Analysis
-
max time kernel
102s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
21-11-2022 13:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://codeprojects.org/projects/weblab/PtOAT-yEGZU39ehGl7zv9gsl1cB-KhP7s8e4uDXQNhU
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
https://codeprojects.org/projects/weblab/PtOAT-yEGZU39ehGl7zv9gsl1cB-KhP7s8e4uDXQNhU
Resource
win10v2004-20221111-en
General
-
Target
https://codeprojects.org/projects/weblab/PtOAT-yEGZU39ehGl7zv9gsl1cB-KhP7s8e4uDXQNhU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375806480" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003bad9e5810411a41b405bdc87c3b0eb80000000002000000000010660000000100002000000033090e1150ee242da4de7a1dfcc4e1c17a0f1a4b53c247453c7fe97d10c81173000000000e8000000002000020000000a1b3eccee0d56288abf0c8d79ad597b901bada76bd7ea73c0cc794d8e87af36a900000001ba04f0c517beacecc15810c09290b5ab364b18724c0a97b4208187a9ae53f427c1e733c13da2d5e7477e41de078662a6d86e51a7fb58b008e0cfe1a47889aa8931359d5066c097c5f43347f31684e37c250ed9d9a6f1a766ea5fd13090ab9f60a383d751535bbfb6317a5eb064911bd1fd35effa571868182560e282a04566117193b04e6f2741c473fdd8e7a315e6340000000609415f7a713fe386f79c5be6069accf0385cb2ec342180560c0ae7e0fdd0b2d2c6d76a6987ff99308fdf7a54da32523f5a1e5497e2bf4c3d37727e587372435 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{278BE5F1-69AA-11ED-90DE-EEBA1A0FFCD1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003bad9e5810411a41b405bdc87c3b0eb80000000002000000000010660000000100002000000066e7d8e202c0c68771a13bdc18dfb9f6fb2dd4f011f122ec5c90718c0b916c93000000000e8000000002000020000000953f50ec6f22244fabbfa5d7b2e3cef9673959e5cec332e4dd49c9e353872bb02000000086be126be1fc0f6c0853cbe9ad11699020bbde9576e8e5ff5ba5889eb016e3314000000055cd7d6c6d70e706d130b697c64b0604a60b56b7093daf88ba7c8e093dbf88b5db13b2df5e2ccfd116a0bce2b87c07ea1795721141e03603eb72f21a2137d20c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0098d818b7fdd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1948 iexplore.exe 1948 iexplore.exe 1500 IEXPLORE.EXE 1500 IEXPLORE.EXE 1500 IEXPLORE.EXE 1500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1500 1948 iexplore.exe 29 PID 1948 wrote to memory of 1500 1948 iexplore.exe 29 PID 1948 wrote to memory of 1500 1948 iexplore.exe 29 PID 1948 wrote to memory of 1500 1948 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://codeprojects.org/projects/weblab/PtOAT-yEGZU39ehGl7zv9gsl1cB-KhP7s8e4uDXQNhU1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1500
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500c2967ec6171bd50d4ec583a7f27de1
SHA11377c2616d166ba08fb3a085040fefc8d036723e
SHA256080778b1374b3ee12ec5bb3a7fd8923622c88e5b89e7894db8919e34d1b55fb1
SHA51210ab60cb1c921d40c4bbb3c390f89314ce1914741442d86bf1ad342eedc85a0907bb1f0df6da3236c607e6a2c3f6d8f4141aad44fdd6366a6c178e30491417d6
-
Filesize
16KB
MD5e44edf8366ddf7b9eb4ad6cb7e02fff3
SHA1ea3801c2e1088f8f3dcaa38a3fc830e82d421a0e
SHA2563c1b206112b919352bb6b15f7f5d175c3022fcec43d56868968743ee62d19145
SHA5123b59ec60c383b6b1da75df9a56d9781eab4eff35bedb74815267868ffcda58f14146ac888931690d7ddd05448f55355ad1d8530065ccc5c0129f0ec7ce1c1d4d
-
Filesize
601B
MD51c80d8aa9c8b7335710887a2eac37c1d
SHA1551ebd9670ccb3591e89deb98dee739afa0bf1a6
SHA25620cfd3cecbba6611a75f2615afdaa81da059e26a58a62dc9f607913ca30c2882
SHA512645bc09038bf2b4c9b88af98605de248323b7a037cd2806845a75e45037c07cf9d5fabb2f5a5946262e575f81e40003cbe12652a5761951d507c58584de17be9