Overview
overview
10Static
static
10text/part0...55.xml
windows10-1703-x64
1text/part0...56.xml
windows10-1703-x64
1text/part0...57.xml
windows10-1703-x64
1text/part0...58.xml
windows10-1703-x64
1text/part0...59.xml
windows10-1703-x64
1text/part0...60.xml
windows10-1703-x64
1text/part0...61.xml
windows10-1703-x64
1text/part0...62.xml
windows10-1703-x64
1text/part0...63.xml
windows10-1703-x64
1text/part0...65.xml
windows10-1703-x64
1text/part0...66.xml
windows10-1703-x64
1text/part0...67.xml
windows10-1703-x64
1text/part0...68.xml
windows10-1703-x64
1text/part0...69.xml
windows10-1703-x64
1text/part0...70.xml
windows10-1703-x64
1text/part0...71.xml
windows10-1703-x64
1text/part0...72.xml
windows10-1703-x64
1text/part0...73.xml
windows10-1703-x64
1text/part0...75.xml
windows10-1703-x64
1text/part0...76.xml
windows10-1703-x64
1text/part0...77.xml
windows10-1703-x64
1text/part0...78.xml
windows10-1703-x64
1text/part0...79.xml
windows10-1703-x64
1text/part0...80.xml
windows10-1703-x64
1text/part0...81.xml
windows10-1703-x64
1text/part0...82.xml
windows10-1703-x64
1text/part0...83.xml
windows10-1703-x64
1text/part0...84.xml
windows10-1703-x64
1text/part0...85.xml
windows10-1703-x64
1text/part0...86.xml
windows10-1703-x64
1titlepage.xml
windows10-1703-x64
1toc.xml
windows10-1703-x64
1Analysis
-
max time kernel
136s -
max time network
240s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
19-11-2022 12:00
Behavioral task
behavioral1
Sample
text/part0000_split_055.xml
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
text/part0000_split_056.xml
Resource
win10-20220901-en
Behavioral task
behavioral3
Sample
text/part0000_split_057.xml
Resource
win10-20220812-en
Behavioral task
behavioral4
Sample
text/part0000_split_058.xml
Resource
win10-20220812-en
Behavioral task
behavioral5
Sample
text/part0000_split_059.xml
Resource
win10-20220812-en
Behavioral task
behavioral6
Sample
text/part0000_split_060.xml
Resource
win10-20220901-en
Behavioral task
behavioral7
Sample
text/part0000_split_061.xml
Resource
win10-20220812-en
Behavioral task
behavioral8
Sample
text/part0000_split_062.xml
Resource
win10-20220812-en
Behavioral task
behavioral9
Sample
text/part0000_split_063.xml
Resource
win10-20220812-en
Behavioral task
behavioral10
Sample
text/part0000_split_065.xml
Resource
win10-20220901-en
Behavioral task
behavioral11
Sample
text/part0000_split_066.xml
Resource
win10-20220812-en
Behavioral task
behavioral12
Sample
text/part0000_split_067.xml
Resource
win10-20220812-en
Behavioral task
behavioral13
Sample
text/part0000_split_068.xml
Resource
win10-20220901-en
Behavioral task
behavioral14
Sample
text/part0000_split_069.xml
Resource
win10-20220812-en
Behavioral task
behavioral15
Sample
text/part0000_split_070.xml
Resource
win10-20220812-en
Behavioral task
behavioral16
Sample
text/part0000_split_071.xml
Resource
win10-20220812-en
Behavioral task
behavioral17
Sample
text/part0000_split_072.xml
Resource
win10-20220901-en
Behavioral task
behavioral18
Sample
text/part0000_split_073.xml
Resource
win10-20220812-en
Behavioral task
behavioral19
Sample
text/part0000_split_075.xml
Resource
win10-20220812-en
Behavioral task
behavioral20
Sample
text/part0000_split_076.xml
Resource
win10-20220812-en
Behavioral task
behavioral21
Sample
text/part0000_split_077.xml
Resource
win10-20220901-en
Behavioral task
behavioral22
Sample
text/part0000_split_078.xml
Resource
win10-20220812-en
Behavioral task
behavioral23
Sample
text/part0000_split_079.xml
Resource
win10-20220812-en
Behavioral task
behavioral24
Sample
text/part0000_split_080.xml
Resource
win10-20220812-en
Behavioral task
behavioral25
Sample
text/part0000_split_081.xml
Resource
win10-20220812-en
Behavioral task
behavioral26
Sample
text/part0000_split_082.xml
Resource
win10-20220812-en
Behavioral task
behavioral27
Sample
text/part0000_split_083.xml
Resource
win10-20220901-en
Behavioral task
behavioral28
Sample
text/part0000_split_084.xml
Resource
win10-20220812-en
Behavioral task
behavioral29
Sample
text/part0000_split_085.xml
Resource
win10-20220812-en
Behavioral task
behavioral30
Sample
text/part0000_split_086.xml
Resource
win10-20220901-en
Behavioral task
behavioral31
Sample
titlepage.xml
Resource
win10-20220812-en
Behavioral task
behavioral32
Sample
toc.xml
Resource
win10-20220812-en
General
-
Target
text/part0000_split_076.xml
-
Size
1KB
-
MD5
103e01f10a110cbb1cd3c2a2aa38fa77
-
SHA1
8dc76b7093658513b8cbe7530d65b3ad6fbe4eea
-
SHA256
f02cce6f4d7a281e3843c339218b359ea85b49a56ccf6b8dd2fc765108f82b99
-
SHA512
f20be5d73541a87a137411d98f73b55802ad7dcfa6fd7ec6340f79e1266e3bd039d50a2552661149e9b95246537662d255b46c338905eb43d426fd3a4454867e
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30997527" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10b43b2b17fcd801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005d7738106ffde146a4ba7cca32fba8320000000002000000000010660000000100002000000015a9cb31bf326f1f0f4768cd85bb3359421def7b425dcc31de9d2ced42d633c6000000000e8000000002000020000000253cdeced8a34e3986a7d47ee084aa7ee63e1cfbe015ded901e89860420331352000000032624850e5d3a2ba6b50fbb3c40a1e22329e8c6b471d7977935da31dcdb2063140000000f28b62dbad3a54a16da3912c3f8f1f3b7d5275316394b33e732b525f55c02aeabb2b07c2b179c836239ea08316481a33a8704535cea99f6719d50f2fdbdca28b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "722677877" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "375644476" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "375676468" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4C939320-680A-11ED-A973-523C7D4F90F0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30997527" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "722677877" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80ec742b17fcd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005d7738106ffde146a4ba7cca32fba83200000000020000000000106600000001000020000000cb454eb8f1741792cec32ec0eb95221691677abcae22b0905f0a4e56d17845c4000000000e800000000200002000000040cc9cec272fba7e649165b151ec996202a21a9fee5f0b6ea47f6cc6339b040e20000000b9838a621d8fce7be1db6c56b5c5f024b57388aafa729842ae2aca9222f715384000000016ebf912e6f039f90ebd859257adbaa1107f2fb9523625403ed8732d998048c59ec66fd65e30410f53e320475150f727d3accc22495a07d13c87c3b4a671c5a1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375627882" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 4924 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 4924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 4924 iexplore.exe 4924 iexplore.exe 4932 IEXPLORE.EXE 4932 IEXPLORE.EXE 4932 IEXPLORE.EXE 4932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
MSOXMLED.EXEiexplore.exedescription pid process target process PID 2180 wrote to memory of 4924 2180 MSOXMLED.EXE iexplore.exe PID 2180 wrote to memory of 4924 2180 MSOXMLED.EXE iexplore.exe PID 4924 wrote to memory of 4932 4924 iexplore.exe IEXPLORE.EXE PID 4924 wrote to memory of 4932 4924 iexplore.exe IEXPLORE.EXE PID 4924 wrote to memory of 4932 4924 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_076.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_076.xml2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4924 CREDAT:82945 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4932
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
615B
MD544bd8d5dc1b449098feb5f558dd28094
SHA1125b7f6deb8acfb0e2d9fcf2035e2982ab054778
SHA2561615b21da1d924af8d07c86b277c680262a02530da3fb2089d94d860999b7fe1
SHA5122641217810f7d204162fa2d49377dfa697a2aa8f0d9efe295acf167d35bd04c247a91330a7ea54a484072a28293c37b74d041fba169ffc53a58e7d1c61ba5911
-
Filesize
615B
MD5d94dd339bd8843f0731720bc20c345d6
SHA1f8391d4467d3410a73f5f6fbdea95fceebb9c00d
SHA2564014f9695affc25de29de958f57000cd100b8b7066f345e293aa141ac056a77a
SHA512e331b1e6212de4815594c730b40506ca9ca328648f0ae5db1bc4af613f73001001220f4397b22337de489e53defa7b4b43bba4a3851c810e00c972c763428439