Analysis
-
max time kernel
97s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 16:58
Static task
static1
Behavioral task
behavioral1
Sample
c0b6e630063bdc81eb72631d0e6aa5153107d1eda04507debd540f2954bebedb.xml
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c0b6e630063bdc81eb72631d0e6aa5153107d1eda04507debd540f2954bebedb.xml
Resource
win10v2004-20220812-en
General
-
Target
c0b6e630063bdc81eb72631d0e6aa5153107d1eda04507debd540f2954bebedb.xml
-
Size
219KB
-
MD5
810074adc01e89bddc74c28827f5ff35
-
SHA1
db8654ac938f02d2afd58eddda2ad267b4f22ef9
-
SHA256
c0b6e630063bdc81eb72631d0e6aa5153107d1eda04507debd540f2954bebedb
-
SHA512
e5315d49e3ea1b56ee441160ce479d7c6ad60a105e6302b6062045ca8f48e0cca316521cec834071410f8333adb950f0b2baf6987a32e463651d240b372a2456
-
SSDEEP
3072:JmrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJr:J+z9VxLY7iAVLTBQJlr
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3080f5b5ade4d801 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373053709" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a000000000200000000001066000000010000200000002e1af7216e8c8d75a1bd1dbeecfde5192d50d96f3891f6d80be2c113da6cb599000000000e80000000020000200000002c338ce29aeb261f0619b3fb45279e3b4d42e19e1822a66d276be3df6f45e6c920000000f4c6ff9a4878501b7071a7cac057a2f0f14db57f03f302d78d6c209ace69d69b40000000ec5cf0512a5a48275427e08a0be26250414bdb5e94f8d72b5a7d39c0bfbb40bf64f3d943e864c19b910cbe50095cf027d2d777b8b15ba50d0bc1373bffeb7a0a IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DC7D6BF1-50A0-11ED-AD07-6AC8E2464E73} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1616 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE 516 IEXPLORE.EXE 516 IEXPLORE.EXE 516 IEXPLORE.EXE 516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1128 wrote to memory of 1472 1128 MSOXMLED.EXE 28 PID 1128 wrote to memory of 1472 1128 MSOXMLED.EXE 28 PID 1128 wrote to memory of 1472 1128 MSOXMLED.EXE 28 PID 1128 wrote to memory of 1472 1128 MSOXMLED.EXE 28 PID 1472 wrote to memory of 1616 1472 iexplore.exe 29 PID 1472 wrote to memory of 1616 1472 iexplore.exe 29 PID 1472 wrote to memory of 1616 1472 iexplore.exe 29 PID 1472 wrote to memory of 1616 1472 iexplore.exe 29 PID 1616 wrote to memory of 516 1616 IEXPLORE.EXE 30 PID 1616 wrote to memory of 516 1616 IEXPLORE.EXE 30 PID 1616 wrote to memory of 516 1616 IEXPLORE.EXE 30 PID 1616 wrote to memory of 516 1616 IEXPLORE.EXE 30
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\c0b6e630063bdc81eb72631d0e6aa5153107d1eda04507debd540f2954bebedb.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1616 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:516
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD52ed2846da091660b4f9b53635a0a06bb
SHA1fe769590568b3240341d26b570f9c64a2ceba909
SHA2562dc27f4d522d3f32ab0ca68d4a3e2ea4a935c3866c71bf8279a3ef2cdb244192
SHA5127402ba1697d03e0d6e3ba48ee8e26f7b775d0c8602dfbcfde763724b784a738fd7a6e40d043b86b4417b6f425264479d9b82f2dc49bdc90a7ce335d269e7b0b8