Analysis
-
max time kernel
95s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 04:03
Static task
static1
Behavioral task
behavioral1
Sample
Remittance.htm
Resource
win7-20221111-en
General
-
Target
Remittance.htm
-
Size
266B
-
MD5
995b65b96e6d62f5f15232cabeee227d
-
SHA1
e9c55fe6c03c6d6e3384c47589b11fbcc09f4dc2
-
SHA256
3cc6860519543b336cf74baa4e89816f3cb58f6ff7c71646e8ea142a3b7c1236
-
SHA512
aca62c3c63145e264d9f80eee5396322ec8807776f277693418eba7599005512632a5ce911d841322bf64adbb244c01d49206f10b71855bd2b757b948672aa1e
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376463302" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F91F431-6FA3-11ED-A80F-CA7A4AEEC1E8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2036 iexplore.exe 2036 iexplore.exe 596 IEXPLORE.EXE 596 IEXPLORE.EXE 596 IEXPLORE.EXE 596 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2036 wrote to memory of 596 2036 iexplore.exe IEXPLORE.EXE PID 2036 wrote to memory of 596 2036 iexplore.exe IEXPLORE.EXE PID 2036 wrote to memory of 596 2036 iexplore.exe IEXPLORE.EXE PID 2036 wrote to memory of 596 2036 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Remittance.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8FFilesize
7KB
MD564bd9a644bd182581368e3ce024dad9a
SHA11520bd16d65200bfa86d889eb88f4f62a65dd007
SHA2565814095df174f580f08019718d2f8d05177276906620e36564588ba4b19ddfdb
SHA512af1ec9959334ae377a1b199a44ec31a3cadc1273512f8a2644eb8b3b21f24d4afe1c0515a3bb685bd35a0856c2d6383504ee7e72ae67f87f3bda0a8ff91ec5db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8FFilesize
232B
MD525073b49445a2c7f5f0393e84b1c7194
SHA13c013da1c0c12635ea0ab4bfa6537cf58c4c9fef
SHA2560b55ad072f5f4da7676ac845f61a49c4a9e98b63cf6301e590c04cf3fe5feec7
SHA512e4ec3cc49b3e6729e6cc022b150bcf2e0007da59d4721ad176dd56d5d512acd2e7e410d8cb71543e627a447cb0d55c2396f5922f976eaee7a1525adfff08235c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD51f11778913056c2c09683d2e5ace0a5e
SHA1bed0b6c9761a6aae7652c9d0665a66663feb9f37
SHA25678f31914c2f8fb761c139bc5a8d75aa6fca3a09a73ded35ab147b2cbb10d19f5
SHA512b5a808291763dd7fc57ba0313c0d3d8411bb06e5567b91669fe8e003d7032dcb51fdaa19d161a216a87704e5502eedff32501a3396c3c3c08eeaa920b88ee35f
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\try74lz\imagestore.datFilesize
17KB
MD550a59dc7476f8b59055cdc2045d33bd4
SHA13485805db1f79c3b6cdd9d230c1694c18314dafa
SHA2568799e7b35dfb82a127542658ca26d7515426649acdb99fc4e5eec3c2b1d2b026
SHA51280057da562f8edd72c84ea2d3b0d982e8b00b360c31fe2968a61d3c757fd0f59a0ca03313374d0b80826d3254c3aaa9bd0b925576806a87eff2cf5d96c74cebe
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\KR3GOCOG.txtFilesize
608B
MD53b7578b1c2460a0f69617caa0c70bed0
SHA1a60457620b53992d6321701ef894cd9a4761fa29
SHA25628abda7e45149ab42dd1bb1b6ba39ef0c65ed53653ae4c454bf66fb027cb07b3
SHA51250c5281acb508eab941de10f6fe8c4280ec2074c6aa09e5e6aa253bb7753fc05a96e860435c5d07cba373486144caa77e8bdd7fc90772cd2fee828676a82286f