Overview
overview
1Static
static
var/www/ht...eex.js
windows7-x64
1var/www/ht...eex.js
windows10-2004-x64
1var/www/ht...eex.js
windows7-x64
1var/www/ht...eex.js
windows10-2004-x64
1var/www/ht...dex.js
windows7-x64
1var/www/ht...dex.js
windows10-2004-x64
1var/www/ht...t.html
windows7-x64
1var/www/ht...t.html
windows10-2004-x64
1var/www/ht...b.html
windows7-x64
1var/www/ht...b.html
windows10-2004-x64
1var/www/ht...v.html
windows7-x64
1var/www/ht...v.html
windows10-2004-x64
1var/www/ht...n.html
windows7-x64
1var/www/ht...n.html
windows10-2004-x64
1var/www/ht...6.html
windows7-x64
1var/www/ht...6.html
windows10-2004-x64
1var/www/ht...ent.js
windows7-x64
1var/www/ht...ent.js
windows10-2004-x64
1var/www/ht...s.html
windows7-x64
1var/www/ht...s.html
windows10-2004-x64
1var/www/ht...g.html
windows7-x64
1var/www/ht...g.html
windows10-2004-x64
1var/www/ht...t.html
windows7-x64
1var/www/ht...t.html
windows10-2004-x64
1var/www/ht...b.html
windows7-x64
1var/www/ht...b.html
windows10-2004-x64
1var/www/ht...v.html
windows7-x64
1var/www/ht...v.html
windows10-2004-x64
1var/www/ht...ent.js
windows7-x64
1var/www/ht...ent.js
windows10-2004-x64
1var/www/ht...04.xml
windows7-x64
1var/www/ht...04.xml
windows10-2004-x64
1Analysis
-
max time kernel
113s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-12-2022 08:33
Static task
static1
Behavioral task
behavioral1
Sample
var/www/html/tata-pravesh/public/images/indeeex.js
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
var/www/html/tata-pravesh/public/images/indeeex.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
var/www/html/tata-pravesh/public/images/indeex.js
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
var/www/html/tata-pravesh/public/images/indeex.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
var/www/html/tata-pravesh/public/images/index.js
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
var/www/html/tata-pravesh/public/images/index.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/_css/._myscarlet.html
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/_css/._myscarlet.html
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/_css/._myscarletMob.html
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/_css/._myscarletMob.html
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/_css/._nav.html
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/_css/._nav.html
Resource
win10v2004-20220901-en
Behavioral task
behavioral13
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/._logon.html
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/._logon.html
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/._logon4bd6.html
Resource
win7-20221111-en
Behavioral task
behavioral16
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/._logon4bd6.html
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/_banners/._AC_RunActiveContent.js
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/_banners/._AC_RunActiveContent.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/_images/._icon_lockplus.html
Resource
win7-20220901-en
Behavioral task
behavioral20
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/_images/._icon_lockplus.html
Resource
win10v2004-20221111-en
Behavioral task
behavioral21
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/images/._input_bg.html
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/images/._input_bg.html
Resource
win10v2004-20221111-en
Behavioral task
behavioral23
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/_css/myscarlet.html
Resource
win7-20221111-en
Behavioral task
behavioral24
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/_css/myscarlet.html
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/_css/myscarletMob.html
Resource
win7-20220901-en
Behavioral task
behavioral26
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/_css/myscarletMob.html
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/_css/nav.html
Resource
win7-20221111-en
Behavioral task
behavioral28
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/_css/nav.html
Resource
win10v2004-20221111-en
Behavioral task
behavioral29
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/customercare/_banners/AC_RunActiveContent.js
Resource
win7-20221111-en
Behavioral task
behavioral30
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/customercare/_banners/AC_RunActiveContent.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/customercare/_fonts/myScarlet20170504.xml
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/customercare/_fonts/myScarlet20170504.xml
Resource
win10v2004-20220901-en
General
-
Target
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/._logon4bd6.html
-
Size
268B
-
MD5
50436ff8f1aa07d0d5b9d56e4c924555
-
SHA1
2fc4765e5ae30ae5ffbcad937754cad7b866c67a
-
SHA256
06f06bafebd5c6b4c420aac457d67c824aae9f3c41318300bec5bef5c43ac444
-
SHA512
0f757ee59d296f12a40b9a34cd584c01e083dad662a6f5decbe12119ce453ebccc04a15c556006d89157ec3ef45c1bb51c27a682a8b4e75bac54507f720f36ec
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20890ed17a17d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "378639382" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FB6C8321-836D-11ED-9431-E233F62F3A57} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000256ed27e8919d04f83812f84ee5c95da00000000020000000000106600000001000020000000fb92cf95693903ed0f49d006b437f60cf26132597415f1b66184c076fd23e213000000000e80000000020000200000006187683b68407e33af46023dffdb02b329e0b4c61ec6153f7903ba34810c640f2000000032d4e6625cd14329beef1ac283acf4f20529e81871387ee8a6b20efe05c58aa34000000097639943c0242726dae043f4df58d2619b07075c1014604bba0a4f4d02e877e7359f54530fa0c1631ffeb7f7955ab2843b4a167ed132c5f76092532feca584c5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2000 iexplore.exe 2000 iexplore.exe 588 IEXPLORE.EXE 588 IEXPLORE.EXE 588 IEXPLORE.EXE 588 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2000 wrote to memory of 588 2000 iexplore.exe IEXPLORE.EXE PID 2000 wrote to memory of 588 2000 iexplore.exe IEXPLORE.EXE PID 2000 wrote to memory of 588 2000 iexplore.exe IEXPLORE.EXE PID 2000 wrote to memory of 588 2000 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\var\www\html\tata-pravesh\public\images\login\__MACOSX\www.scarlet.be\customercare\._logon4bd6.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\EOAU4KXZ.txtFilesize
601B
MD5256c298663b59bad4336e39863241a05
SHA1a11c4124064b11844dbf880ce348618520eb5565
SHA2565f2e4c233f5d119056c2cbf7903f1a8b9988c83404d9b13d46bfd060ec800a70
SHA5122b7da9c4486d40ec2e3be1d092f36ce5c3929eaa571eebe1580950ecefb9e33da77128f91d1ca1c850dc1d46c3590b49507f474a1a081316397578c0f3459b66