Analysis
-
max time kernel
103s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-10-2022 18:40
Static task
static1
Behavioral task
behavioral1
Sample
1.eml
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1.eml
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
email-plain-1.txt
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
email-plain-1.txt
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
xn27aqd2j7h2zeej8otsy9.html
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
xn27aqd2j7h2zeej8otsy9.html
Resource
win10v2004-20220812-en
General
-
Target
xn27aqd2j7h2zeej8otsy9.html
-
Size
6KB
-
MD5
892f2b957f83d2a99e2a846c7289aef7
-
SHA1
3f201fecff3db1adbb94c9a65eec3f281ef97ec7
-
SHA256
8e175b878d198ce1645aceed90e5f9842ca972fb8d6cba1cbb7804439bd87d2f
-
SHA512
93702c71bc9cccc3a4ef62ff2da632fa1556d4eee4ef113481af9e1cf8e2bec769e68f868a66c234996a7862491fadcb16ee9f96bab3aae850d035e75838120a
-
SSDEEP
96:VOTmfE40rEGt+IQWCxGWLVaFqvxKevEpCwDr68De5sJJaG4sJsWfqTudaTr:VO6crr4LNxXJaF/pC05fzJRfqay
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "371767460" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0f3d159765a7f43b6bf060b4b70c9a30000000002000000000010660000000100002000000013c130c5cae7e19a10ac80cfe9b901141260e93b3a055a02e2c573a98d887e81000000000e800000000200002000000039b1548059843e6ef93faaa2ed7f0d876692e684df8437193394d789d804dd7b20000000d58c4a6786c05b11786a22cc38568876e7cc321d6b61ca20d0a0476efb4f1e6a400000007214de6705014123c90b4d9bd10b8a14fd697419d49af814ad4151188c01000decc245adcc4ebba486eef53485fefb8169b238c90b6cf8b1bd074ee8886585f8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 800b49e6fad8d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{10769EE1-44EE-11ED-8F62-626C2AE6DC56} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 744 iexplore.exe 744 iexplore.exe 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 744 wrote to memory of 2032 744 iexplore.exe 29 PID 744 wrote to memory of 2032 744 iexplore.exe 29 PID 744 wrote to memory of 2032 744 iexplore.exe 29 PID 744 wrote to memory of 2032 744 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\xn27aqd2j7h2zeej8otsy9.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:744 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2032
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD52af84a4e1dd841ad60f75c968f452b29
SHA1de7ebff701ce1fefeb789d00fe645c67bd0776fc
SHA256019378876fc5f95dc1b73d3773793e3cfd064b0250be974a6b475f2599062a97
SHA512f206124abfb471a4e9fa324d8cb30859ec0f53bde80066fe0334e334dc3ca7f69341a4cc5a812f3485596fc171f1fe2c5e6fc4f35ec1883b19eb8140baf17314