Analysis
-
max time kernel
132s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 10:54
Static task
static1
Behavioral task
behavioral1
Sample
5b2edd414e30387148088427981bbe46af8ff3a3f6ed9ea6dc7bf6b31ded902f.url
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5b2edd414e30387148088427981bbe46af8ff3a3f6ed9ea6dc7bf6b31ded902f.url
Resource
win10v2004-20220812-en
General
-
Target
5b2edd414e30387148088427981bbe46af8ff3a3f6ed9ea6dc7bf6b31ded902f.url
-
Size
133B
-
MD5
08f20f1a269509d2d5a642e77ec1f682
-
SHA1
a8f0cc2ee611ca23b666c4ee9210973712bc4e3b
-
SHA256
5b2edd414e30387148088427981bbe46af8ff3a3f6ed9ea6dc7bf6b31ded902f
-
SHA512
695cdd5c081ed02d2c47bdcbbee392a4ab3673b88889b60bb57c6de16d76aac6f9f5c660c1b5c588936e218b7c83fd48a3b80b5f958ab3dc5d84262db8b43a64
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376855515" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0FA8661-7334-11ED-B19F-72E6D75F6BEB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007802bd279320024c99745fd2ac8d96ee0000000002000000000010660000000100002000000013aaa6973cee1fe8f2eeae29afb4fb546ee27c771bfa3adfebe75dff3dc30464000000000e8000000002000020000000c4786695d08e348ca81dd474a16a7a20c7f82fa7190683593d149aac0d346815200000000eb1e1b6e60d33bed5fbb9ce041c5644359c1d7c28d43c503010a787ab1b7d02400000006129fd8206824e461acf7a557c3ee0e67cdc780380f343613fb18c084585f9590286d0ceb4181595a0c5b8dd1059fa319d67303e7592fdbbba0937de3383cb50 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 503fa87c4107d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1508 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1508 iexplore.exe 1508 iexplore.exe 1400 IEXPLORE.EXE 1400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1508 wrote to memory of 1400 1508 iexplore.exe 30 PID 1508 wrote to memory of 1400 1508 iexplore.exe 30 PID 1508 wrote to memory of 1400 1508 iexplore.exe 30 PID 1508 wrote to memory of 1400 1508 iexplore.exe 30
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\5b2edd414e30387148088427981bbe46af8ff3a3f6ed9ea6dc7bf6b31ded902f.url1⤵
- Checks whether UAC is enabled
PID:1736
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1508 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1400
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
539B
MD510cd0b18378aced0edb7ba269676c968
SHA10c19d95caa1612cafe45899c8888b5621b4fcbe6
SHA2567c818556380ec1d25fddd6fc949d471a6342dbd53502b110dc1f36fb67d4bd49
SHA5123fedf57bbfbbe8fe4b253eb39d703d0493c06a9ba3ab366d643073c16d74ad6f282edef977a6f2213b34b28d83e8bb63425f652cc0e9d50803707ba629e50cf5