Overview
overview
7Static
static
1SoftInstal...me.xml
windows7-x64
1SoftInstal...me.xml
windows10-2004-x64
1SoftInstal...gs.xml
windows7-x64
1SoftInstal...gs.xml
windows10-2004-x64
1SoftInstal...ng.xml
windows7-x64
1SoftInstal...ng.xml
windows10-2004-x64
1SoftInstal...ot.xml
windows7-x64
1SoftInstal...ot.xml
windows10-2004-x64
1SoftInstal...ys.xml
windows7-x64
1SoftInstal...ys.xml
windows10-2004-x64
SoftInstal...ve.xml
windows7-x64
1SoftInstal...ve.xml
windows10-2004-x64
SoftInstal...al.xml
windows7-x64
1SoftInstal...al.xml
windows10-2004-x64
SoftInstal...in.xml
windows7-x64
1SoftInstal...in.xml
windows10-2004-x64
1SoftInstal...ce.xml
windows7-x64
1SoftInstal...ce.xml
windows10-2004-x64
SoftInstal...ms.xml
windows7-x64
1SoftInstal...ms.xml
windows10-2004-x64
1SoftInstal...at.xml
windows7-x64
1SoftInstal...at.xml
windows10-2004-x64
1SoftInstal...me.xml
windows7-x64
1SoftInstal...me.xml
windows10-2004-x64
1SoftInstal...er.xml
windows7-x64
1SoftInstal...er.xml
windows10-2004-x64
1SoftInstal...er.xml
windows7-x64
1SoftInstal...er.xml
windows10-2004-x64
1SoftInstal...gs.xml
windows7-x64
SoftInstal...gs.xml
windows10-2004-x64
SoftInstal...ay.xml
windows7-x64
1SoftInstal...ay.xml
windows10-2004-x64
Analysis
-
max time kernel
250s -
max time network
676s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
10-12-2022 05:06
Static task
static1
Behavioral task
behavioral1
Sample
SoftInstall/About/AppXRuntime.xml
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SoftInstall/About/AppXRuntime.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
SoftInstall/About/AuditSettings.xml
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
SoftInstall/About/AuditSettings.xml
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
SoftInstall/About/EventForwarding.xml
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
SoftInstall/About/EventForwarding.xml
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
SoftInstall/About/ExternalBoot.xml
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
SoftInstall/About/ExternalBoot.xml
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
SoftInstall/About/FileSys.xml
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
SoftInstall/About/FileSys.xml
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
SoftInstall/About/SkyDrive.xml
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
SoftInstall/About/SkyDrive.xml
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
SoftInstall/About/WinCal.xml
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
SoftInstall/About/WinCal.xml
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
SoftInstall/About/WorkplaceJoin.xml
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
SoftInstall/About/WorkplaceJoin.xml
Resource
win10v2004-20220901-en
Behavioral task
behavioral17
Sample
SoftInstall/About/en-US/ActiveXInstallService.xml
Resource
win7-20221111-en
Behavioral task
behavioral18
Sample
SoftInstall/About/en-US/ActiveXInstallService.xml
Resource
win10v2004-20221111-en
Behavioral task
behavioral19
Sample
SoftInstall/About/en-US/AddRemovePrograms.xml
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
SoftInstall/About/en-US/AddRemovePrograms.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
SoftInstall/About/en-US/AppCompat.xml
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
SoftInstall/About/en-US/AppCompat.xml
Resource
win10v2004-20220901-en
Behavioral task
behavioral23
Sample
SoftInstall/About/en-US/AppXRuntime.xml
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
SoftInstall/About/en-US/AppXRuntime.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
SoftInstall/About/en-US/AppxPackageManager.xml
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
SoftInstall/About/en-US/AppxPackageManager.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
SoftInstall/About/en-US/AttachmentManager.xml
Resource
win7-20221111-en
Behavioral task
behavioral28
Sample
SoftInstall/About/en-US/AttachmentManager.xml
Resource
win10v2004-20220901-en
Behavioral task
behavioral29
Sample
SoftInstall/About/en-US/AuditSettings.xml
Resource
win7-20221111-en
Behavioral task
behavioral30
Sample
SoftInstall/About/en-US/AuditSettings.xml
Resource
win10v2004-20221111-en
Behavioral task
behavioral31
Sample
SoftInstall/About/en-US/AutoPlay.xml
Resource
win7-20221111-en
Behavioral task
behavioral32
Sample
SoftInstall/About/en-US/AutoPlay.xml
Resource
win10v2004-20221111-en
General
-
Target
SoftInstall/About/SkyDrive.xml
-
Size
2KB
-
MD5
a94642be85e83bd11fe2edc8ee57a052
-
SHA1
cce07bcc7dbe8bfef8f9397c8b6e76b96ddc9aa9
-
SHA256
da3489644a56924340c30ba06dca8d02ac68a772c1971ebeedfb07767ea6f1ee
-
SHA512
cfe4f318b08c3924c51eb679541b3a8d8d36cb47ffb5ebd9d979d254c1cba8782dfd8757f748944967392608dcc1775fdf82b9324b03481314b1f661a085b733
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000256ed27e8919d04f83812f84ee5c95da00000000020000000000106600000001000020000000128af1e753af3b296aef51a1c075f889b2a4acb1fb7ec86923a462a05ba5bd7a000000000e8000000002000020000000ab7b92928b2c276821590f37f2c45243eacad09bbc0ec3bce2632d8838fc4286200000003985c718ba160bdb4c154fd21036f62adaa7bca4d31fae4d908484cb626bbb6740000000f8337337c9b592f5d6b82cb981f9521fe86c1ba1329817c6e87d39f8212ad4debb8e65434fb66d309ba423da1467b4b5660b2e9c64a66dd0a77e850c25f3f26f IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4ACB5B71-7852-11ED-A955-CA7A4AEEC1E8} = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0413a225f0cd901 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000256ed27e8919d04f83812f84ee5c95da00000000020000000000106600000001000020000000f80a089b57b20b86dea2673874e960dbfbe2f2db5ae9e903ab997c548da92721000000000e8000000002000020000000c2a9bc223d8961190e8420a4bc5b3a22275a0725b2e4a22d25f0506da1c935bd9000000000e3ed859c0480e73dd3e82682e450d123fc188d43d5aaf7c8c9909b47b5c1b797bd8a66488008a63361c5300f61c3409c80d9e60825a58771224190856cff5037cff8515a06c8551b46c40fbbeed4a943d2838b3e4e4823721e01d47ac184010f314894ca8d1027de1ef6d2f3292aec666e043256f9b57dd0aee400509f4588f9b674ea1a81bf3dfdcc00e6122d4b35400000007ee73be82dc070b4652f1ff238e229580bf52fbc4fbc0b0d9da6eb8eb4ff2c6fcc5fc0023942416e5f7c9e372af7ad3e7e94e45437bd3088b49125dae822bd67 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377418026" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid process 1672 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEpid process 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE 1876 IEXPLORE.EXE 1876 IEXPLORE.EXE 1876 IEXPLORE.EXE 1876 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
MSOXMLED.EXEiexplore.exeIEXPLORE.EXEdescription pid process target process PID 1292 wrote to memory of 1484 1292 MSOXMLED.EXE iexplore.exe PID 1292 wrote to memory of 1484 1292 MSOXMLED.EXE iexplore.exe PID 1292 wrote to memory of 1484 1292 MSOXMLED.EXE iexplore.exe PID 1292 wrote to memory of 1484 1292 MSOXMLED.EXE iexplore.exe PID 1484 wrote to memory of 1672 1484 iexplore.exe IEXPLORE.EXE PID 1484 wrote to memory of 1672 1484 iexplore.exe IEXPLORE.EXE PID 1484 wrote to memory of 1672 1484 iexplore.exe IEXPLORE.EXE PID 1484 wrote to memory of 1672 1484 iexplore.exe IEXPLORE.EXE PID 1672 wrote to memory of 1876 1672 IEXPLORE.EXE IEXPLORE.EXE PID 1672 wrote to memory of 1876 1672 IEXPLORE.EXE IEXPLORE.EXE PID 1672 wrote to memory of 1876 1672 IEXPLORE.EXE IEXPLORE.EXE PID 1672 wrote to memory of 1876 1672 IEXPLORE.EXE IEXPLORE.EXE
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\SoftInstall\About\SkyDrive.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1672 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1876
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
601B
MD5385a55b1f2616070b7c7c7f500685d8f
SHA16ffa5e50b78a1dff929c2f8ab53e63bca97b5ae4
SHA256a17f86253be3ca8254920a58bf8e8953e3abbff3c205687031b0cddd0e207751
SHA5121a7d9efd23f97da9dc10d5cc271628bb169837baa092825c12fad745c3b569afba027916fd807708729ea861641b7242115367be5f81e1fa96041c5c082528ab