Overview
overview
10Static
static
10text/part0...55.xml
windows10-1703-x64
1text/part0...56.xml
windows10-1703-x64
1text/part0...57.xml
windows10-1703-x64
1text/part0...58.xml
windows10-1703-x64
1text/part0...59.xml
windows10-1703-x64
1text/part0...60.xml
windows10-1703-x64
1text/part0...61.xml
windows10-1703-x64
1text/part0...62.xml
windows10-1703-x64
1text/part0...63.xml
windows10-1703-x64
1text/part0...65.xml
windows10-1703-x64
1text/part0...66.xml
windows10-1703-x64
1text/part0...67.xml
windows10-1703-x64
1text/part0...68.xml
windows10-1703-x64
1text/part0...69.xml
windows10-1703-x64
1text/part0...70.xml
windows10-1703-x64
1text/part0...71.xml
windows10-1703-x64
1text/part0...72.xml
windows10-1703-x64
1text/part0...73.xml
windows10-1703-x64
1text/part0...75.xml
windows10-1703-x64
1text/part0...76.xml
windows10-1703-x64
1text/part0...77.xml
windows10-1703-x64
1text/part0...78.xml
windows10-1703-x64
1text/part0...79.xml
windows10-1703-x64
1text/part0...80.xml
windows10-1703-x64
1text/part0...81.xml
windows10-1703-x64
1text/part0...82.xml
windows10-1703-x64
1text/part0...83.xml
windows10-1703-x64
1text/part0...84.xml
windows10-1703-x64
1text/part0...85.xml
windows10-1703-x64
1text/part0...86.xml
windows10-1703-x64
1titlepage.xml
windows10-1703-x64
1toc.xml
windows10-1703-x64
1Analysis
-
max time kernel
130s -
max time network
227s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
19-11-2022 12:00
Behavioral task
behavioral1
Sample
text/part0000_split_055.xml
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
text/part0000_split_056.xml
Resource
win10-20220901-en
Behavioral task
behavioral3
Sample
text/part0000_split_057.xml
Resource
win10-20220812-en
Behavioral task
behavioral4
Sample
text/part0000_split_058.xml
Resource
win10-20220812-en
Behavioral task
behavioral5
Sample
text/part0000_split_059.xml
Resource
win10-20220812-en
Behavioral task
behavioral6
Sample
text/part0000_split_060.xml
Resource
win10-20220901-en
Behavioral task
behavioral7
Sample
text/part0000_split_061.xml
Resource
win10-20220812-en
Behavioral task
behavioral8
Sample
text/part0000_split_062.xml
Resource
win10-20220812-en
Behavioral task
behavioral9
Sample
text/part0000_split_063.xml
Resource
win10-20220812-en
Behavioral task
behavioral10
Sample
text/part0000_split_065.xml
Resource
win10-20220901-en
Behavioral task
behavioral11
Sample
text/part0000_split_066.xml
Resource
win10-20220812-en
Behavioral task
behavioral12
Sample
text/part0000_split_067.xml
Resource
win10-20220812-en
Behavioral task
behavioral13
Sample
text/part0000_split_068.xml
Resource
win10-20220901-en
Behavioral task
behavioral14
Sample
text/part0000_split_069.xml
Resource
win10-20220812-en
Behavioral task
behavioral15
Sample
text/part0000_split_070.xml
Resource
win10-20220812-en
Behavioral task
behavioral16
Sample
text/part0000_split_071.xml
Resource
win10-20220812-en
Behavioral task
behavioral17
Sample
text/part0000_split_072.xml
Resource
win10-20220901-en
Behavioral task
behavioral18
Sample
text/part0000_split_073.xml
Resource
win10-20220812-en
Behavioral task
behavioral19
Sample
text/part0000_split_075.xml
Resource
win10-20220812-en
Behavioral task
behavioral20
Sample
text/part0000_split_076.xml
Resource
win10-20220812-en
Behavioral task
behavioral21
Sample
text/part0000_split_077.xml
Resource
win10-20220901-en
Behavioral task
behavioral22
Sample
text/part0000_split_078.xml
Resource
win10-20220812-en
Behavioral task
behavioral23
Sample
text/part0000_split_079.xml
Resource
win10-20220812-en
Behavioral task
behavioral24
Sample
text/part0000_split_080.xml
Resource
win10-20220812-en
Behavioral task
behavioral25
Sample
text/part0000_split_081.xml
Resource
win10-20220812-en
Behavioral task
behavioral26
Sample
text/part0000_split_082.xml
Resource
win10-20220812-en
Behavioral task
behavioral27
Sample
text/part0000_split_083.xml
Resource
win10-20220901-en
Behavioral task
behavioral28
Sample
text/part0000_split_084.xml
Resource
win10-20220812-en
Behavioral task
behavioral29
Sample
text/part0000_split_085.xml
Resource
win10-20220812-en
Behavioral task
behavioral30
Sample
text/part0000_split_086.xml
Resource
win10-20220901-en
Behavioral task
behavioral31
Sample
titlepage.xml
Resource
win10-20220812-en
Behavioral task
behavioral32
Sample
toc.xml
Resource
win10-20220812-en
General
-
Target
text/part0000_split_066.xml
-
Size
3KB
-
MD5
a94ac7e0207482508be50b8287abfbe7
-
SHA1
b810c5fdcf70f79005389b4986ba27391c609c31
-
SHA256
7394d448dd1488a7b4b54f51005477aaf0f99f5907ac87c20fa1badc3ded8130
-
SHA512
91a77d4f7e9312708daca4aac22d390c3f4bb740dc22b9f1db042b05f11fcc419efaa151393840153c112c2975e8c52e1c1a1a4c681bde43e5acb694afcc3b54
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004a27805dc33e9149aee6b032f471721300000000020000000000106600000001000020000000d39a0513496fdfd0c07395a0b48427fe36aa97dd478c41f841f0999641b66c39000000000e80000000020000200000006a70fb22383af648f70d699e92430ba1c6c08b46228f66f5bf3af6cb0429d9c62000000080ebccf6c63131432f931768dbdcaa243c46130bd64546c009ec6fc3ba3f01b140000000b5f9079ababdac7519040c7e8172458a9e61cd9d44e27691b7f18163f33b11675de6dacae8d84ee3ad9f66bc103fd310ffc4e336b1762a2f5752144216950ec6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0358f1a17fcd801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "788567313" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30997527" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30295d1a17fcd801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375627859" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004a27805dc33e9149aee6b032f471721300000000020000000000106600000001000020000000f43cf15bef3cd813e4c6f7ef01a4157abcd9007a8bc1d61e73fd32f83a9c1ba6000000000e8000000002000020000000962cda3e3b3620493982877a2973134ac88283995d64acb5b05a5e8a371b509f20000000d8019f3aa60e1273732acff35933dc6eba8e6d6e077396c23499e08070bb2bbb40000000c3a2bf0750859a7fa83316c386984be09ce7adfb0ac0debe9d70d7e269dc836666585faa59e843f2f17a6e6dab4dc498c0f8aaa7f205e14c479d14747adad1e6 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30997527" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{44A841D9-680A-11ED-A7A3-62FB359F6F94} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "788567313" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "375676445" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "375644456" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 2800 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2800 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2800 iexplore.exe 2800 iexplore.exe 1776 IEXPLORE.EXE 1776 IEXPLORE.EXE 1776 IEXPLORE.EXE 1776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
MSOXMLED.EXEiexplore.exedescription pid process target process PID 3540 wrote to memory of 2800 3540 MSOXMLED.EXE iexplore.exe PID 3540 wrote to memory of 2800 3540 MSOXMLED.EXE iexplore.exe PID 2800 wrote to memory of 1776 2800 iexplore.exe IEXPLORE.EXE PID 2800 wrote to memory of 1776 2800 iexplore.exe IEXPLORE.EXE PID 2800 wrote to memory of 1776 2800 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_066.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_066.xml2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:82945 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1776
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
610B
MD5ea4af914b0df7e41779ab9efa4c13209
SHA1333bb7bd195b184efa3b1a398c4563d33c961454
SHA2563fe96f1dde955ba7bb2f45ac006353e83595a1262dbd129ec87a78216bcb6d9f
SHA51218cd87956ec2467a2cb7d21a07ce194ae7a9aa0b0df398cb6028d421f5088bd792f7a95ba1edd72674b2e21d576b0d9367da72725db164ab0bb0aafb7992cfb7
-
Filesize
610B
MD5882b29db6f6983f3bb77134e4932a0d8
SHA1e531a79607c1a2842214365aedfd5c94138b8332
SHA25620b06b67da2b6d66771f0ef25943438bd9abc26b9bde29303015d6f86e3a99ab
SHA512ad20adb60d20aac49d66df35e04d3d4e191277cad37ca4fd0bc414879bbe8c30b4590b5af974fd47f32d3fc17c41c43d7cf61397484c4e051bc4b52fe7a4ac05