Analysis
-
max time kernel
113s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2023, 07:02
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://6/8b2d4658da988296b8342b6a5da4c57a45a574100136022802300343d3c0b53ae402439cff7860562ae174b99db2680013602280230034dcac1edbecd628084db847fe94f2774c4fcc08430136022802300346b2b41a4cd7d022e0faa5dd8d31f88425be77a7d013602280230034/remkus?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EacoybST-4HpC-TI2g-p1BC-FKd1zwWsCZRV_EuGDzmFwLSAtT2eWOPcoU0ZdN4pMaRfQngJVb6Yh1riB5xsI3ys6FrwR5Q2uk3TdiLKOB04H8CMmEaYJ9bqopVfjeAcXhIStgP7W1w7jeGCrIstnQoYUuHa6JN5Ec8XlApb0mkLMz9yTBSW4hOxKvf&data=c3VyYWouZ2Fpa3dhZEBoaXRhY2hpZW5lcmd5LmNvbQ==&isok=y
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
http://6/8b2d4658da988296b8342b6a5da4c57a45a574100136022802300343d3c0b53ae402439cff7860562ae174b99db2680013602280230034dcac1edbecd628084db847fe94f2774c4fcc08430136022802300346b2b41a4cd7d022e0faa5dd8d31f88425be77a7d013602280230034/remkus?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EacoybST-4HpC-TI2g-p1BC-FKd1zwWsCZRV_EuGDzmFwLSAtT2eWOPcoU0ZdN4pMaRfQngJVb6Yh1riB5xsI3ys6FrwR5Q2uk3TdiLKOB04H8CMmEaYJ9bqopVfjeAcXhIStgP7W1w7jeGCrIstnQoYUuHa6JN5Ec8XlApb0mkLMz9yTBSW4hOxKvf&data=c3VyYWouZ2Fpa3dhZEBoaXRhY2hpZW5lcmd5LmNvbQ==&isok=y
Resource
win10v2004-20221111-en
General
-
Target
http://6/8b2d4658da988296b8342b6a5da4c57a45a574100136022802300343d3c0b53ae402439cff7860562ae174b99db2680013602280230034dcac1edbecd628084db847fe94f2774c4fcc08430136022802300346b2b41a4cd7d022e0faa5dd8d31f88425be77a7d013602280230034/remkus?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EacoybST-4HpC-TI2g-p1BC-FKd1zwWsCZRV_EuGDzmFwLSAtT2eWOPcoU0ZdN4pMaRfQngJVb6Yh1riB5xsI3ys6FrwR5Q2uk3TdiLKOB04H8CMmEaYJ9bqopVfjeAcXhIStgP7W1w7jeGCrIstnQoYUuHa6JN5Ec8XlApb0mkLMz9yTBSW4hOxKvf&data=c3VyYWouZ2Fpa3dhZEBoaXRhY2hpZW5lcmd5LmNvbQ==&isok=y
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "380361952" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31008549" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{AFDC19C8-9318-11ED-BF5F-6EDF9685419A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31008549" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2221920452" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2221920452" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2243951516" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31008549" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4668 iexplore.exe 4668 iexplore.exe 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4668 wrote to memory of 2192 4668 iexplore.exe 79 PID 4668 wrote to memory of 2192 4668 iexplore.exe 79 PID 4668 wrote to memory of 2192 4668 iexplore.exe 79
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://6/8b2d4658da988296b8342b6a5da4c57a45a574100136022802300343d3c0b53ae402439cff7860562ae174b99db2680013602280230034dcac1edbecd628084db847fe94f2774c4fcc08430136022802300346b2b41a4cd7d022e0faa5dd8d31f88425be77a7d013602280230034/remkus?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EacoybST-4HpC-TI2g-p1BC-FKd1zwWsCZRV_EuGDzmFwLSAtT2eWOPcoU0ZdN4pMaRfQngJVb6Yh1riB5xsI3ys6FrwR5Q2uk3TdiLKOB04H8CMmEaYJ9bqopVfjeAcXhIStgP7W1w7jeGCrIstnQoYUuHa6JN5Ec8XlApb0mkLMz9yTBSW4hOxKvf&data=c3VyYWouZ2Fpa3dhZEBoaXRhY2hpZW5lcmd5LmNvbQ==&isok=y1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4668 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2192
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5c095652a90450f6e9ed5dbdcb1f7e807
SHA1e751b539a52150785c0740d444aa759331b985aa
SHA2567dc466e98f2432c283d67159d100a79c1440e6fd132a9b8aa493cc26f8ff1181
SHA512aa00b805ac890c08dc5eb6cd2cd78385e1b0f4228f1ec1466bf6c203ba3359710539f78a11bca7421e55ad55e6eedafbcefbaecfe7345b56b4beffe6ff57875a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD54478752ea6b03a6be1f5cd2e0faca16c
SHA175d7182a1561790f745328567b4075181f00ae80
SHA256970c20fb3bfda055d418bc2a4f59c654e50eb65fe16af4aa278f9bc2bf447a6a
SHA5128f7872619495536588c7e896f9a9ddecfc93ca71b6e1d8da72b326d04c006c67038b4cc875ff78c49568f2b82f8b66200451a17027628020ffa062b3b2d5ec8b