Overview
overview
7Static
static
document_Y...22.iso
windows7-x64
3document_Y...22.iso
windows10-2004-x64
3data.txt
windows7-x64
1data.txt
windows10-2004-x64
1document.vbs
windows7-x64
3document.vbs
windows10-2004-x64
7overhauled/dozens.gif
windows7-x64
1overhauled/dozens.gif
windows10-2004-x64
1overhauled...ry.dll
windows7-x64
1overhauled...ry.dll
windows10-2004-x64
1overhauled...ss.png
windows7-x64
3overhauled...ss.png
windows10-2004-x64
3Analysis
-
max time kernel
97s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 06:29
Static task
static1
Behavioral task
behavioral1
Sample
document_Y265_Nov#22.iso
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
document_Y265_Nov#22.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
data.txt
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
data.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
document.vbs
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
document.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
overhauled/dozens.gif
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
overhauled/dozens.gif
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
overhauled/honorary.dll
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
overhauled/honorary.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
overhauled/superlativeness.png
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
overhauled/superlativeness.png
Resource
win10v2004-20221111-en
General
-
Target
overhauled/dozens.gif
-
Size
15KB
-
MD5
e3f2b1c7d3e95da49d565b4612d94638
-
SHA1
f656dd7f431522baeda07952e4f57f3018a02abf
-
SHA256
f8b85afc6511c5c161e26751ee89b04134046032f51b6c21e5eec47e49f5e72d
-
SHA512
1c8b6f46f953a7a894969d0f337cc6b7d2f579746a1f758e32c6c61d8ec5eeab5b19f89c854790da5fad322596d3ef80186f6eb51a2a441985fc4767c61e9bea
-
SSDEEP
384:0yeIEnA5wU0XOXCxd5ZsdMqmCJGH7oOlDXxapO:0K50XOM5ZsqLU/pO
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000256ed27e8919d04f83812f84ee5c95da00000000020000000000106600000001000020000000dc4a58a125b88cbf1eb5dcb457cdf2f49219513904b4fa92456f666a48c55734000000000e8000000002000020000000c96f61c9565a118e20e4591c7e61726590ca4ebf9eac363945af343a2f85c29b2000000086ebefbccc30aa5e5b4a7f2985dd68242350e7d0cc855fbbd292c9e9c77bcea2400000008a985cf1f80a464a0cf092657c36ac0f1add089aa71e52c73860250c593dc9c18df828a0bcdc3c9b8106f1e035dc17872e334c0b2d8644cd5fb39bf04207fe9e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d418830dffd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375953591" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AD277651-6B00-11ED-8553-72598884447E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1292 iexplore.exe 1292 iexplore.exe 768 IEXPLORE.EXE 768 IEXPLORE.EXE 768 IEXPLORE.EXE 768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1292 wrote to memory of 768 1292 iexplore.exe IEXPLORE.EXE PID 1292 wrote to memory of 768 1292 iexplore.exe IEXPLORE.EXE PID 1292 wrote to memory of 768 1292 iexplore.exe IEXPLORE.EXE PID 1292 wrote to memory of 768 1292 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\overhauled\dozens.gif1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1292 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD5a418d20fc80d012ae18342c293e9d373
SHA1edff5cdbad99da78fa4dd33bf87be51affc772ea
SHA25675e1d934c1846a95a74d9078fb574a4d793e88e84b5ed218b2eab8f410577f08
SHA512bb6e84cedbe78d9269130048afd549d7c994818e356aff99c8178c2c9b32aa6712d45c2cec0f64b0db7e09519a07feb4af1418fbe1a737274896ea28f9210dc5