Overview
overview
10Static
static
TS-795WP.iso
windows7-x64
3TS-795WP.iso
windows10-2004-x64
3WP.vbs
windows7-x64
10WP.vbs
windows10-2004-x64
10header
windows7-x64
1header
windows10-2004-x64
1metaphysic/choked.txt
windows7-x64
1metaphysic/choked.txt
windows10-2004-x64
1metaphysic...ts.gif
windows7-x64
1metaphysic...ts.gif
windows10-2004-x64
1metaphysic...ly.ps1
windows7-x64
1metaphysic...ly.ps1
windows10-2004-x64
1metaphysic/preyed.txt
windows7-x64
1metaphysic/preyed.txt
windows10-2004-x64
1metaphysic...es.vbs
windows7-x64
3metaphysic...es.vbs
windows10-2004-x64
7metaphysic/readme.txt
windows7-x64
1metaphysic/readme.txt
windows10-2004-x64
1metaphysic...rs.jpg
windows7-x64
3metaphysic...rs.jpg
windows10-2004-x64
3metaphysic...te.png
windows7-x64
3metaphysic...te.png
windows10-2004-x64
3Analysis
-
max time kernel
164s -
max time network
241s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 18:56
Static task
static1
Behavioral task
behavioral1
Sample
TS-795WP.iso
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
TS-795WP.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
WP.vbs
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
WP.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
header
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
header
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
metaphysic/choked.txt
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
metaphysic/choked.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
metaphysic/imprints.gif
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
metaphysic/imprints.gif
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
metaphysic/possessively.ps1
Resource
win7-20220901-en
Behavioral task
behavioral12
Sample
metaphysic/possessively.ps1
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
metaphysic/preyed.txt
Resource
win7-20220901-en
Behavioral task
behavioral14
Sample
metaphysic/preyed.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
metaphysic/privates.vbs
Resource
win7-20221111-en
Behavioral task
behavioral16
Sample
metaphysic/privates.vbs
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
metaphysic/readme.txt
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
metaphysic/readme.txt
Resource
win10v2004-20221111-en
Behavioral task
behavioral19
Sample
metaphysic/simmers.jpg
Resource
win7-20220901-en
Behavioral task
behavioral20
Sample
metaphysic/simmers.jpg
Resource
win10v2004-20221111-en
Behavioral task
behavioral21
Sample
metaphysic/typewrite.png
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
metaphysic/typewrite.png
Resource
win10v2004-20221111-en
General
-
Target
metaphysic/imprints.gif
-
Size
24KB
-
MD5
45a891a5bbc4c25a91a77a06d065ff84
-
SHA1
831e6c38e6153f269cbde79d83ba6765421a9ea2
-
SHA256
32a6cc08ba7a30f462b37a8dc7f71ec0b40318379040fac318dd3a6d43ef9a17
-
SHA512
1287d8c542b45afaf3be53ec6fe00ac1c0c4f1af7a5d95e824afcabf842a7bdbaa2bf86468023c6640f43357a24066f352d24557a7058f943a513f25f7415e89
-
SSDEEP
768:vtqRNUQeWOtaMK7MpIIfTgVCQaDbqKab/iLylG:vE8Qeztan7kBTgVC07WLyw
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 104ec669f604d901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E958361-70E9-11ED-874D-7AEFAD47A2D2} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fbec07815684004d899a318f710de6af000000000200000000001066000000010000200000008f3756b1582775a069ca19a81ddf87ef49e41ed5afac97f721207eb2779eed50000000000e8000000002000020000000f374caf019b4006335cea74c4cca6363d09f45b14ec0bb970fb2121df60d878c2000000045d2c6618b2d6b263606fec0fd2a7a5d54a51b5c3ce2b7c1beca3920ab89ba4940000000fc750db933992e2e91537117ca9e41bbc2150d50e8a9f78a8a35db529d5bda653905e7c5cee2fa31114ce715142ba370d44501efe643e63abc67726a1b1b3e19 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376603364" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 904 iexplore.exe 904 iexplore.exe 364 IEXPLORE.EXE 364 IEXPLORE.EXE 364 IEXPLORE.EXE 364 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 904 wrote to memory of 364 904 iexplore.exe IEXPLORE.EXE PID 904 wrote to memory of 364 904 iexplore.exe IEXPLORE.EXE PID 904 wrote to memory of 364 904 iexplore.exe IEXPLORE.EXE PID 904 wrote to memory of 364 904 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\metaphysic\imprints.gif1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\AGOQB3GZ.txtFilesize
539B
MD5511689a95204bddc5eb95bab84a0ffa3
SHA1b26d70d30cc6d96fa59047d955f54f0df9d7af1e
SHA256992146506035943ee9168ce3d52df4ac2021d9245dfd852ad694bcc05ff6e0ce
SHA5129d19cbc32722e458c95bbb5a887be93cc480aca752ec8b761451fcb8392d898a4ed5524b0316d601e9080ec4b88123864e54ceb810cb08afbb874d7ff0aaf959