Analysis
-
max time kernel
122s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 22:51
Static task
static1
Behavioral task
behavioral1
Sample
40cc6b2c1150b2e9f24c5afaebcb98f97f2793f6e1c3c025e8766bb3cb31bc35.html
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
40cc6b2c1150b2e9f24c5afaebcb98f97f2793f6e1c3c025e8766bb3cb31bc35.html
Resource
win10v2004-20220901-en
General
-
Target
40cc6b2c1150b2e9f24c5afaebcb98f97f2793f6e1c3c025e8766bb3cb31bc35.html
-
Size
9KB
-
MD5
85a4100c21bbd90356e686e066d4a990
-
SHA1
a4760b7820c1eac077bda84cc29b97d79afd5ef9
-
SHA256
40cc6b2c1150b2e9f24c5afaebcb98f97f2793f6e1c3c025e8766bb3cb31bc35
-
SHA512
3c76b40ef6c6f8616ccf82449ef00f8ecf381478e93133c2443a770951b6c054ee479d880dd8843839aef7bbae646226ef24b0e641d610de4d7514b5f8858c12
-
SSDEEP
192:Kw2KGoribWZFC9CLnd5NM7JL9w1tutJdAmiEVn3Zli1syGZ:URbUFC9C7idRFDiQnh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4968 VjpwbG.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new jsc.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new jsc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3440 4968 WerFault.exe 88 -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90f4f8740de4d801 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1879824468" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043e2eb2e51ccf149ab640c8bdb0d79060000000002000000000010660000000100002000000036fa6ac0f046e523836df20719346b126aa7c35f630f865fd326519d3f5c0dd7000000000e8000000002000020000000c991f05e2dd2514db4fd47f206fd91359cce6549311984b54475ae1c371178b12000000063a4bd69f53ebe135e53e29e10ce6366516efaa0a319050285aad3ad63845ecc40000000ddd179f90b7b4beda0c474bc80afc773eb9a03a9693bf4768b1a523817e01e91733948d59f65da928459e357b25ee4b5d4a5b79363b816952895906f94753fb1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30991373" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1866698266" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{9AB49A56-5000-11ED-A0EE-E6AF42CF752C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "372984880" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043e2eb2e51ccf149ab640c8bdb0d790600000000020000000000106600000001000020000000f06270d21528b699f1700f6f689aa2ec362e446d29a17b6a209ad175c5d43dc7000000000e8000000002000020000000fda5870828dfaebaf03db0abb52122c61fa9ffbba0701ab13a2d5eca12999490200000001a3034a51093fc2b18ea35c539ccfe4fe46f5ea39079631d145c988409bed3d34000000085973cb5b441cc561d2de95509e9d2628cb43808a230ca45ce488347264b479e904d5656c5516c4e49041b5999213e0219e1eafd3507b98a1794f79d0f8cbb82 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1866698266" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30991373" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30991373" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 802000750de4d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2468 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2468 iexplore.exe 2468 iexplore.exe 4624 IEXPLORE.EXE 4624 IEXPLORE.EXE 4624 IEXPLORE.EXE 4624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2468 wrote to memory of 4624 2468 iexplore.exe 83 PID 2468 wrote to memory of 4624 2468 iexplore.exe 83 PID 2468 wrote to memory of 4624 2468 iexplore.exe 83 PID 4624 wrote to memory of 4444 4624 IEXPLORE.EXE 85 PID 4624 wrote to memory of 4444 4624 IEXPLORE.EXE 85 PID 4444 wrote to memory of 3940 4444 jsc.exe 87 PID 4444 wrote to memory of 3940 4444 jsc.exe 87 PID 4624 wrote to memory of 4968 4624 IEXPLORE.EXE 88 PID 4624 wrote to memory of 4968 4624 IEXPLORE.EXE 88 PID 4968 wrote to memory of 820 4968 VjpwbG.exe 96 PID 4968 wrote to memory of 820 4968 VjpwbG.exe 96
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40cc6b2c1150b2e9f24c5afaebcb98f97f2793f6e1c3c025e8766bb3cb31bc35.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2468 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\jsc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\jsc.exe" /out:C:\Users\Admin\AppData\Local\Temp\\VjpwbG.exe /platform:x64 /t:winexe C:\Users\Admin\AppData\Local\Temp\\VjpwbG.js3⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:AMD64 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD056.tmp" "C:\Users\Admin\AppData\Local\Temp\RESD055.tmp"4⤵PID:3940
-
-
-
C:\Users\Admin\AppData\Local\Temp\VjpwbG.exe"C:\Users\Admin\AppData\Local\Temp\VjpwbG.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SYSTEM32\cmd.execmd4⤵PID:820
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4968 -s 7084⤵
- Program crash
PID:3440
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 456 -p 4968 -ip 49681⤵PID:2444
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5d3ff0edeee7d1ea5754d8a290ae01189
SHA1253ee24a4776d30bac0aedd7ea213adea6acb6f9
SHA256e2e542a3681c428c021d38e608dffa43da666f6f3c53f623c21dc184639b222b
SHA512ab14449059ae31856026e8d8cb0ec0b4158da0fd19f2a73940a159574a9084ce6a09ac05fb80ef3ab11cd9b1395dce021872215baced48f9e8a0bf7311000db7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD551266d4ebb095fbef306587018556f32
SHA1815ef83de3cd66f6ef44cd8875747145dbf37180
SHA2567ea7720c5017cc9521da8eea2dfd494f4c62f67f75fc7ccc5adb9d6d68662ac6
SHA51271ec13618c2d696d3c36b1c6560165ff0dbfc2e3166efd6a72a415e2b4b968c4986030484b8aa4432ac8ab18cc9e196d59644bc6ba9a83b4f7276641c1ec2dd3
-
Filesize
712B
MD573697ada4111e01ffa967f49aa994340
SHA1fe3aada4b7e1a227709e554abdefb4a063fa2767
SHA256429aff510830d66b020b8a29429e070bc6b9c1d8273b0ff00eb7708ec49c3eae
SHA512ee18931843732b4b52ea688bbe66059102b5fcaab366901d83d3e03c7b3f56e5af94ef93a9f007fa0b69b7645e38305bdaa67af8e350886fede878743a85095d
-
Filesize
1KB
MD59e92b03634b8ed15d5270026f54ec28a
SHA111c6670c619e83930d565a25e571c81e90a5e8c4
SHA25626f5a0cf7287f7eb30c0eb6cb90487fb9a3ae22cebe9b0db00ed9bc623ce722e
SHA512d54b74820a6e5ab587cfd792c0b044622d3198df80aa3bf448648eec8dc27ffc6539443aa1b33d779963fb882bd4d0e9c388d612810b210d5b4c31d813a306e9
-
Filesize
18KB
MD564e4d58a153ec21a2d3e355e196c04f4
SHA16d1719551686e2e3588a3de85b442b0a87ce53a1
SHA25620b8b3e64e967869a559fb5128aefb25bbf9245a06cd3b711d9422b2a22e470c
SHA51299dbff28544d4c1789006f98e35004ac642dc6271de4291567e5294595ce3723544d68642fdc87b881af3da2e1fea3cba47a132ef9e42b7361c131544a2f9907
-
Filesize
18KB
MD564e4d58a153ec21a2d3e355e196c04f4
SHA16d1719551686e2e3588a3de85b442b0a87ce53a1
SHA25620b8b3e64e967869a559fb5128aefb25bbf9245a06cd3b711d9422b2a22e470c
SHA51299dbff28544d4c1789006f98e35004ac642dc6271de4291567e5294595ce3723544d68642fdc87b881af3da2e1fea3cba47a132ef9e42b7361c131544a2f9907
-
Filesize
3KB
MD55dd739e7bd8e93781aa4391fc42bd616
SHA105dac67887d93e63bad51c770702a871dd1d0dad
SHA256c754707989632d889dfbc45c7f3a72fbd2661c2d0a0c6239501df30a7c09a962
SHA51254b88e2c4dc309a24b4e2a34ada6591e116241fc633d0d0900f0f49d45f994730c4ba9cfd820b33aeabff7ccb26083769d8fc114502d1fc0d5018e18b4622847
-
Filesize
600B
MD5a633faf3f9a119b9a389f473ac9a4a44
SHA16e3650268fdbda160198c7b8a1f0d5e0a8240622
SHA256beb8f8a6cc1d0cd90943b1cfefe1a43a562da493ba5604233d94ab3e73d86115
SHA512232fe016fdeaa1c91e32a658b225c2750a5a29052babfc358db0b17f2219d2b068bbfa4b1f1b0634cefb47541377860338208d6ef5ec7b2a8e13b99917da46c5
-
Filesize
600B
MD5a633faf3f9a119b9a389f473ac9a4a44
SHA16e3650268fdbda160198c7b8a1f0d5e0a8240622
SHA256beb8f8a6cc1d0cd90943b1cfefe1a43a562da493ba5604233d94ab3e73d86115
SHA512232fe016fdeaa1c91e32a658b225c2750a5a29052babfc358db0b17f2219d2b068bbfa4b1f1b0634cefb47541377860338208d6ef5ec7b2a8e13b99917da46c5