Overview
overview
10Static
static
10text/part0...55.xml
windows10-1703-x64
1text/part0...56.xml
windows10-1703-x64
1text/part0...57.xml
windows10-1703-x64
1text/part0...58.xml
windows10-1703-x64
1text/part0...59.xml
windows10-1703-x64
1text/part0...60.xml
windows10-1703-x64
1text/part0...61.xml
windows10-1703-x64
1text/part0...62.xml
windows10-1703-x64
1text/part0...63.xml
windows10-1703-x64
1text/part0...65.xml
windows10-1703-x64
1text/part0...66.xml
windows10-1703-x64
1text/part0...67.xml
windows10-1703-x64
1text/part0...68.xml
windows10-1703-x64
1text/part0...69.xml
windows10-1703-x64
1text/part0...70.xml
windows10-1703-x64
1text/part0...71.xml
windows10-1703-x64
1text/part0...72.xml
windows10-1703-x64
1text/part0...73.xml
windows10-1703-x64
1text/part0...75.xml
windows10-1703-x64
1text/part0...76.xml
windows10-1703-x64
1text/part0...77.xml
windows10-1703-x64
1text/part0...78.xml
windows10-1703-x64
1text/part0...79.xml
windows10-1703-x64
1text/part0...80.xml
windows10-1703-x64
1text/part0...81.xml
windows10-1703-x64
1text/part0...82.xml
windows10-1703-x64
1text/part0...83.xml
windows10-1703-x64
1text/part0...84.xml
windows10-1703-x64
1text/part0...85.xml
windows10-1703-x64
1text/part0...86.xml
windows10-1703-x64
1titlepage.xml
windows10-1703-x64
1toc.xml
windows10-1703-x64
1Analysis
-
max time kernel
143s -
max time network
227s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
19-11-2022 12:00
Behavioral task
behavioral1
Sample
text/part0000_split_055.xml
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
text/part0000_split_056.xml
Resource
win10-20220901-en
Behavioral task
behavioral3
Sample
text/part0000_split_057.xml
Resource
win10-20220812-en
Behavioral task
behavioral4
Sample
text/part0000_split_058.xml
Resource
win10-20220812-en
Behavioral task
behavioral5
Sample
text/part0000_split_059.xml
Resource
win10-20220812-en
Behavioral task
behavioral6
Sample
text/part0000_split_060.xml
Resource
win10-20220901-en
Behavioral task
behavioral7
Sample
text/part0000_split_061.xml
Resource
win10-20220812-en
Behavioral task
behavioral8
Sample
text/part0000_split_062.xml
Resource
win10-20220812-en
Behavioral task
behavioral9
Sample
text/part0000_split_063.xml
Resource
win10-20220812-en
Behavioral task
behavioral10
Sample
text/part0000_split_065.xml
Resource
win10-20220901-en
Behavioral task
behavioral11
Sample
text/part0000_split_066.xml
Resource
win10-20220812-en
Behavioral task
behavioral12
Sample
text/part0000_split_067.xml
Resource
win10-20220812-en
Behavioral task
behavioral13
Sample
text/part0000_split_068.xml
Resource
win10-20220901-en
Behavioral task
behavioral14
Sample
text/part0000_split_069.xml
Resource
win10-20220812-en
Behavioral task
behavioral15
Sample
text/part0000_split_070.xml
Resource
win10-20220812-en
Behavioral task
behavioral16
Sample
text/part0000_split_071.xml
Resource
win10-20220812-en
Behavioral task
behavioral17
Sample
text/part0000_split_072.xml
Resource
win10-20220901-en
Behavioral task
behavioral18
Sample
text/part0000_split_073.xml
Resource
win10-20220812-en
Behavioral task
behavioral19
Sample
text/part0000_split_075.xml
Resource
win10-20220812-en
Behavioral task
behavioral20
Sample
text/part0000_split_076.xml
Resource
win10-20220812-en
Behavioral task
behavioral21
Sample
text/part0000_split_077.xml
Resource
win10-20220901-en
Behavioral task
behavioral22
Sample
text/part0000_split_078.xml
Resource
win10-20220812-en
Behavioral task
behavioral23
Sample
text/part0000_split_079.xml
Resource
win10-20220812-en
Behavioral task
behavioral24
Sample
text/part0000_split_080.xml
Resource
win10-20220812-en
Behavioral task
behavioral25
Sample
text/part0000_split_081.xml
Resource
win10-20220812-en
Behavioral task
behavioral26
Sample
text/part0000_split_082.xml
Resource
win10-20220812-en
Behavioral task
behavioral27
Sample
text/part0000_split_083.xml
Resource
win10-20220901-en
Behavioral task
behavioral28
Sample
text/part0000_split_084.xml
Resource
win10-20220812-en
Behavioral task
behavioral29
Sample
text/part0000_split_085.xml
Resource
win10-20220812-en
Behavioral task
behavioral30
Sample
text/part0000_split_086.xml
Resource
win10-20220901-en
Behavioral task
behavioral31
Sample
titlepage.xml
Resource
win10-20220812-en
Behavioral task
behavioral32
Sample
toc.xml
Resource
win10-20220812-en
General
-
Target
text/part0000_split_077.xml
-
Size
2KB
-
MD5
5e8f530b33f4bac2b3378742a1f92976
-
SHA1
66297e4792931b799ee97b86865e2cf07872cf16
-
SHA256
d8d6ebc76cc27cc972d478d2869c3c0cf67550f512e6c49ee6780c41758ac606
-
SHA512
abbfe8b9e39007ba3662176fa7714ba5d241e0806273b7759140c4254e8419cdc44641b75924f07e25f7c4d2e8a04559f9b11bc3ac6a7eec0bcbcdc98fc88943
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30997518" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3096196368" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20e717ba0efcd801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "375640862" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E40AD1D4-6801-11ED-9424-6ABDFB00ACC6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3096196368" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 108421ba0efcd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375624261" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "375672846" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048dd1ad2bf5eea499f26ca602abd8011000000000200000000001066000000010000200000008d516aaf25e343f73304f4617a6780afd7f760d6b3493a7f95721e893844d8ee000000000e8000000002000020000000f0fe1c2d987fc9e9519c1c41a513a439b41f47ee086d98f97cdca0891658ff18200000003518cfe99f23d31ebd36470ccbdbde1b5d7a5905733cb903b5adc73148d49f5e4000000054990120e26a4293ab33430db8bc500fcdae3630458c789ed32c2c2b6ea06e8a27c6d362b1e960eccbef5ae087bb63651d9d5649093bb77fee117a80c35f4fbc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30997518" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048dd1ad2bf5eea499f26ca602abd8011000000000200000000001066000000010000200000006c0dee09a779a87edbd2afb447f21eed0c1cd97faad7eb3a3da10de153fb6312000000000e8000000002000020000000be0a0f9779ce837597230a1a83f033c0ea395ae58b0c3e8b87e6e94be1c9f0fd20000000b38d38319ab241030870b80dbcdb52c88b3edee9ed4cce17bf52887c55cce23e40000000b89dfab2291c487babecbb38a10353b286493afcc2fe233465bdb5ff98c87412a03ac4f83bc52f94fbf01aa54f43246b8c3b8f579e63e35fdc66c8f257e3d537 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 4804 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 4804 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 4804 iexplore.exe 4804 iexplore.exe 5028 IEXPLORE.EXE 5028 IEXPLORE.EXE 5028 IEXPLORE.EXE 5028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
MSOXMLED.EXEiexplore.exedescription pid process target process PID 2792 wrote to memory of 4804 2792 MSOXMLED.EXE iexplore.exe PID 2792 wrote to memory of 4804 2792 MSOXMLED.EXE iexplore.exe PID 4804 wrote to memory of 5028 4804 iexplore.exe IEXPLORE.EXE PID 4804 wrote to memory of 5028 4804 iexplore.exe IEXPLORE.EXE PID 4804 wrote to memory of 5028 4804 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\text\part0000_split_077.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\text\part0000_split_077.xml2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4804 CREDAT:82945 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5028
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
615B
MD5546d3ac1b26d70212ad83a432b776a72
SHA173a7ba69e45650ac164c09b44a2afee913428d27
SHA256a077aac5484cb1420135101426d8059dfa64728bf7df282a27fd359064640f88
SHA512a23e8a4be6b8f38322c57344bf9931e874eb16c98cf4ce4f83ed90e48df1e0df23956a3e45e19018c72d4bb7880b1fbcf36ffe22738ee05e60f7d691c6c1b88f
-
Filesize
615B
MD519b381403fa0d7f57c14372b29de80a5
SHA101dece3701ee840253492909fd46afdab4444692
SHA256154d3699b9073a90e92c28381fbdb9d717c7e7e32c4541ac6d7d6aec1bb2f23f
SHA5127741dfa15157c8c4b121fd2f7b3d5178af99fec1727ef03c5ceda6a87ab6f4781bbb52bf9bd13362095a459a25e00df4f03ee9fc5b2a918a7834e7231dc0d23e