Overview
overview
10Static
static
10text/part0...55.xml
windows10-1703-x64
1text/part0...56.xml
windows10-1703-x64
1text/part0...57.xml
windows10-1703-x64
1text/part0...58.xml
windows10-1703-x64
1text/part0...59.xml
windows10-1703-x64
1text/part0...60.xml
windows10-1703-x64
1text/part0...61.xml
windows10-1703-x64
1text/part0...62.xml
windows10-1703-x64
1text/part0...63.xml
windows10-1703-x64
1text/part0...65.xml
windows10-1703-x64
1text/part0...66.xml
windows10-1703-x64
1text/part0...67.xml
windows10-1703-x64
1text/part0...68.xml
windows10-1703-x64
1text/part0...69.xml
windows10-1703-x64
1text/part0...70.xml
windows10-1703-x64
1text/part0...71.xml
windows10-1703-x64
1text/part0...72.xml
windows10-1703-x64
1text/part0...73.xml
windows10-1703-x64
1text/part0...75.xml
windows10-1703-x64
1text/part0...76.xml
windows10-1703-x64
1text/part0...77.xml
windows10-1703-x64
1text/part0...78.xml
windows10-1703-x64
1text/part0...79.xml
windows10-1703-x64
1text/part0...80.xml
windows10-1703-x64
1text/part0...81.xml
windows10-1703-x64
1text/part0...82.xml
windows10-1703-x64
1text/part0...83.xml
windows10-1703-x64
1text/part0...84.xml
windows10-1703-x64
1text/part0...85.xml
windows10-1703-x64
1text/part0...86.xml
windows10-1703-x64
1titlepage.xml
windows10-1703-x64
1toc.xml
windows10-1703-x64
1Analysis
-
max time kernel
164s -
max time network
227s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
19-11-2022 12:00
Behavioral task
behavioral1
Sample
text/part0000_split_055.xml
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
text/part0000_split_056.xml
Resource
win10-20220901-en
Behavioral task
behavioral3
Sample
text/part0000_split_057.xml
Resource
win10-20220812-en
Behavioral task
behavioral4
Sample
text/part0000_split_058.xml
Resource
win10-20220812-en
Behavioral task
behavioral5
Sample
text/part0000_split_059.xml
Resource
win10-20220812-en
Behavioral task
behavioral6
Sample
text/part0000_split_060.xml
Resource
win10-20220901-en
Behavioral task
behavioral7
Sample
text/part0000_split_061.xml
Resource
win10-20220812-en
Behavioral task
behavioral8
Sample
text/part0000_split_062.xml
Resource
win10-20220812-en
Behavioral task
behavioral9
Sample
text/part0000_split_063.xml
Resource
win10-20220812-en
Behavioral task
behavioral10
Sample
text/part0000_split_065.xml
Resource
win10-20220901-en
Behavioral task
behavioral11
Sample
text/part0000_split_066.xml
Resource
win10-20220812-en
Behavioral task
behavioral12
Sample
text/part0000_split_067.xml
Resource
win10-20220812-en
Behavioral task
behavioral13
Sample
text/part0000_split_068.xml
Resource
win10-20220901-en
Behavioral task
behavioral14
Sample
text/part0000_split_069.xml
Resource
win10-20220812-en
Behavioral task
behavioral15
Sample
text/part0000_split_070.xml
Resource
win10-20220812-en
Behavioral task
behavioral16
Sample
text/part0000_split_071.xml
Resource
win10-20220812-en
Behavioral task
behavioral17
Sample
text/part0000_split_072.xml
Resource
win10-20220901-en
Behavioral task
behavioral18
Sample
text/part0000_split_073.xml
Resource
win10-20220812-en
Behavioral task
behavioral19
Sample
text/part0000_split_075.xml
Resource
win10-20220812-en
Behavioral task
behavioral20
Sample
text/part0000_split_076.xml
Resource
win10-20220812-en
Behavioral task
behavioral21
Sample
text/part0000_split_077.xml
Resource
win10-20220901-en
Behavioral task
behavioral22
Sample
text/part0000_split_078.xml
Resource
win10-20220812-en
Behavioral task
behavioral23
Sample
text/part0000_split_079.xml
Resource
win10-20220812-en
Behavioral task
behavioral24
Sample
text/part0000_split_080.xml
Resource
win10-20220812-en
Behavioral task
behavioral25
Sample
text/part0000_split_081.xml
Resource
win10-20220812-en
Behavioral task
behavioral26
Sample
text/part0000_split_082.xml
Resource
win10-20220812-en
Behavioral task
behavioral27
Sample
text/part0000_split_083.xml
Resource
win10-20220901-en
Behavioral task
behavioral28
Sample
text/part0000_split_084.xml
Resource
win10-20220812-en
Behavioral task
behavioral29
Sample
text/part0000_split_085.xml
Resource
win10-20220812-en
Behavioral task
behavioral30
Sample
text/part0000_split_086.xml
Resource
win10-20220901-en
Behavioral task
behavioral31
Sample
titlepage.xml
Resource
win10-20220812-en
Behavioral task
behavioral32
Sample
toc.xml
Resource
win10-20220812-en
General
-
Target
text/part0000_split_075.xml
-
Size
2KB
-
MD5
6069f1ea5ae1787175a5f613d63d3c44
-
SHA1
00763a232db742fb6bc7795a201dbdea96e24101
-
SHA256
0d6dd030e6443622a75b5089d44764b70f683bf8e92cbf521716aff8696bf4d3
-
SHA512
9a04f73802198c3333013496afb6f7cb92566924db2be27555e54e44b5c465acbbd461cb6e8a8f0f671e6b12d51c70d47e4760ca03faab025b41c6ff80a24160
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{45D54B23-680A-11ED-A7A3-72FCFC427ACC} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "375676460" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005b30d5b0d13eda42945b96379bebf241000000000200000000001066000000010000200000002857cd85bb6521408fc8fec54c33a1276d5888226f7709b278180f69b71c23b2000000000e800000000200002000000050f770fcc75888d6d14eb30085f0af815cc77219206f1be1aecdb510b809c5fc2000000092ba7f846dc34b0d607f99fcc7be5014543e8f2ce0b15de2dd064a80a1a12b254000000025f946076fbadd918da62fbec4f8729d87ac90d3f227193cee017f5a24f79e197106597b7138c2a2c39f420b4fecf4af8bfd5b7bf5ed859399f643b2cc5bf050 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10e6ec1a17fcd801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005b30d5b0d13eda42945b96379bebf241000000000200000000001066000000010000200000008585dca6f997b35442da5ad4c107f63bb835868b65350b33c2bef13473451d58000000000e8000000002000020000000d7e58e5c9c4d71f81ff34cff34dde3003d2e9dc493ca32aaff28422710aec8f020000000e0f53ad4109c0216a64be7a6d0a46d9c60c33e5d657adfa813d422855154608d40000000d6fe90c17b79c0f4be401332c0cf9ce5e1cd1ff441e56f5151addd176568dad88ee8a72273b049121c9d331cc05c0257fa29e71d1029fd81a6d351ba62058377 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375024758" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0290e1b17fcd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "375644469" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4716 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4716 iexplore.exe 4716 iexplore.exe 4440 IEXPLORE.EXE 4440 IEXPLORE.EXE 4440 IEXPLORE.EXE 4440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2832 wrote to memory of 4716 2832 MSOXMLED.EXE 66 PID 2832 wrote to memory of 4716 2832 MSOXMLED.EXE 66 PID 4716 wrote to memory of 4440 4716 iexplore.exe 68 PID 4716 wrote to memory of 4440 4716 iexplore.exe 68 PID 4716 wrote to memory of 4440 4716 iexplore.exe 68
Processes
-
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_075.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_075.xml2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4716 CREDAT:82945 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4440
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
610B
MD524083cff1896b6eb24c47a9a237cf15e
SHA1a7fa68969ccf681190a6526a5a9ba80d0adacf66
SHA256cb4fe59db4cfefc49e87ecec0ab4e130a3e21d15226baf2f70636a1b1b394705
SHA512512d0d533568666a27bf17bc740924189157eca3e5ac2c2a99724e9a25d5c84fa351477129861ddb03983649897fe65a4da4315fc7086e66932d7b590a3a30f6