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
WhatsApp/About/AuditSettings.xml
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
WhatsApp/About/EventForwarding.xml
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
WhatsApp/About/EventForwarding.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
WhatsApp/About/ExternalBoot.xml
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
WhatsApp/About/ExternalBoot.xml
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
WhatsApp/About/FileSys.xml
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
WhatsApp/About/FileSys.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
WhatsApp/About/SkyDrive.xml
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
WhatsApp/About/SkyDrive.xml
Resource
win10v2004-20220901-en
Behavioral task
behavioral13
Sample
WhatsApp/About/WinCal.xml
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
WhatsApp/About/WinCal.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
WhatsApp/About/WorkplaceJoin.xml
Resource
win7-20220901-en
Behavioral task
behavioral16
Sample
WhatsApp/About/WorkplaceJoin.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
WhatsApp/About/en-US/ActiveXInstallService.xml
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
WhatsApp/About/en-US/ActiveXInstallService.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
WhatsApp/About/en-US/AddRemovePrograms.xml
Resource
win7-20220901-en
Behavioral task
behavioral20
Sample
WhatsApp/About/en-US/AddRemovePrograms.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
WhatsApp/About/en-US/AppCompat.xml
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
WhatsApp/About/en-US/AppCompat.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
WhatsApp/About/en-US/AppXRuntime.xml
Resource
win7-20220901-en
Behavioral task
behavioral24
Sample
WhatsApp/About/en-US/AppXRuntime.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
WhatsApp/About/en-US/AppxPackageManager.xml
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
WhatsApp/About/en-US/AppxPackageManager.xml
Resource
win10v2004-20220901-en
Behavioral task
behavioral27
Sample
WhatsApp/About/en-US/AttachmentManager.xml
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
WhatsApp/About/en-US/AttachmentManager.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral29
Sample
WhatsApp/About/en-US/AuditSettings.xml
Resource
win7-20220812-en
Behavioral task
behavioral30
Sample
WhatsApp/About/en-US/AuditSettings.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
WhatsApp/About/en-US/AutoPlay.xml
Resource
win7-20220901-en
Behavioral task
behavioral32
Sample
WhatsApp/About/en-US/AutoPlay.xml
Resource
win10v2004-20220812-en
General
-
Target
WhatsApp/About/WorkplaceJoin.xml
-
Size
1KB
-
MD5
4a94b4f104af2c09215eb52d7f84f748
-
SHA1
5c414d468a0b571ca9fec00364dd4e2a185dbe92
-
SHA256
5fabf5c534f78ce92bf7daa6d4ade2dd61002e689a8246928209bf38d7bf1bee
-
SHA512
971a7f298fb6ece17bd9e02d636988960b4955ed8c6e44d271f4405e06268b65db6ce396caeeb41113ef2d220418c7c0bd48f3dc5852de76331eec0307516af4
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5079738cb5ced801 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "370638164" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B70A84B1-3AA8-11ED-A03D-460E09B1FADA} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a0000000002000000000010660000000100002000000010da5b631beab617eb6341c295480d54d38e2cca50a8bfae86a047cd40ca4ae1000000000e800000000200002000000058740e3a16b343bde3b85a2c326c6c5d159690968be867c8063e2f70afe67b6a20000000e5b3bad1f6efa64df5a9dc15d6a2c5609bc216812e60650ddd72eb06da84280a40000000d9271153e7ca5973221a6024255222f1cec4d9949d6dcc4aaba2d522ffc7c0edd4f64a79413e1489ca17400793c1ad56c557471359cbbd42bfc5c846e01584a2 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid process 464 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEpid process 464 IEXPLORE.EXE 464 IEXPLORE.EXE 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
MSOXMLED.EXEiexplore.exeIEXPLORE.EXEdescription pid process target process PID 1152 wrote to memory of 1488 1152 MSOXMLED.EXE iexplore.exe PID 1152 wrote to memory of 1488 1152 MSOXMLED.EXE iexplore.exe PID 1152 wrote to memory of 1488 1152 MSOXMLED.EXE iexplore.exe PID 1152 wrote to memory of 1488 1152 MSOXMLED.EXE iexplore.exe PID 1488 wrote to memory of 464 1488 iexplore.exe IEXPLORE.EXE PID 1488 wrote to memory of 464 1488 iexplore.exe IEXPLORE.EXE PID 1488 wrote to memory of 464 1488 iexplore.exe IEXPLORE.EXE PID 1488 wrote to memory of 464 1488 iexplore.exe IEXPLORE.EXE PID 464 wrote to memory of 1924 464 IEXPLORE.EXE IEXPLORE.EXE PID 464 wrote to memory of 1924 464 IEXPLORE.EXE IEXPLORE.EXE PID 464 wrote to memory of 1924 464 IEXPLORE.EXE IEXPLORE.EXE PID 464 wrote to memory of 1924 464 IEXPLORE.EXE IEXPLORE.EXE
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\WhatsApp\About\WorkplaceJoin.xml"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:464 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\D9EDRJVL.txtFilesize
608B
MD598bc818cb3eeda8383d0176d3312a89d
SHA1b4e19293f67cb3c6e3f4ebb92689b38ec2cefe28
SHA256a61c57c63e95b7de7a82fd574259a0c75700835e1631bd2ae4bc7a7aa4a638bd
SHA512d23eb03727e029230a29f30259cecd16a74258680855060fc54c764ed4caf81ef630f3449da07036bdc1fd6b236af9ca52d06c8c3b4883e5ee0a46d14ae18132
-
memory/1152-54-0x0000000076BA1000-0x0000000076BA3000-memory.dmpFilesize
8KB