Resubmissions
09/01/2023, 22:30
230109-2fbh3sbe4y 109/01/2023, 22:28
230109-2dqvzsga88 609/01/2023, 22:26
230109-2c1zkabe3y 1Analysis
-
max time kernel
68s -
max time network
69s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2023, 22:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1003339720304111729/1062133847103381504/LabyMod2.5.exe
Resource
win10v2004-20220901-en
General
-
Target
https://cdn.discordapp.com/attachments/1003339720304111729/1062133847103381504/LabyMod2.5.exe
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 384 4884 WerFault.exe 30 -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 89be75672cbed801 iexplore.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31007865" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3229844416" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31007865" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3229844416" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{0EF398AE-906D-11ED-A0EE-62142853BA25} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{EC029631-906C-11ED-A0EE-62142853BA25} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4884 iexplore.exe 3112 iexplore.exe 3112 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4884 iexplore.exe 4884 iexplore.exe 1204 IEXPLORE.EXE 1204 IEXPLORE.EXE 3112 iexplore.exe 3112 iexplore.exe 3624 IEXPLORE.EXE 3624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4884 wrote to memory of 1204 4884 iexplore.exe 82 PID 4884 wrote to memory of 1204 4884 iexplore.exe 82 PID 4884 wrote to memory of 1204 4884 iexplore.exe 82 PID 4884 wrote to memory of 4860 4884 iexplore.exe 86 PID 4884 wrote to memory of 4860 4884 iexplore.exe 86 PID 4884 wrote to memory of 4860 4884 iexplore.exe 86 PID 4884 wrote to memory of 2872 4884 iexplore.exe 91 PID 4884 wrote to memory of 2872 4884 iexplore.exe 91 PID 4884 wrote to memory of 2872 4884 iexplore.exe 91 PID 4884 wrote to memory of 3932 4884 iexplore.exe 93 PID 4884 wrote to memory of 3932 4884 iexplore.exe 93 PID 4884 wrote to memory of 3932 4884 iexplore.exe 93 PID 3112 wrote to memory of 3624 3112 iexplore.exe 100 PID 3112 wrote to memory of 3624 3112 iexplore.exe 100 PID 3112 wrote to memory of 3624 3112 iexplore.exe 100
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://cdn.discordapp.com/attachments/1003339720304111729/1062133847103381504/LabyMod2.5.exe1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4884 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1204
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4884 CREDAT:3224584 /prefetch:22⤵
- Modifies Internet Explorer settings
PID:4860
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4884 CREDAT:275462 /prefetch:22⤵
- Modifies Internet Explorer settings
PID:2872
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4884 CREDAT:3159064 /prefetch:22⤵
- Modifies Internet Explorer settings
PID:3932
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4884 -s 27482⤵
- Program crash
PID:384
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 420 -p 4884 -ip 48841⤵PID:3772
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1484
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\LabyMod2_5_exe.xdweesf.partial1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3112 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3624
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize1KB
MD5f3921b46901994a2514412af59f68131
SHA137e402a6cca9e27e77b1776c08c3cfccce2b31f2
SHA256c51437a91bff199779a053c56f7e634fb0c2d5db7902ae8938186a2a7ac4e075
SHA51269f0777adc17bc4ff2168efb454610cf608cf88fe5afdaea856b82dbfbe2cf87531744e86466cda20b193ba7b752670a0367e4879df754207dfc851deb6b3921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9FF67FB3141440EED32363089565AE60_5524823BD00A413DFC52CF245D9BF052
Filesize278B
MD56181f9bc766067c5e7e2354b99e57aca
SHA143124ca28526b9b4194b24a9f954426f2d7df428
SHA256317013c7223090d343e7e91847a6316004192a3fc42f50939345dabd2f6ed26a
SHA512e36e1e0873be78ce93e03504fb9e9720df9d7f566f71fcadfdd69cc4a057efbc8e6e8ea3ee7a6966c84de215042087e773602a77c521eca26f520fa083b7e57a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize408B
MD54e0998b22e67d4af25991caf88fd94cd
SHA17b1913edfa477114b9da3771430228632606e0c6
SHA256300925eb4e13376607641ba25f09313bb510f122af5362d1abf2a9aa7fca11b1
SHA51277ce97d0543e25486d1df9580376a812cf1c177c87620368a43838357e307f9d1a3d726d75d4e2ec843dd4382e1552dbea8bca9eeaf200d4dc9d5eca03dad9f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9FF67FB3141440EED32363089565AE60_5524823BD00A413DFC52CF245D9BF052
Filesize400B
MD57df0a88972402125e222e413a44f0a3c
SHA19d1b8e4e7fc1738009f0b319e32015cf4e54f988
SHA256dab44b52b1d53922d292b8c3fae208df0a84a007ec1ca985a82fae16f37abd64
SHA512c074f5795cf4c0afa46451339707c985bb48d87c1c7feb708babbe3fee1bd8016c630bd2e322e6e1f6d12f053c634b3abad564917fb8f0bc1624d39da1ae2dca
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{EC029631-906C-11ED-A0EE-62142853BA25}.dat
Filesize5KB
MD5de08079baa665bc7a34adf9089289016
SHA1af48cda157bbac200e07282f444ce78a7e8ab411
SHA2567997f3d9454b9f8c5a9eb2ffd30577d20df71578588e885ce624c4244b855019
SHA5120492b4f47599e65ab28b4165a82a3b29056b6323c8452cfeefdc8e5ec814c39632e7275afcecb582a7c58b130f9e2a2832eb13f9912a15c320dfd77e952ac11c
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{EC029633-906C-11ED-A0EE-62142853BA25}.dat
Filesize4KB
MD52148d61af2827f5b4930cc7a2adc91c4
SHA12009d04e18a9af57d8df25cdcc1e5c94792d7f97
SHA256919771fc7785ec8567d472bb4a74805517552494f9d7a821f46f3dfea09de44d
SHA5123a729937014a66fab94cc57778941b320448a8adac43ffc331db6e9539e4321fea12bb77e3e6f79b06ce1f0c3f2b68b68ee027d02af5bc7346fe0288098a34a4