Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-02-2023 09:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.profitabledisplaycontent.com
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
http://www.profitabledisplaycontent.com
Resource
win10v2004-20221111-en
General
-
Target
http://www.profitabledisplaycontent.com
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "382098768" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eace164d9187ae4195a94d18acd191fb0000000002000000000010660000000100002000000006bb7194f620edd6a501c1721412f6016c059eb1a54cf1caeb1ec9d9951b4eca000000000e8000000002000020000000d540dce9e5cc1e2470d666228ebee84f167a48c0156a836da8fb3c0810b9c9d920000000e310d5d376f1a87da4d8cb039a804f2071540c30a4151c66b83e4fabaf4f51fb400000007602e0958a203aca05f19d03f569a6d4847fa7f0d41084466e8dfa56a31d1cd4a54b6cd06026ab4e0bfab1cf894ae030e284d3d758bf6b38ff012368a68170b0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{87DF8791-A2E4-11ED-84FB-6AB3F8C7EA51} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 800ec562f136d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1884 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1884 iexplore.exe 1884 iexplore.exe 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1884 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1884 wrote to memory of 1652 1884 iexplore.exe 28 PID 1884 wrote to memory of 1652 1884 iexplore.exe 28 PID 1884 wrote to memory of 1652 1884 iexplore.exe 28 PID 1884 wrote to memory of 1652 1884 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.profitabledisplaycontent.com1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1884 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1652
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442
Filesize1KB
MD547f04bce6176beec9a4d5412bbd6c517
SHA1082f77e0cd435dbfb393983cd6ea20ba118055e8
SHA256770cb5bdb4f4d85b6d00f9cda803e754ccdc322bae9c0813dba0ae19461e7148
SHA5125027d17e46c94766ad5b0905bb1f1879fb77f3341a343bd10d2ff774ae6f9b416e7d3bf55c4a3b6583c596a690949590a90a372c66e2a4baac0ceda0721f631d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442
Filesize416B
MD5b96025aa81571e14136625f62473f3f7
SHA19252d7b969202a6edcc53dac50231e36959830ca
SHA25623bc2860a2d63bf7c99e8c9e01853b3515c758d3c22cb72a490a9ea656cffe2c
SHA512f65f031665fea56f821216ad7943ea16c8835c7ca8a3a4809acaca8584ff24ef3fe81ff0b10cb0a1a784c63ed1195ec47d64c7736e620539f943ef27907472df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD5f6ad6933f4eda98080dce2288d9b75ca
SHA1e43bee9dbf4142dab0fa27fbe76680ea141ab34a
SHA25622efdbe423fc1dee3a29b4b0807dea93df39a97b68861424b377bce37a8e50f2
SHA5126be76845313807edfae1749d356fbae1307f5b64c0ccbfe2eca83d1a1a581a7c6b96019e491eb09e13cc98f49a500d704f82790ec5e1ae30c80f3a299d6eedc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD57531f202518f025428e20baad1be3daf
SHA19cb142426640ae72d6e9e66e3c779d98d655b53e
SHA256d02a5bf9fcc1472742daa4ad8f105c13f702798c5adfc507b239d2ab2208c288
SHA5121a4179fc7e4179545feaf218885ca17517d734f62c2e7d81315acc9454e8928b61032f9abceef6cd9e273cf34812aec5e7414f463498a7b7ce84813d2232f2c7
-
Filesize
9KB
MD5353cfe511d0708f5cc66ce2c380f9cd9
SHA151aaac79a4db804f3ce48424e49243ed14215237
SHA256b4b9435598cf2fe99717a8f48343852c0b6ffe02ccad2b63a49ba3ef4656d59d
SHA512e336bd1fbf8c34c040445d48cec07ae63ea277c6d0a5cbc2ce05a27e0c8a96fa93c4d6cda511ada4bfe5cc57ea46d7f2cd8d1887c27f0a978def9e2bd0c49746
-
Filesize
18KB
MD504e8124fa64e34d87d8ce0de7b4ae2db
SHA131414f0d8519f27885eb9b96d7fcf5b506144dfa
SHA256102c3b3719fd3266912ae541c927435ac0dbf5312448a6846f30167a51e6d43d
SHA5121c27ae79a39f925ae36bbfdff8920dcb5975e7c0142e465c3deb94465bc66eaa8d025430d0d4d1469bf2c3843058aec0a86138aaa297f2a0d9190bec1b08e192
-
Filesize
18KB
MD504e8124fa64e34d87d8ce0de7b4ae2db
SHA131414f0d8519f27885eb9b96d7fcf5b506144dfa
SHA256102c3b3719fd3266912ae541c927435ac0dbf5312448a6846f30167a51e6d43d
SHA5121c27ae79a39f925ae36bbfdff8920dcb5975e7c0142e465c3deb94465bc66eaa8d025430d0d4d1469bf2c3843058aec0a86138aaa297f2a0d9190bec1b08e192
-
Filesize
24KB
MD5f7fab70b72b3bb83b1d09b999702a5b5
SHA169158b81a4149b1a254d85364652a744062c2f10
SHA2562fcb8d4b5ac8233af8683abbb70ca4c23bd382d9052d3f25cf2e7d2596aadc6e
SHA512d5dc64bdd50ded14581dc779570d1ec9819879d65d60569a090416ba6b13e66482cb2b6edce9264e60df39ceec10fde362a497bb5e670ac0c654a03e5a86777c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BG9XQTG0\favicon[1].ico
Filesize5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563
-
Filesize
604B
MD56a3d03c827020954f3588e1cd1ff2b55
SHA19ab3b1b553d2f510578735c4298d4ccfaf24f154
SHA2569bd0cdfd8e28833fba1c3da1fa3b4c752714aa6cd506ddcfb37b1c01bf9249e7
SHA51267bffa2a35d9f58e84c207dfe597dc99ca5e5f46b47cf7753d4edde1e7cd04ea00c6226f30af8831ee9cf1b58d95ce7c66ab7dd0ceeeed517c22f261a38eae7c