Analysis
-
max time kernel
67s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/09/2022, 01:32
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://trk.klclick.com/ls/click?upn=IWyZF-2FXqRygaqjB7NsIFXgxr3C3FXrpS1sTiChGVbvWDRPEoGxeA-2B0AFOjGjGpEgZ3DmPCb5xmnhWOwFK9Y1rh7dNgmfvOEMAnN6p8uhJAx6WE8qk4K8-2FXu5SLrKDC-2FgYrj8-2FxY9kKvgI4WL4MK0ZTVhynnEZzKXglCWx-2Fw-2FXRItE025XAo7-2Bs4J8IZ9qRf3EBA-2BIzedaTKF-2BazABVHQhbTyJp-2FNMmbbVzqckIv49Sw-3Df1sM_cXFzJ7fWxEqUOkRXSXNw8dqdf9NThO25brxiFNzS0eRnW0Po8T7TrsFgzwkpEoj6aplhdHmch1JOyWUvXZ1lPN4i8UfArsrUm1uvfpUuAho7ckV4d9hk7N5nSt0AOmnBEB7ZeWeJPMdKyrnlEFkugFrVMreYULsNBg2EFTTBlsNhHm8Ibg4Xm0Z-2BnJLBMFrh8pDS-2BfFx3ob7H3pJfUVs2b0MdwikoKl5E0WVpvj6uSAzRybaj9ZN-2BnDW-2BHaDN-2Bmc51ZpI2EqR-2BQhNduWWb2nUfhlFnvsQUfKER-2BpzaNibDqctcFH-2BSIBYMKKMHqkGXXv7aaB95YgioQVQhxvVnnYBcdUbTCYIhqHl-2Ber35zaiEe90QXfs7EDTgOJG1mDkJt1JWTBLdGMOrgAcKxtlHRU3t-2Bu3WILE9jsuTV4x1vWxHY-3D#[email protected]
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
https://trk.klclick.com/ls/click?upn=IWyZF-2FXqRygaqjB7NsIFXgxr3C3FXrpS1sTiChGVbvWDRPEoGxeA-2B0AFOjGjGpEgZ3DmPCb5xmnhWOwFK9Y1rh7dNgmfvOEMAnN6p8uhJAx6WE8qk4K8-2FXu5SLrKDC-2FgYrj8-2FxY9kKvgI4WL4MK0ZTVhynnEZzKXglCWx-2Fw-2FXRItE025XAo7-2Bs4J8IZ9qRf3EBA-2BIzedaTKF-2BazABVHQhbTyJp-2FNMmbbVzqckIv49Sw-3Df1sM_cXFzJ7fWxEqUOkRXSXNw8dqdf9NThO25brxiFNzS0eRnW0Po8T7TrsFgzwkpEoj6aplhdHmch1JOyWUvXZ1lPN4i8UfArsrUm1uvfpUuAho7ckV4d9hk7N5nSt0AOmnBEB7ZeWeJPMdKyrnlEFkugFrVMreYULsNBg2EFTTBlsNhHm8Ibg4Xm0Z-2BnJLBMFrh8pDS-2BfFx3ob7H3pJfUVs2b0MdwikoKl5E0WVpvj6uSAzRybaj9ZN-2BnDW-2BHaDN-2Bmc51ZpI2EqR-2BQhNduWWb2nUfhlFnvsQUfKER-2BpzaNibDqctcFH-2BSIBYMKKMHqkGXXv7aaB95YgioQVQhxvVnnYBcdUbTCYIhqHl-2Ber35zaiEe90QXfs7EDTgOJG1mDkJt1JWTBLdGMOrgAcKxtlHRU3t-2Bu3WILE9jsuTV4x1vWxHY-3D#[email protected]
Resource
win10v2004-20220812-en
General
-
Target
https://trk.klclick.com/ls/click?upn=IWyZF-2FXqRygaqjB7NsIFXgxr3C3FXrpS1sTiChGVbvWDRPEoGxeA-2B0AFOjGjGpEgZ3DmPCb5xmnhWOwFK9Y1rh7dNgmfvOEMAnN6p8uhJAx6WE8qk4K8-2FXu5SLrKDC-2FgYrj8-2FxY9kKvgI4WL4MK0ZTVhynnEZzKXglCWx-2Fw-2FXRItE025XAo7-2Bs4J8IZ9qRf3EBA-2BIzedaTKF-2BazABVHQhbTyJp-2FNMmbbVzqckIv49Sw-3Df1sM_cXFzJ7fWxEqUOkRXSXNw8dqdf9NThO25brxiFNzS0eRnW0Po8T7TrsFgzwkpEoj6aplhdHmch1JOyWUvXZ1lPN4i8UfArsrUm1uvfpUuAho7ckV4d9hk7N5nSt0AOmnBEB7ZeWeJPMdKyrnlEFkugFrVMreYULsNBg2EFTTBlsNhHm8Ibg4Xm0Z-2BnJLBMFrh8pDS-2BfFx3ob7H3pJfUVs2b0MdwikoKl5E0WVpvj6uSAzRybaj9ZN-2BnDW-2BHaDN-2Bmc51ZpI2EqR-2BQhNduWWb2nUfhlFnvsQUfKER-2BpzaNibDqctcFH-2BSIBYMKKMHqkGXXv7aaB95YgioQVQhxvVnnYBcdUbTCYIhqHl-2Ber35zaiEe90QXfs7EDTgOJG1mDkJt1JWTBLdGMOrgAcKxtlHRU3t-2Bu3WILE9jsuTV4x1vWxHY-3D#[email protected]
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "371014555" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{15312111-3E15-11ED-A964-EAF6071D98F9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3b98f5693c0d24b85f349229339c59c00000000020000000000106600000001000020000000665e6903f359a1e133424b13390b6d2c384b04fac0c62c4fdff932244e29259f000000000e8000000002000020000000f3eaff651eb2c66a78db5a38b4272082c736b257869bbab0b5413df0eae838f590000000a7c4eda650da89c3e3a170b5bfcc258b9dac7aa924294a90928c21d01190998a82ff3c2d4ed9c0cd4022922cbfde76e8f70737633cb44131a879bd2b0aaac0a114e6e1a4a707e56ba0e14708963560a95cda1bb90c74a2c02338b3ce0f5122c8693cf68bbda3b7d7b576161a298a57ada217ede2cfaf7773caf4a79cc702c80bf5059ebd4abda699325e92f7861cd583400000002f28c544431647d2dd5c255e003b6d92a1ca2a7d2dff11690625c072a039b6debf2e68b493af62a80fb2ae0255cc79685c56370b944692f7f1d4ae23b05969a1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3b98f5693c0d24b85f349229339c59c00000000020000000000106600000001000020000000e683b86081f869c4605a64fe3fac7d7132eac3b9749704cbb052dc1b3ea525a4000000000e8000000002000020000000b666c240e735fbb27fd32a912ad8c901ee582f1f2d72f1a516423f3da31e272d2000000049df8497cd121378fb31644379be6d93cf0165aa73f18f65ed867df3b0a20eac400000004007bf7e79fe660941b27011b5d29250e2fc36aa543b77029b6824c2624a44ed3b6e3476fe977cf89f25e3c466199155f3a678020d75c9edd333f738eb7d9245 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c4a8f221d2d801 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1904 iexplore.exe 1904 iexplore.exe 952 IEXPLORE.EXE 952 IEXPLORE.EXE 952 IEXPLORE.EXE 952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1904 wrote to memory of 952 1904 iexplore.exe 27 PID 1904 wrote to memory of 952 1904 iexplore.exe 27 PID 1904 wrote to memory of 952 1904 iexplore.exe 27 PID 1904 wrote to memory of 952 1904 iexplore.exe 27
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://trk.klclick.com/ls/click?upn=IWyZF-2FXqRygaqjB7NsIFXgxr3C3FXrpS1sTiChGVbvWDRPEoGxeA-2B0AFOjGjGpEgZ3DmPCb5xmnhWOwFK9Y1rh7dNgmfvOEMAnN6p8uhJAx6WE8qk4K8-2FXu5SLrKDC-2FgYrj8-2FxY9kKvgI4WL4MK0ZTVhynnEZzKXglCWx-2Fw-2FXRItE025XAo7-2Bs4J8IZ9qRf3EBA-2BIzedaTKF-2BazABVHQhbTyJp-2FNMmbbVzqckIv49Sw-3Df1sM_cXFzJ7fWxEqUOkRXSXNw8dqdf9NThO25brxiFNzS0eRnW0Po8T7TrsFgzwkpEoj6aplhdHmch1JOyWUvXZ1lPN4i8UfArsrUm1uvfpUuAho7ckV4d9hk7N5nSt0AOmnBEB7ZeWeJPMdKyrnlEFkugFrVMreYULsNBg2EFTTBlsNhHm8Ibg4Xm0Z-2BnJLBMFrh8pDS-2BfFx3ob7H3pJfUVs2b0MdwikoKl5E0WVpvj6uSAzRybaj9ZN-2BnDW-2BHaDN-2Bmc51ZpI2EqR-2BQhNduWWb2nUfhlFnvsQUfKER-2BpzaNibDqctcFH-2BSIBYMKKMHqkGXXv7aaB95YgioQVQhxvVnnYBcdUbTCYIhqHl-2Ber35zaiEe90QXfs7EDTgOJG1mDkJt1JWTBLdGMOrgAcKxtlHRU3t-2Bu3WILE9jsuTV4x1vWxHY-3D#[email protected]1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:952
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD56c6a24456559f305308cb1fb6c5486b3
SHA13273ac27d78572f16c3316732b9756ebc22cb6ed
SHA256efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973
SHA512587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a780fcd5304f3045b269af202e9fb621
SHA15617bd7e25e83a5996da63c4335c3a1ad856daf0
SHA25664e696156e282a0f81f09fd30e712c7ff50f3bf81284f64e0f1a5843942c38c7
SHA51224a7865eacfb99dddd9ee4e7106c9a50851eb5c8646ff5fc65c7a0691511a43326798fee7a61b09a930af23722180535721c0a4216fa4d7a015c28e9f3ad3a1f
-
Filesize
606B
MD54c8134efb4937069a59d99543ea4e5a0
SHA1f01f25ded6433bacc6803fca013857b2f2f4c3c5
SHA256169c7b0cf5ca985fd0f69f216b4c837f1647f58d8e28079c1a215e3665ba6660
SHA512bfd10d09446e8c716f119de80904c144244338f16cd9eb25b9f18f326f3d69a674e2d2f25ac9922d552b5b97d9fdbd9d041bec1595a889dbcb74e252eedd2eb1