Analysis
-
max time kernel
144s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-01-2023 10:53
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.office.com/?auth=2&login_hint=nikita.chroesjtsjov@triaxknm.nl&from=AdminCenterEmail
Resource
win7-20221111-en
General
Malware Config
Signatures
-
TTPs:
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "381412699" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 107977f4b330d901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000256ed27e8919d04f83812f84ee5c95da00000000020000000000106600000001000020000000f56e1ad7c81ad8e7b7632921cdbb6b553cc0429d5fd7f8a376295dd346af49a2000000000e8000000002000020000000a98c1ab26edc40843e6898ea65728a255e04cf8c62700b9954b6d127e33638e2200000005ee2798b6217808c719f3967343aea7e080ac88e41e4fbc47b6df37e4512e47740000000534e2a96a58da5b597c126b9a906b14ceb00fdae78ca7a0b9fe000a0897eac50c9341db8c75fa1858a659bb64eea9c1caab75633cef3dc136eb02da30ae04290 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{26DA8501-9CA7-11ED-B5FD-C6AD45B766F5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow ⋅ 1 IoCs
Processes:
iexplore.exepid process 1468 iexplore.exe -
Suspicious use of SetWindowsHookEx ⋅ 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1468 iexplore.exe 1468 iexplore.exe 580 IEXPLORE.EXE 580 IEXPLORE.EXE 580 IEXPLORE.EXE 580 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory ⋅ 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1468 wrote to memory of 580 1468 iexplore.exe IEXPLORE.EXE PID 1468 wrote to memory of 580 1468 iexplore.exe IEXPLORE.EXE PID 1468 wrote to memory of 580 1468 iexplore.exe IEXPLORE.EXE PID 1468 wrote to memory of 580 1468 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.office.com/?auth=2&login_hint=nikita.chroesjtsjov@triaxknm.nl&from=AdminCenterEmailModifies Internet Explorer settingsSuspicious use of FindShellTrayWindowSuspicious use of SetWindowsHookExSuspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1468 CREDAT:275457 /prefetch:2Modifies Internet Explorer settingsSuspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Replay Monitor
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5ff56b6b9773f457dcf10a7f155d80a77
SHA10cbfa08454b65a06e1551738779be8bf3535736e
SHA256a6ab34e3d90d63ca2e0a83a2ce2768df570adf1fddf32d3878b646475eeed65d
SHA5124b1a251b34a3a758601b0bf6bbe4a117628f6644d3473b2f8abf85eb828dfa9cc424ec165fc309865b6b1d8a90b9a7cb114bd1668a483df5a693bb93849073d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD53d36f528075168c4ecc41a1be23bf521
SHA1bbf8a9436c1a39ee215b54f49981fd6ba675bc2d
SHA256f6aa13c50c6720c0fc1247a059bff0cc1907f44a8eb1ca2fdc5333f58038d49b
SHA5128d150056033f399a23b36723c64ac04491628db7d814e0b96237b56177b438f629542c7db84f550f3586ae1f66f0488ba05f49c4c15679e838f262991bd5153b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5ccd17648f452c5568059b770ac4403b8
SHA1cbf1411a90d5ec2f3bd2f3bdb9ef604174282e65
SHA256b95c61e73fc3956f6f1d2dee38a331d43a6152fadb96030c845b19c7cc1d3fba
SHA5128190f9410d38073c96af8d4ee0894774220a839089f559fdfd0bd89b6f5e45ec6101d63dffca0f3ad7385ae60c587fc71b73ec22c6fc64aa1b67e9791a95ca64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5a0353b65c10f2ac1ad73b8381f648e24
SHA10f8d065bbc800551f7707fdbdd2c005c529f41df
SHA2562591a4119ff7ec5351deb6124d76c0d66bf72ce0ea11b7bbdbfa20855b8e2bdb
SHA512d707804c7080861f13d7da4a551386bfbc18c131f6ffd5652413743e8319c6e923a102cb1f3773138b72817c02999ba44e24c49f4e60213aef61df299ef70902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5d70025f7aed844c6cc18f98ca04abbc6
SHA184e1411cdbfd74d01f47a6648a5b0c423883350c
SHA25602b7ea300f151ffcf3848b90aed13c121ff832299c594ce79cd1395d66c8ddec
SHA5121974d4b74d3664ce44496eda48e9efb1cba741f903e95a300dac5718cb002b056d48a24b275c6759973a32751a35d39fe0a557b55b89f5526a9ec9753ef1d672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5f50b84a60a1e4da22f097ce6fc5a716e
SHA129e43997b61b6812476590db037d0846d4f4b5bc
SHA2565f679dedddf734ae4b4f3e9c14ca2d9f1073118eb508cea1333ce694ed5f7c5d
SHA5121d03195a0eeca6e348df934456c4c7dbf56f956592db89b273347917695b105a59a7ef3a20be7b8674ac8bbcd31ebb905bac8d3458bd5c97f75d946e68cb8e9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD56554a0d061bad6237a58fba0b8fdac96
SHA13aecbc917fdb8c5eae4fee93dfe2ef1dfd372ffb
SHA256f12af04671a2d5f65be3d64c6bdbc8a8021f8e2c66b5f40ddfcc07ca62f71fca
SHA512edc20bfc7959478ea04b9d0693777545c7ef27468d32195cf7e0d19bb05d23f0bfeae92e17f2a44665f217011ec4ff06e25a4eff9580378e685eee832a6276cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD53ff02b46f3b310442f0e6c5c6b313d8f
SHA1c868476a2c61c8fee8a670268334af459f1e5147
SHA256dbab63e97a52d4da05602d38512bca26aa320cc40bf31d500169f8e66df146e2
SHA5126bb92ac5cb05afaade624a442661eba1498465725f012abc0f65fc3898290c97e357ed380834b0bc6643a325635f58917eb84a28fd01efb9de169e5e3fea125d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5eeaeae57107ce28d57d9da283ecb0133
SHA1f58d175f7a8c68f1cd78e3925e9bfbae5659bb37
SHA256d1c84238b0c646171229eab382eaab6106f476269fca12c3900e0be527ff7f0d
SHA512e944ed8544ba4a3283bcf0d03564c38d7da8e0b46e4a10e5228b1697d333542a7180e88d91e135df6375665860e83de633f08900c3d2f8872089d858e2cbaf89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5059404dc5e479eaf08572dbad65c7607
SHA15916147f26c8f4e23ed05f35f1215d7f2e0444d5
SHA25640f4916f4dab50905d048b0c65bb364e421d0be2396e84f3bbb3e29160239360
SHA51219dfc07004eb3dba62209a055a5ae03c9896dc2f18bd779c4e28cff21c2ee4cc72c8cddad4f66f458ae8cf2906cd8cabf16d7cdc570e07b107aa7ada24a22827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5bc691f6f8837effa0a19c29be68c49d5
SHA163685314040a98f4834bf2758e9d61daa3802783
SHA25612c098d7c68a9d59ff2ad2a3af433cf81082ddf78adacd52946e4c8853db2cc1
SHA5120f0ead461d06f0031f4813c5cb29d09e340716adfe17ee5e2db14555a8995cc6e28577554fff5227de0734550d8b1c01e24975888745712fcee4d18a6f24a3a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5513e2e9209955ab30efd8402811f9618
SHA1901dd01b53c9f4f5ca00ae7fd35f42fbe1991c66
SHA256286aa5462939271b64c79f0684f273cdbaf1b835ebc1c2b083390ca813eda272
SHA51200d2557405e03ed62f2e2b69ebf9eddb6ed9f23abf98e6d8ff9a59eaac78f10f26db7efabe28c1a16b953e4e43ed972e674cac1bdecf8070b450e619a6e69f52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD522864bc591dbdd995b604944ce242850
SHA1e75883e7912f546cbbad758411c4bdf4ed590255
SHA25681131c7b1899dd2140e3249bc665bb6838daf4e26e5903feabff369ba47ab6cf
SHA51268c056d02e60f9c403abe58a3c16f4e67c684d91f2b4b1fec6d7a0d39b5acf22b40f5660a00465cc8fbefcbe9abc4c8d0b9b46123525bc1d1abbf9118f09057b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5f72b5ff11e103f58ae277989443a4680
SHA14864375fbe7839f4d5335e19d8284900c20a9007
SHA256d8cc84f4101074e6c6ae506b0d5d58abf1eff38b1a2f89e16c1da434221f4908
SHA51255421e28020b09dec54dd1e2c487c96a8d27f21691f6a9f6483c4910942134cc051222c374cc30fb37cad5af1225f26306d002c86aa382ca2628ce59a5592070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD55c9a54079f85e0f5467a12d10a234348
SHA17229002812f8837f1304c32418f7f5482310bad9
SHA256492bda42f2afeaf7cd435e9613cab08138b6a84c2e39fcd0f0e88d218ec42b88
SHA512882625fea2762d9792e6aaa74faa594b382d12cf4766a36fcb678cedebefe468f35d3be9adbb49aed692d4fb23ada2144f2cb9d0f96e9d352cbdb9fb3de62d4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD59130fce6c34ce6502c7600d30870ca26
SHA100f022d3a66809c4db02e6e89192e3238c80fe5d
SHA256e003333aa9a33b7c58d2f2138fbb6342a7a3345a371281507bbcbd9c180c0a7a
SHA5124758971678e9f7c2842c8fa26944a376a6e91cb4e3ceaa9e53909580f71048ce91a242b067d645a339e1bcc95c38dee9a6ddb74bc861b350699afdaf6230d1da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD53553bee9f84174aca300a688ca3172b4
SHA1d74febb436b7fbaa04f3e03ecad0a07d1ded17fc
SHA2564b5d0c803290d08d14d49f99a633e69e3f995f683fa68454340777cd8affe2a8
SHA512e6e819617e50a6825269aed9aedfae5a9fe377b43559140d7f41e3d26098a67b163dddce063543eee12671eae8d8f139909ccfda3d7be6f7857fc2937a78c654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5f8a9864c5d5102fade2eb89a24a77358
SHA17c0799309b3fe3f5ee9b4ee12eebdd5399c9ef60
SHA256ff7c177a409d3dba4b640da5ac526b442252225a32bacacc0dccb471de1a15a1
SHA512846bd06f4efadab010ca52ba06302d74f1ad4a5f74d5392b3d77e6aca6babccc91bc41a58238fb68bfd6a4dc1ad475ab689e914cb2ac26e631842949fc39e79d
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\t9o3c8r\imagestore.datFilesize
18KB
MD5da7ea41a4ff23192713a3c98d3848195
SHA14ce5543709a28afc44fa9d64caad2142c4a78fb9
SHA256d2923ad850e15ca50d87c667394f3ce8c357fade1101b7f537e5967a809bf865
SHA512654eb23253b08f54a4b998d10972253969a6fa4229530425b2eb1820f465b17b7f6b7ba36b930df3351cc1dccd7698e5ac25f0835c1278aa846622d496f1be92
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7PSIXI0W.txtFilesize
601B
MD5c8c30a0bb63c10cb1d5eb1b14054fff0
SHA1cd823ec75fb5850703d8a471037f4d8d7eef4ef1
SHA256d7b9043622aa64a8d3be8289cf9fb17e4483ce1494531610f0bcd5bda950854b
SHA512cd17611aeae59d56244b628125bc70d0bc911a8a585f5b6c2edbc8d6de85bfe332e4ab4c55bff59ce081ca23b26b229811650bab661699353c8f9f4bccb333f8