Analysis
-
max time kernel
118s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.el-rent.com/wp-content/uploads/OREAReantalApplicationResidentialForm410.pdf
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
http://www.el-rent.com/wp-content/uploads/OREAReantalApplicationResidentialForm410.pdf
Resource
win10v2004-20221111-en
General
-
Target
http://www.el-rent.com/wp-content/uploads/OREAReantalApplicationResidentialForm410.pdf
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375987372" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ce14c549262d7243a2b0e38e0af03b9c00000000020000000000106600000001000020000000514fb075677e46c7a66166504115c4b6ded8c5dcbe49877f260599b36d3e09d5000000000e8000000002000020000000875a1d61e1a9b3522dba3be717b9242fc5e4c8057b698eb9253e14d26b0aaa5c20000000ad87b1e4d3b7f03cee46326a1e314eaadb5f657f0301b6deedf5432f97fff35540000000440de81a7ca4ad2229b87fd35819729408c1fb2094c505b40e37f349559f51672d2206dcd34aae1631ad474b989401c20b99976f8563187a45f9fe357e21f60c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{452F4E71-6B4F-11ED-BF3D-D6AAFEFD221A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 709866235cffd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 864 iexplore.exe 864 iexplore.exe 844 IEXPLORE.EXE 844 IEXPLORE.EXE 844 IEXPLORE.EXE 844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 864 wrote to memory of 844 864 iexplore.exe IEXPLORE.EXE PID 864 wrote to memory of 844 864 iexplore.exe IEXPLORE.EXE PID 864 wrote to memory of 844 864 iexplore.exe IEXPLORE.EXE PID 864 wrote to memory of 844 864 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.el-rent.com/wp-content/uploads/OREAReantalApplicationResidentialForm410.pdf1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:864 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:844
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD5391c81c48b01cd0a3f06c68cbacb00dd
SHA1835150fcb1dd118381ac5421af8188642530deb4
SHA256a266c1392d0444afb8c956e007e7b3155e36994c7767a0fcb07cd10f661d693d
SHA512984df5e2b13d7a3877fd382fb26c9dfb232eeba92caf04aa4c2429e58cca4f02ac226777767ee9f5df817c26931b266c29c4c77518fe67d409ccda47f19a8ae9
-
Filesize
19KB
MD5e2aa71d6f63fbf4d40b8bbe66eed88e3
SHA1db0d502a92b3858100e9fe62f400e09d32c74ac5
SHA256d5d239c9e759c7b9637269ed30db960040196ffba96fba8cb2da3cd458852499
SHA512a56821c4ce66288a9e7955b73646f80a3d4ef42285d2ae55faacff8b3bc4e466252f64177d9d8144e9cd78077e90aeaa372ca8f8d5398714dc906c52bdc3e036
-
Filesize
603B
MD5271ec988e383b63d9a1e461659616ce5
SHA1ac7bda257157df55537b12ae199a0563ec6e9deb
SHA256b36590a4c769ba9fed2e7b084c3c5579fc9f6288a66ba5ab3a8c2522fc206138
SHA512adb99e5e5e78163a9d9900f3d3d9f11d8a81d2212e8e1c536b51d87648eb3a23b45cfc3c51d14fbced89da1a7236854999bc73cb5514de97a16f468ac381b092