Overview
overview
1Static
static
var/www/ht...eex.js
windows7-x64
1var/www/ht...eex.js
windows10-2004-x64
1var/www/ht...eex.js
windows7-x64
1var/www/ht...eex.js
windows10-2004-x64
1var/www/ht...dex.js
windows7-x64
1var/www/ht...dex.js
windows10-2004-x64
1var/www/ht...t.html
windows7-x64
1var/www/ht...t.html
windows10-2004-x64
1var/www/ht...b.html
windows7-x64
1var/www/ht...b.html
windows10-2004-x64
1var/www/ht...v.html
windows7-x64
1var/www/ht...v.html
windows10-2004-x64
1var/www/ht...n.html
windows7-x64
1var/www/ht...n.html
windows10-2004-x64
1var/www/ht...6.html
windows7-x64
1var/www/ht...6.html
windows10-2004-x64
1var/www/ht...ent.js
windows7-x64
1var/www/ht...ent.js
windows10-2004-x64
1var/www/ht...s.html
windows7-x64
1var/www/ht...s.html
windows10-2004-x64
1var/www/ht...g.html
windows7-x64
1var/www/ht...g.html
windows10-2004-x64
1var/www/ht...t.html
windows7-x64
1var/www/ht...t.html
windows10-2004-x64
1var/www/ht...b.html
windows7-x64
1var/www/ht...b.html
windows10-2004-x64
1var/www/ht...v.html
windows7-x64
1var/www/ht...v.html
windows10-2004-x64
1var/www/ht...ent.js
windows7-x64
1var/www/ht...ent.js
windows10-2004-x64
1var/www/ht...04.xml
windows7-x64
1var/www/ht...04.xml
windows10-2004-x64
1Analysis
-
max time kernel
97s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-12-2022 08:33
Static task
static1
Behavioral task
behavioral1
Sample
var/www/html/tata-pravesh/public/images/indeeex.js
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
var/www/html/tata-pravesh/public/images/indeeex.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
var/www/html/tata-pravesh/public/images/indeex.js
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
var/www/html/tata-pravesh/public/images/indeex.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
var/www/html/tata-pravesh/public/images/index.js
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
var/www/html/tata-pravesh/public/images/index.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/_css/._myscarlet.html
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/_css/._myscarlet.html
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/_css/._myscarletMob.html
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/_css/._myscarletMob.html
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/_css/._nav.html
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/_css/._nav.html
Resource
win10v2004-20220901-en
Behavioral task
behavioral13
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/._logon.html
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/._logon.html
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/._logon4bd6.html
Resource
win7-20221111-en
Behavioral task
behavioral16
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/._logon4bd6.html
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/_banners/._AC_RunActiveContent.js
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/_banners/._AC_RunActiveContent.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/_images/._icon_lockplus.html
Resource
win7-20220901-en
Behavioral task
behavioral20
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/_images/._icon_lockplus.html
Resource
win10v2004-20221111-en
Behavioral task
behavioral21
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/images/._input_bg.html
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/images/._input_bg.html
Resource
win10v2004-20221111-en
Behavioral task
behavioral23
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/_css/myscarlet.html
Resource
win7-20221111-en
Behavioral task
behavioral24
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/_css/myscarlet.html
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/_css/myscarletMob.html
Resource
win7-20220901-en
Behavioral task
behavioral26
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/_css/myscarletMob.html
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/_css/nav.html
Resource
win7-20221111-en
Behavioral task
behavioral28
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/_css/nav.html
Resource
win10v2004-20221111-en
Behavioral task
behavioral29
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/customercare/_banners/AC_RunActiveContent.js
Resource
win7-20221111-en
Behavioral task
behavioral30
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/customercare/_banners/AC_RunActiveContent.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/customercare/_fonts/myScarlet20170504.xml
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/customercare/_fonts/myScarlet20170504.xml
Resource
win10v2004-20220901-en
General
-
Target
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/._logon.html
-
Size
268B
-
MD5
977fe817a79c4b4a382624f6d39750f1
-
SHA1
abf97f50151478c40dffd6abaf01da70393b2578
-
SHA256
58d3065a22e5c4f535d06e14575952bb68f905d8d8280a01a44971a736ab1ca4
-
SHA512
f085d745f5f4da7501aa2c1923c7248e34c1d8e3ccc019790945d79f6e9512f72e53084c517087f8ce0ae42e46b440235fdd74d3457cbe282c16c469ecb0f0e5
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FAD43AC1-836D-11ED-9F20-E233F62F3A57} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 106e8fd07a17d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fbec07815684004d899a318f710de6af0000000002000000000010660000000100002000000093dbd26c25b21ce355b7ac6ddb00e5ab3d79cd0a3ac75d509514fe7178bbaa61000000000e8000000002000020000000ed9d6af27fcf3489797a738376ae4b02c48378e11a275a2c28a155691efde6cf200000008f0e491653f7c34c6ce2269c0c50d308ed6f9b1b6d0aebd9f305dcf2e7ae5b6b400000001fa49ee044de20d3ca42e407c28b0cbc3597d66b4ef8ebd068e3bf518d21b9d656e3c2de0f1701c67d54e7eb242fe3f3fa41c8a9ab4ceaf7831d5e43206b6eb3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fbec07815684004d899a318f710de6af000000000200000000001066000000010000200000004eefb25c74fe040c39982eca023f76c9ea0c096abd1ae6e0128119e0e34a5b74000000000e800000000200002000000071a3a658debbee209fce75717a18901979ac6449f57ca61436a3227c8a8447f5900000006cb99c5eab882a0de31526b491fec8023062cccfdbc9af37ba15728f36e1fd09de605fabada6c5cff7bdd51e4a9257bbbd643e6580e700797f862805a20ab1673261128f2adf2d63c6c8bd20735c034ad5b0d8f66dde33a6d47219c3b6c28528b208b1aedc1a5125f1a974e8cfcf3c4bb5b88c0d4553979a3e2ea4864fd969ec85cf1eeb1b82e5b2bb6246410695577040000000a5ca1f8f613f38d2a7f57e140edcb252023692a081a742fab0af38aa86fd25e39af59254416d0eb4e0e98e536dc0db6ac491b03e38b20c5938f8eec3ba3b43a2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "378639365" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 616 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 616 iexplore.exe 616 iexplore.exe 1108 IEXPLORE.EXE 1108 IEXPLORE.EXE 1108 IEXPLORE.EXE 1108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 616 wrote to memory of 1108 616 iexplore.exe IEXPLORE.EXE PID 616 wrote to memory of 1108 616 iexplore.exe IEXPLORE.EXE PID 616 wrote to memory of 1108 616 iexplore.exe IEXPLORE.EXE PID 616 wrote to memory of 1108 616 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\var\www\html\tata-pravesh\public\images\login\__MACOSX\www.scarlet.be\customercare\._logon.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:616 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1108
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
601B
MD565212129bcbe55cdae4c0a91db276afd
SHA174f8c7675615f43c8d6a9505bba7d996f0cf3554
SHA25608bdb3577c30933aca9f29664edea7b07dd6fcb061cf5bf33b50822784f8d7b3
SHA51261169f910a816a512f094f1896dbe188b9e981b91930005c89c4550cf88582af7948c386de43b08d0d576c122ffcadb8269ee96fd4c8eac58f759dde8f9d0c88