Overview
overview
10Static
static
82d0d46d5-2...f6.eml
windows7-x64
52d0d46d5-2...f6.eml
windows10-2004-x64
3Mail Attachment.eml
windows7-x64
5Mail Attachment.eml
windows10-2004-x64
32022-06-29...on.pdf
windows7-x64
12022-06-29...on.pdf
windows10-2004-x64
12022-06-29...TR.pdf
windows7-x64
12022-06-29...TR.pdf
windows10-2004-x64
1email-plain-1.txt
windows7-x64
1email-plain-1.txt
windows10-2004-x64
1RE_ [SC27W...on.eml
windows7-x64
5RE_ [SC27W...on.eml
windows10-2004-x64
3Dlist.serv...rt.zip
windows7-x64
1Dlist.serv...rt.zip
windows10-2004-x64
12665187713...om.doc
windows7-x64
102665187713...om.doc
windows10-2004-x64
10email-html-1.html
windows7-x64
1email-html-1.html
windows10-2004-x64
1email-html-2.html
windows7-x64
1email-html-2.html
windows10-2004-x64
1email-html-3.html
windows7-x64
1email-html-3.html
windows10-2004-x64
1email-html-4.html
windows7-x64
1email-html-4.html
windows10-2004-x64
1email-plain-1.txt
windows7-x64
1email-plain-1.txt
windows10-2004-x64
1Analysis
-
max time kernel
100s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13-03-2023 07:30
Behavioral task
behavioral1
Sample
2d0d46d5-2f07-4223-612d-e119141337f6.eml
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2d0d46d5-2f07-4223-612d-e119141337f6.eml
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Mail Attachment.eml
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Mail Attachment.eml
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
2022-06-29_Circular_letter_CD_Consultation.pdf
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
2022-06-29_Circular_letter_CD_Consultation.pdf
Resource
win10v2004-20230221-en
Behavioral task
behavioral7
Sample
2022-06-29_Circular_letter_DTS_DPAS_DTR.pdf
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
2022-06-29_Circular_letter_DTS_DPAS_DTR.pdf
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
email-plain-1.txt
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
email-plain-1.txt
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
RE_ [SC27WG5] ZKP PWI and call for contribution.eml
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
RE_ [SC27WG5] ZKP PWI and call for contribution.eml
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
Dlist.server.uni-frankfurt.zip
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
Dlist.server.uni-frankfurt.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
26651877134168, United Kingdom.doc
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
26651877134168, United Kingdom.doc
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
email-html-1.html
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
email-html-1.html
Resource
win10v2004-20230221-en
Behavioral task
behavioral19
Sample
email-html-2.html
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
email-html-2.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
email-html-3.html
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
email-html-3.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
email-html-4.html
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
email-html-4.html
Resource
win10v2004-20230221-en
Behavioral task
behavioral25
Sample
email-plain-1.txt
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
email-plain-1.txt
Resource
win10v2004-20230220-en
General
-
Target
email-html-3.html
-
Size
720B
-
MD5
36b46d261735370ac92ee7a9c3183857
-
SHA1
be22c9d280eb8e48c0440a84844ace26def0b778
-
SHA256
3bfd28637a5db1338eb2d7d8c1be92f819157951b35780ec707fb80bb169d9c7
-
SHA512
c989545679f1757be4c8ad061283bd1dfd5eef82613b9e90d4c4958ce408260239eac64959bdc1a3fe66f06dd07098af290a98e63e3024ef751ba01071e51609
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B68F1F71-C179-11ED-9E5A-6E0AA2656971} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "385461378" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fba6cfbdd4578d48a4e75475bed73c6a0000000002000000000010660000000100002000000077f81578e3ae57ed8b989792d234f781d9adeafaa4840ee801291cd72bc4c655000000000e8000000002000020000000f49d0a2104bb92af73ae63809d8427c708fb1140e6c0631eaa34cfae2933d9bc2000000002af5e8d3bcb9f0e8dbf99a6266feb2e3cc9b877aabfeb18c50d7e193639a14240000000acf8d3c7a47b480008d63cee88d71da81c79574ea7aef2a99f355ceb3370afc843b2375df1f9585ea119471b6684f99e6f1574e91fb16420d4f5f72fcc3a7731 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80b89c8c8655d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1424 iexplore.exe 1424 iexplore.exe 1472 IEXPLORE.EXE 1472 IEXPLORE.EXE 1472 IEXPLORE.EXE 1472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1424 wrote to memory of 1472 1424 iexplore.exe IEXPLORE.EXE PID 1424 wrote to memory of 1472 1424 iexplore.exe IEXPLORE.EXE PID 1424 wrote to memory of 1472 1424 iexplore.exe IEXPLORE.EXE PID 1424 wrote to memory of 1472 1424 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\email-html-3.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1472
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f49ff0b7a79ae9adbb7ed131eed4af3a
SHA198468afd856cbbb6db00e2a97dfe7f62704264d9
SHA256acd88d4e8a9e8be5ae9cbd99e6be91be0aacbc627f813d4b26238617889e3f3c
SHA512e53bd28452b4b8015d112f679440e925e54ac10e51797bbf3f54b8ca6db301a2be1e970ad098029c67b14fd0328be01aca825ae2033e8f9b53938267aea7b978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4be3091114282a8a2402c19d77b4180
SHA16dada7bebfd18449d496b597437eb9d23d7ba33e
SHA256a0f043ed74892030b629c977926aec5cd312b2942119ed040a35239ba26683ca
SHA512e04fb1b63c3431fc373bb24515cb2d268256aa9a5706a26517182990442e5e82b3929d1a1572fac0b8f29a76b1af77a2660179cdd87e0cb1265cc707818b9368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b12bf0fc50654a2f1733689f44f546a
SHA160e5624ecec36265838a3d7a54ff83ac5263944e
SHA25675e8b49e1d35c5766973f6281c2465069b6744e9ac348be38c4dad0b1fd00270
SHA5122760f5275ea5316a036f150412466d0b283c21996a5b0caa9a4055d59672645b1b1283b401d44e0009d2a6e6a91b8ed2dd038cb11af85d3513efae1e51022b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d798c309815e1ab54737343dc2fd4ee6
SHA1f6daae97b7c1a451e8bc4f928c8ce993fa33e0f2
SHA2568b3981999bf8b220a4f8ca392cdf8c71b133707e3bbe0552227b5101acab416d
SHA51282f3d29b933ba622f85a49e6a7eb98cc496109949cf1806390aea924cd43340144bc6eb0473e15684f39102f7720df7561b359705d1e713741b391709d59e0a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556d1d91997b3f49a32f2e1bfef84520c
SHA1da6302fee7ac5c636dfb7a3a3d16992145537edf
SHA25648282ea0f14ac5b3ec0c886d50243bb139957d6fab6c32b8e2a136a079e675ef
SHA512905f7bee73a5563f3d5c46c6031f3aff1e039163b45de3b4ce5a72fd63ad7d1e38b3f1d6bb85f52bfa17fabfd3bea76b5306e23605c4b12b913dc68f26f8e38d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53baa3acddf51e29353c81747be07955b
SHA1e17805049e869d4d8b30199ccb6cec3b7dc604c7
SHA256b83d3af9b5aec40066824844e6064bf8a78ad7fee84ea3e66035e9310fd2b07e
SHA5122493250c692527caa66a719f7409e4e995eb433e6d385db43d1ef4d587285bb9eb74c7e9b07ed6324f47ab4135c6ef00319c223c05481ccf2b2c5e57eb7884f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538fcd8ca7a089c94965b70ce5a7bf5ce
SHA1c3613dd9534bd40d5adaf5dce2f6094d617100c9
SHA256c67fee0035bfcdd74a91b5df209b34902170c0f9837d9c7e74b0bf967a8b29d8
SHA51258053b2963202b9e7cbacb91c1bb1bda77ff5592f6c7bf9e8921fe024bb6b1d73e415ce8225ce39e5863dcaf6750fa704c26b84bf560bda11b389211ea06cca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5366a1a2565127af06aaf62f8926968d1
SHA1ec0221c7845f1eb427aec7b89f682e5433b4cd87
SHA2560b7b20ba2bb43aea407010668ad7cead21072f052bf63b6913b528c30a128268
SHA512bc03ae142c782541f61b117100eb40b191d88d02c0ca1b3b11c2dcee7c99a13e25fe7c1484c36b9ac2aa1749bfdcb9d65f3d04b928276128ff8c2f3c0115e6bc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ACT9UUKV\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
600B
MD564884737436694c29ac1aa80e9ec16df
SHA1fa77a1e41b7bd2350f6d4948509f79e2b593d048
SHA2566d5365f9b89d6e01051b2648d23599bfdb3a14ae530e4a9e0de852146650aece
SHA5122cc4396bc5de99834d702b7fbe4e4ea509752869fc2db59ae19d5504f1ead456b8d36d4cbaa18a95f79451d6b6cbc6b465b5d9e6b2e11caa083b88b65fbf9048