Analysis
-
max time kernel
66s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06-10-2022 11:36
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://associationdatabase.com/aws/OHLA/ctrb/195138/40737/2845726?c=https://ipfs.io/ipfs/QmdJLQ1h9NKYSgtTaitytXvYUNTtQwNhpgjCQGf4eo635B?filename=xzy.html#b2ZmaWNlQGJiaC5zaw==
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
https://associationdatabase.com/aws/OHLA/ctrb/195138/40737/2845726?c=https://ipfs.io/ipfs/QmdJLQ1h9NKYSgtTaitytXvYUNTtQwNhpgjCQGf4eo635B?filename=xzy.html#b2ZmaWNlQGJiaC5zaw==
Resource
win10v2004-20220812-en
General
-
Target
https://associationdatabase.com/aws/OHLA/ctrb/195138/40737/2845726?c=https://ipfs.io/ipfs/QmdJLQ1h9NKYSgtTaitytXvYUNTtQwNhpgjCQGf4eo635B?filename=xzy.html#b2ZmaWNlQGJiaC5zaw==
Malware Config
Signatures
-
Detected phishing page
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0145cff77d9d801 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{21733911-456B-11ED-9D78-7225AF48583A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a00000000020000000000106600000001000020000000f57ba4ed72757312e7e2fbe03e86ba9dd8936ed6d307772b839c5d69efb19196000000000e800000000200002000000008264180559ee97bbba40c6755875209e8ea40caa82a715f61e4f198d65df436200000001baa2867f88b44cfeb2d439dad9628d94358c5a15a73cc5da873bf8802c047c9400000000af0bb17d10006733fe68f81d8dafc2907f8c7fd01a3812841caafa69ebd81bcda61c6cad9af722d27335f67dd0a79e381ff38c3869da7c406bfedee11c2a6f2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "371821169" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1204 iexplore.exe 1204 iexplore.exe 332 IEXPLORE.EXE 332 IEXPLORE.EXE 332 IEXPLORE.EXE 332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1204 wrote to memory of 332 1204 iexplore.exe 28 PID 1204 wrote to memory of 332 1204 iexplore.exe 28 PID 1204 wrote to memory of 332 1204 iexplore.exe 28 PID 1204 wrote to memory of 332 1204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://associationdatabase.com/aws/OHLA/ctrb/195138/40737/2845726?c=https://ipfs.io/ipfs/QmdJLQ1h9NKYSgtTaitytXvYUNTtQwNhpgjCQGf4eo635B?filename=xzy.html#b2ZmaWNlQGJiaC5zaw==1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:332
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5d15aaa7c9be910a9898260767e2490e1
SHA12090c53f8d9fc3fbdbafd3a1e4dc25520eb74388
SHA256f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e
SHA5127e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501b1af78751d91c2717052b6189e5150
SHA147f75860ac72bd192eaf4d072b0eae1ea9a5a7e0
SHA256ae104dbe2817222a855eb1a5f8cfca1cf3e3c9d1b69e20f7e7e2363fb74ed76e
SHA512cae11be81c106e5da714995889be2d28ee146766ff34218701bf397e691872123edf8a7dbb1e3f4e85a65575fe1108d56be5e0650c518e3b752de61d347ac904
-
Filesize
19KB
MD5a0f4c52c17eb828aac4cf039f8fcb107
SHA1b11fd94c6e614a5e76bad5f02b4353a81e92cd88
SHA256428cd91a511a83b524aa911b17ec0e166dd09db00604a1f81f3a8b4c043cf606
SHA5122144c6882e02b87464c938ea408cec57b4754c0848fb783a7259f614ca0834ff34ebbd6b6da774683065d2488ae8354fd3fed6bcecb628205752cbbfa0e919dd
-
Filesize
603B
MD59fca5a31b67caa1e5fd88483299ede6d
SHA16a83cc233548c7b3bfc3356a8f025405af82f12f
SHA2563e11ac36f15c731b70df7ac4995153af6d825d35b7db2f312662fc6e76ab0344
SHA512111953f1770d9f47ed90eddcbe732412cbc6446bf6535f048804278c0aab0d389e11672ee31755dc104fe3fe75b75455dc0f569470bc891478e897bace284dc5