Analysis
-
max time kernel
104s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 22:51
Static task
static1
Behavioral task
behavioral1
Sample
40cc6b2c1150b2e9f24c5afaebcb98f97f2793f6e1c3c025e8766bb3cb31bc35.html
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
40cc6b2c1150b2e9f24c5afaebcb98f97f2793f6e1c3c025e8766bb3cb31bc35.html
Resource
win10v2004-20220901-en
General
-
Target
40cc6b2c1150b2e9f24c5afaebcb98f97f2793f6e1c3c025e8766bb3cb31bc35.html
-
Size
9KB
-
MD5
85a4100c21bbd90356e686e066d4a990
-
SHA1
a4760b7820c1eac077bda84cc29b97d79afd5ef9
-
SHA256
40cc6b2c1150b2e9f24c5afaebcb98f97f2793f6e1c3c025e8766bb3cb31bc35
-
SHA512
3c76b40ef6c6f8616ccf82449ef00f8ecf381478e93133c2443a770951b6c054ee479d880dd8843839aef7bbae646226ef24b0e641d610de4d7514b5f8858c12
-
SSDEEP
192:Kw2KGoribWZFC9CLnd5NM7JL9w1tutJdAmiEVn3Zli1syGZ:URbUFC9C7idRFDiQnh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1204 VjpwbG.exe -
Loads dropped DLL 2 IoCs
pid Process 316 IEXPLORE.EXE 316 IEXPLORE.EXE -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new jsc.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new jsc.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a00000000020000000000106600000001000020000000213f072707669f4318570765d4ffe0fc247b2d14e39a0debd89062392d56072c000000000e8000000002000020000000f3eca963fdd15bca9639ae1c7607706b46bbdcef1559b1087e8e8bc008b7269190000000c0da2888db57bd7aa2356883ca87b4974e81ef63a5502082feb04306362c0004d30dc95009d0ba0a28c0d6e2eabc5778f7d735254c8da825e3fe1fea2ba85477716ad75975632fd4168017361c3314dcf624571c26b2bea93d300ddcec52019882a32c5f46452926e97f53a8abd7d9b16ffc5cc5e70c508b81cd0ace3e4a087f49f9374005552f0654fbcaec31a301ce4000000030bb18f70965b72bbee8e6cc947aedb6257f5ce5f2c5491878e0de1d590e3062b93d6f01474104bb1d26d8cc7ee29e2e71f7ba06b806b6a59780c647d2899fb7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "372984866" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8EE7A041-5000-11ED-B2F2-7E6ADD856DC1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a00000000020000000000106600000001000020000000fdb0ef28c931115ae00f17aceab7cc99cb3377bf4d6b89139870fa45dd6d8719000000000e800000000200002000000033481a4af7b79bbcb9ad2a4bcea76c59a1bfbe5f0f50a426dfc2f12a64ba6cef200000008c4f91a6fa017c58ba9afc83241fc8d1a656378cb87bf42caf906a4292b83123400000009671b23fd259bb73b4d5b0661e4d22a88f4e574fa4c021d7f27e02e9ec2fa6e4710a8771aedbea6947503493d02db7a6e3901519625f43bbdd6dc7929303c1fc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ef456c0de4d801 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1060 iexplore.exe 1060 iexplore.exe 316 IEXPLORE.EXE 316 IEXPLORE.EXE 316 IEXPLORE.EXE 316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1060 wrote to memory of 316 1060 iexplore.exe 28 PID 1060 wrote to memory of 316 1060 iexplore.exe 28 PID 1060 wrote to memory of 316 1060 iexplore.exe 28 PID 1060 wrote to memory of 316 1060 iexplore.exe 28 PID 316 wrote to memory of 1088 316 IEXPLORE.EXE 29 PID 316 wrote to memory of 1088 316 IEXPLORE.EXE 29 PID 316 wrote to memory of 1088 316 IEXPLORE.EXE 29 PID 316 wrote to memory of 1088 316 IEXPLORE.EXE 29 PID 1088 wrote to memory of 864 1088 jsc.exe 31 PID 1088 wrote to memory of 864 1088 jsc.exe 31 PID 1088 wrote to memory of 864 1088 jsc.exe 31 PID 316 wrote to memory of 1204 316 IEXPLORE.EXE 32 PID 316 wrote to memory of 1204 316 IEXPLORE.EXE 32 PID 316 wrote to memory of 1204 316 IEXPLORE.EXE 32 PID 316 wrote to memory of 1204 316 IEXPLORE.EXE 32 PID 1204 wrote to memory of 476 1204 VjpwbG.exe 33 PID 1204 wrote to memory of 476 1204 VjpwbG.exe 33 PID 1204 wrote to memory of 476 1204 VjpwbG.exe 33
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40cc6b2c1150b2e9f24c5afaebcb98f97f2793f6e1c3c025e8766bb3cb31bc35.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1060 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\jsc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\jsc.exe" /out:C:\Users\Admin\AppData\Local\Temp\\VjpwbG.exe /platform:x64 /t:winexe C:\Users\Admin\AppData\Local\Temp\\VjpwbG.js3⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:AMD64 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3600.tmp" "C:\Users\Admin\AppData\Local\Temp\RES35F0.tmp"4⤵PID:864
-
-
-
C:\Users\Admin\AppData\Local\Temp\VjpwbG.exe"C:\Users\Admin\AppData\Local\Temp\VjpwbG.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\system32\cmd.execmd4⤵PID:476
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
712B
MD573697ada4111e01ffa967f49aa994340
SHA1fe3aada4b7e1a227709e554abdefb4a063fa2767
SHA256429aff510830d66b020b8a29429e070bc6b9c1d8273b0ff00eb7708ec49c3eae
SHA512ee18931843732b4b52ea688bbe66059102b5fcaab366901d83d3e03c7b3f56e5af94ef93a9f007fa0b69b7645e38305bdaa67af8e350886fede878743a85095d
-
Filesize
1KB
MD5994f026294561ac58c840b3f2de42e8f
SHA1c552f56ebf67d3cd0f47f3ae9b7e10b2862133d8
SHA256ca08b8d4042fe2973f3e49449b83fdf73ebb107b2cbf64e83385b62891a6f045
SHA51244d582981f0e91140a85c930f2ad10b8715c6aa93051f7715bbe2dbe3c3805f4c478483e04f669147ff3ebe9da342e412cc87b2aa4c24cc86148aedf887fe7aa
-
Filesize
18KB
MD5f285a7e0d6dcf57013852182caf6ceba
SHA1d9da82431f6ebe3ccffb7819a6a347cfbeaea986
SHA2561588116a0665df26eb33de81d7fb274ea371fc90f570a6b4b3c9b2e4ec1b40a7
SHA5123cdd127e465221813ea48bed69f55539520e82b4ce51b7efd0ee37e1f4a280093ba987e8c4189ee9f5cdd83eae628fdc7626db895b983d55ee08a48e9aea22dc
-
Filesize
18KB
MD5f285a7e0d6dcf57013852182caf6ceba
SHA1d9da82431f6ebe3ccffb7819a6a347cfbeaea986
SHA2561588116a0665df26eb33de81d7fb274ea371fc90f570a6b4b3c9b2e4ec1b40a7
SHA5123cdd127e465221813ea48bed69f55539520e82b4ce51b7efd0ee37e1f4a280093ba987e8c4189ee9f5cdd83eae628fdc7626db895b983d55ee08a48e9aea22dc
-
Filesize
3KB
MD55dd739e7bd8e93781aa4391fc42bd616
SHA105dac67887d93e63bad51c770702a871dd1d0dad
SHA256c754707989632d889dfbc45c7f3a72fbd2661c2d0a0c6239501df30a7c09a962
SHA51254b88e2c4dc309a24b4e2a34ada6591e116241fc633d0d0900f0f49d45f994730c4ba9cfd820b33aeabff7ccb26083769d8fc114502d1fc0d5018e18b4622847
-
Filesize
603B
MD50102646d01cfb11bd9c83c6579052b14
SHA19c8b549eea2df2f933055299f3942726fdd612ae
SHA2564a52d46f62a90fc934fe6f33c5a5caa1d0a1d46cd8043c0e1c6f50e6c16b46f5
SHA5123d86e76639ef2c46f6177560ae923fae8659d95a880981abae5385420540dd9ed96f70f0df46485e35ec6b0c2472e8cc4634b690f4807ad09f6cbf93c90bea21
-
Filesize
600B
MD5f16f75e463e31d91f2f953dbf641395a
SHA1fdc97ccfd01cf7ba5ea143045ed68e88f52cf4ba
SHA256fd09d0d75b8f7b394e3955c8ffa155626080914f2bde3fc4d81d25c42f2cae97
SHA5128fc593bde812955496fe3c8df69417ce7ddfce67022bbe8e39c9b3f9ce1c2271473c2d131e676c7c4da8314caf32d91bd1535bdf702f72dea9a37d60be6a4d73
-
Filesize
18KB
MD5f285a7e0d6dcf57013852182caf6ceba
SHA1d9da82431f6ebe3ccffb7819a6a347cfbeaea986
SHA2561588116a0665df26eb33de81d7fb274ea371fc90f570a6b4b3c9b2e4ec1b40a7
SHA5123cdd127e465221813ea48bed69f55539520e82b4ce51b7efd0ee37e1f4a280093ba987e8c4189ee9f5cdd83eae628fdc7626db895b983d55ee08a48e9aea22dc
-
Filesize
18KB
MD5f285a7e0d6dcf57013852182caf6ceba
SHA1d9da82431f6ebe3ccffb7819a6a347cfbeaea986
SHA2561588116a0665df26eb33de81d7fb274ea371fc90f570a6b4b3c9b2e4ec1b40a7
SHA5123cdd127e465221813ea48bed69f55539520e82b4ce51b7efd0ee37e1f4a280093ba987e8c4189ee9f5cdd83eae628fdc7626db895b983d55ee08a48e9aea22dc