Resubmissions
29-09-2022 21:36
220929-1fwnkschgj 129-09-2022 21:29
220929-1b8scacad9 129-09-2022 21:26
220929-1agbpscad8 129-09-2022 21:09
220929-zzeczachdr 129-09-2022 21:08
220929-zyvzbschdp 129-09-2022 21:02
220929-zvwrfscab5 1Analysis
-
max time kernel
48s -
max time network
227s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-09-2022 21:36
Static task
static1
Behavioral task
behavioral1
Sample
Claim_Copy_4958_Sep_20.html
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Claim_Copy_4958_Sep_20.html
Resource
win10v2004-20220812-en
General
-
Target
Claim_Copy_4958_Sep_20.html
-
Size
744KB
-
MD5
ddf5dcbc26beb02424101daddcb156ea
-
SHA1
ae8a95ddd3e694b2fa182b37bb56f9fbe27c61e6
-
SHA256
2468e9a24b9683e210b96542adf891839cece4418d1aa45b7117576971659ac8
-
SHA512
20a20b48df3e7fb93ee71f582704ae733c00616742f7b03ce063049bae77168d046ce315be874b0a4197553b3bf358107e044ad37592cbbd515cc192b8c04794
-
SSDEEP
12288:z6hZWwP5NgzdjT+Wnt4mkZK8uWpD0humBbEAEevW:u35SzdjT+1RZK88gmBbE5ee
Malware Config
Signatures
-
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 00265a5b5cd4d801 iexplore.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0f3d159765a7f43b6bf060b4b70c9a30000000002000000000010660000000100002000000087f0fb6747dba0ec98da2d9905ec85504d437aca29547d32bf03eb59545ab247000000000e8000000002000020000000f10196e29cb9b86e70e3a822becab98fdc45fe735dd762e9b48326e1fdf9153420000000c5029f5081296dcad5b0dee1919f2c057d77785726d52d03f425459afd8126a7400000005af85b4b4edd160e6745aa7596c09f7aefa2d01174b627948c9fb1c7ce7f90b59edfc0bd957729298925d367c4f04c813d797c63e5a7bba4930d2538d635418e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{97FE4191-404F-11ED-9166-DA7E66F9F45D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 105f44735cd4d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1760 iexplore.exe 1760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1760 iexplore.exe 1760 iexplore.exe 1204 IEXPLORE.EXE 1204 IEXPLORE.EXE 1204 IEXPLORE.EXE 1204 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1204 1760 iexplore.exe 29 PID 1760 wrote to memory of 1204 1760 iexplore.exe 29 PID 1760 wrote to memory of 1204 1760 iexplore.exe 29 PID 1760 wrote to memory of 1204 1760 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Claim_Copy_4958_Sep_20.html1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1204
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GTUA22LQ\Claim_Copy_4958_Sep_202⤵PID:1800
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GTUA22LQ\Claim_Copy_4958_Sep_20"3⤵PID:1880
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -url "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GTUA22LQ\Claim_Copy_4958_Sep_20"4⤵PID:1312
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1312.0.1861858095\749011277" -parentBuildID 20200403170909 -prefsHandle 1192 -prefMapHandle 1184 -prefsLen 1 -prefMapSize 220106 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1312 "\\.\pipe\gecko-crash-server-pipe.1312" 1276 gpu5⤵PID:680
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1312.3.1332719129\1454328830" -childID 1 -isForBrowser -prefsHandle 1816 -prefMapHandle 1576 -prefsLen 156 -prefMapSize 220106 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1312 "\\.\pipe\gecko-crash-server-pipe.1312" 1836 tab5⤵PID:1796
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1312.13.59722501\399585373" -childID 2 -isForBrowser -prefsHandle 2780 -prefMapHandle 2756 -prefsLen 7643 -prefMapSize 220106 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1312 "\\.\pipe\gecko-crash-server-pipe.1312" 2792 tab5⤵PID:2116
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1312.20.2125936221\1932999215" -childID 3 -isForBrowser -prefsHandle 3456 -prefMapHandle 3340 -prefsLen 7643 -prefMapSize 220106 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1312 "\\.\pipe\gecko-crash-server-pipe.1312" 3468 tab5⤵PID:2308
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1312.21.2038103327\454680150" -childID 4 -isForBrowser -prefsHandle 3564 -prefMapHandle 3560 -prefsLen 7643 -prefMapSize 220106 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1312 "\\.\pipe\gecko-crash-server-pipe.1312" 3576 tab5⤵PID:2320
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD5071ab7cb0b93cc1e2bb12b714edbecbc
SHA1a541b71e4a5ce5f606415fd24bb7fcfb7bfbc400
SHA256e6df9a7e7bdad5bc1df9b13b2435bcf51246243cdf7e377f9820f65adbee3acd
SHA51274a1f9ac9e9e99edc5e5a2a7cc01b0c3edb74e0a79ace0931bcae600a0fa127435b46244dbd6a6b70bcfaab94bef023b6c236acbfb1c31674fab34c16e049e45
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GTUA22LQ\Claim_Copy_4958_Sep_20.fil3geg.partial
Filesize391KB
MD580b44ac80643c7ddf6b39563a72a6097
SHA17d35a374f44608ca7ad6d9215f1b7b8a3d6c4b00
SHA256f14da36feb9ebb27d63747326dcaccc114ba5fa4923d981675d4f400e679f0c1
SHA51221bfa8eb13194b1d2f0264951159a91b76975ac04a0f05aab513d6c3b31ae88c8a8673b12cdb431e2c571ad2705676d3975136b1c1dfacedccb6ae974615e9a9
-
Filesize
608B
MD59f19f45bf0bf583387b32b5f99e46bfa
SHA18e970dcaae283fa9c419de8a5996a99682f197bc
SHA25684584dc827f87f1547008febb3e1bc0aabe7acdfd9b0d5ea08f4590136957086
SHA51224b348dbb304cc735e77d14ef6e6483f344a4671fdae6c246ab7c4914e0d896e336643f23fbef0e4b5fe5d73b67f6499dd77c01236262f04a09fb1e9cecffb72