Overview
overview
1Static
static
var/www/ht...eex.js
windows7-x64
1var/www/ht...eex.js
windows10-2004-x64
1var/www/ht...eex.js
windows7-x64
1var/www/ht...eex.js
windows10-2004-x64
1var/www/ht...dex.js
windows7-x64
1var/www/ht...dex.js
windows10-2004-x64
1var/www/ht...t.html
windows7-x64
1var/www/ht...t.html
windows10-2004-x64
1var/www/ht...b.html
windows7-x64
1var/www/ht...b.html
windows10-2004-x64
1var/www/ht...v.html
windows7-x64
1var/www/ht...v.html
windows10-2004-x64
1var/www/ht...n.html
windows7-x64
1var/www/ht...n.html
windows10-2004-x64
1var/www/ht...6.html
windows7-x64
1var/www/ht...6.html
windows10-2004-x64
1var/www/ht...ent.js
windows7-x64
1var/www/ht...ent.js
windows10-2004-x64
1var/www/ht...s.html
windows7-x64
1var/www/ht...s.html
windows10-2004-x64
1var/www/ht...g.html
windows7-x64
1var/www/ht...g.html
windows10-2004-x64
1var/www/ht...t.html
windows7-x64
1var/www/ht...t.html
windows10-2004-x64
1var/www/ht...b.html
windows7-x64
1var/www/ht...b.html
windows10-2004-x64
1var/www/ht...v.html
windows7-x64
1var/www/ht...v.html
windows10-2004-x64
1var/www/ht...ent.js
windows7-x64
1var/www/ht...ent.js
windows10-2004-x64
1var/www/ht...04.xml
windows7-x64
1var/www/ht...04.xml
windows10-2004-x64
1Analysis
-
max time kernel
98s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-12-2022 08:33
Static task
static1
Behavioral task
behavioral1
Sample
var/www/html/tata-pravesh/public/images/indeeex.js
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
var/www/html/tata-pravesh/public/images/indeeex.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
var/www/html/tata-pravesh/public/images/indeex.js
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
var/www/html/tata-pravesh/public/images/indeex.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
var/www/html/tata-pravesh/public/images/index.js
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
var/www/html/tata-pravesh/public/images/index.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/_css/._myscarlet.html
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/_css/._myscarlet.html
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/_css/._myscarletMob.html
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/_css/._myscarletMob.html
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/_css/._nav.html
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/_css/._nav.html
Resource
win10v2004-20220901-en
Behavioral task
behavioral13
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/._logon.html
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/._logon.html
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/._logon4bd6.html
Resource
win7-20221111-en
Behavioral task
behavioral16
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/._logon4bd6.html
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/_banners/._AC_RunActiveContent.js
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/_banners/._AC_RunActiveContent.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/_images/._icon_lockplus.html
Resource
win7-20220901-en
Behavioral task
behavioral20
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/_images/._icon_lockplus.html
Resource
win10v2004-20221111-en
Behavioral task
behavioral21
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/images/._input_bg.html
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/customercare/images/._input_bg.html
Resource
win10v2004-20221111-en
Behavioral task
behavioral23
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/_css/myscarlet.html
Resource
win7-20221111-en
Behavioral task
behavioral24
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/_css/myscarlet.html
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/_css/myscarletMob.html
Resource
win7-20220901-en
Behavioral task
behavioral26
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/_css/myscarletMob.html
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/_css/nav.html
Resource
win7-20221111-en
Behavioral task
behavioral28
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/_css/nav.html
Resource
win10v2004-20221111-en
Behavioral task
behavioral29
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/customercare/_banners/AC_RunActiveContent.js
Resource
win7-20221111-en
Behavioral task
behavioral30
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/customercare/_banners/AC_RunActiveContent.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/customercare/_fonts/myScarlet20170504.xml
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
var/www/html/tata-pravesh/public/images/login/www.scarlet.be/customercare/_fonts/myScarlet20170504.xml
Resource
win10v2004-20220901-en
General
-
Target
var/www/html/tata-pravesh/public/images/login/__MACOSX/www.scarlet.be/_css/._myscarletMob.html
-
Size
268B
-
MD5
4b74ae26794fb01895816b92c953567c
-
SHA1
53fa5eed11be101ca99a131a79800b315b30ab50
-
SHA256
d40b707f2114ce0f11a0ca4f233aa3774df4ddeb41bd580fb7121f65bcfde536
-
SHA512
267691ba4ad834507fadeaea845434f63e552b8d14f82c166228e02b6f67b503515eddedbc6ceef9518011145c9c7c095336715aaff3f6e2c8ea603176140fd3
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FAEB6C41-836D-11ED-8553-72598884447E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "378639366" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 403697d07a17d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000256ed27e8919d04f83812f84ee5c95da00000000020000000000106600000001000020000000da50e0ab87d209c860e9183777e0fbcb59fe06d56a4f10690b64a7d8df9c57bb000000000e80000000020000200000004b885e3257bb6ada42257230427f62a01debeaaa2a1604cd2c880603db65a213200000009790f1e3097464b33d428ff87877fc298e7c207bc82bb7afbf5ee3ec9cc2debb40000000883a3c6a889bee0ef446bd9032911d5d6204b2c6f0b2017a4ca7170262cdb09dfb478ea8980a5692c89d2598a3a9168923c0ef1ce8ba2e3fa566d69da6b15bfe iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1292 iexplore.exe 1292 iexplore.exe 1068 IEXPLORE.EXE 1068 IEXPLORE.EXE 1068 IEXPLORE.EXE 1068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1292 wrote to memory of 1068 1292 iexplore.exe IEXPLORE.EXE PID 1292 wrote to memory of 1068 1292 iexplore.exe IEXPLORE.EXE PID 1292 wrote to memory of 1068 1292 iexplore.exe IEXPLORE.EXE PID 1292 wrote to memory of 1068 1292 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\var\www\html\tata-pravesh\public\images\login\__MACOSX\www.scarlet.be\_css\._myscarletMob.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1292 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\H5QR3D2V.txtFilesize
601B
MD5db8bd03ad3578bef5a56eb32ac8940ac
SHA18aa580ff224c109265d33e2f0f53dc4430d4967d
SHA256bcaece6d7137ef1607769e1dbc4c7707cc813b4be0e041d41c65ba5d268d6b09
SHA512c1ad502f772ccccdfa2207ccbcd2da7133026f0d405d3c871d9ee59b17466be57aa551a0cbe4d0a11bde66c4f47a57b4ab224a60fe44646b3c2666249fd4f559