Analysis
-
max time kernel
69s -
max time network
76s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21/03/2023, 20:48
Static task
static1
Behavioral task
behavioral1
Sample
SCOTlABANK.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SCOTlABANK.html
Resource
win10v2004-20230221-en
General
-
Target
SCOTlABANK.html
-
Size
11KB
-
MD5
26ed30d23905cecae1fd736830415325
-
SHA1
c78963d3ddbb6537f7f8b90c081f3ce8726f2fec
-
SHA256
9227d66005bb476d3113325d395313b9d6260438dab016905d5a3960b463ffb0
-
SHA512
3ebcd1221af5a28d6b56d8f34cb9312c8f3e1eafa557913df5911418f3a689cb3c7a894dfb256e56f710abcc25b921c1707d8e8e03ea43a9410a72e8e9f6b96d
-
SSDEEP
192:O4ftRj+oPUDkG2pioA+00msyfRFRI4LIdvNUyYz+rinx0AEUy0nuUyC4tUygpLRK:JtRlUDepNA+NmsyfRFLkQ6ix0AVHtRNI
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c8a3886e844ee04ca528537b5bc458990000000002000000000010660000000100002000000003da164572e42fd0db4d1c6db9ab88c72e6e804c6b515e411e94a30567ddc906000000000e800000000200002000000076dc0b59130030f2600b62082ebed68eb5d0ff85ab273465678bbce5bd8a0f5b200000007ae3bcad8ec03d01b54fefcaf50c2eb337853becc7a1bc808c5a506137ff62ec40000000e19f52be1d09afd0f3dc4f15dfda877d011c353c5051453f1ee853ef12441ca21cab834d5293f8abc805bbd4a542e2f2fb2e1585e6e0d14b16b81862c1469446 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{30C0C0A1-C832-11ED-B1DF-CEF47884BE6D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 401eb60b3f5cd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "386200317" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 924 iexplore.exe 924 iexplore.exe 688 IEXPLORE.EXE 688 IEXPLORE.EXE 688 IEXPLORE.EXE 688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 924 wrote to memory of 688 924 iexplore.exe 28 PID 924 wrote to memory of 688 924 iexplore.exe 28 PID 924 wrote to memory of 688 924 iexplore.exe 28 PID 924 wrote to memory of 688 924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\SCOTlABANK.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:688
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534c162461d2e5761f1af1d2df6eebdb7
SHA126437b674a68b4365b481faa4b95249667770076
SHA256061e93e758b01e39ae37d5bd360dbaf50988f04198975267f1a9d093afdd34d2
SHA51257a8109ad1e7a31aa3100f98c12b9b5c71252cc06f4c5accf23cc46dd30fe9a62eb974dd4320ccd47a2c1320a5a993606f8f47469b574feca8a76aea354968b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532a615ab9d556526cec57fd891b3c11a
SHA1079d73e596bb99933923c4a7171692724587ff02
SHA2560207ee11f22d14e4d0df83e521e75c3981d635ebdf50d9b30879c9881f291a0c
SHA512ad4b57c414cae9e4d999988a407ab07703c72b00f9ed288d2ad42946ff8a6e59e4497a856f81d0c15072ad56df9fa32c7d786c2bd3f2dc5ca6a9c95f8a25fedf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570969cffbf5f970aa044e4f5fcae9f35
SHA1153c58be9d52595beacc2a1cd91bdccc2eac537b
SHA256c35f20d602ce4e3163972e32bdb0472e25e1ce875ca1543894691f41f8f39cc8
SHA5125af8de9c0d14a3f46ddee931838d92d0143d4ce82099058e3991a1f15239dbbaf54606754ef2b9b1df06b8aeec0c5058f3293b24138c15c3dba0bac234ccbaa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5559ce01d85dfcef2fbf5dd884497d0ab
SHA19699a8f01d10424babb01e94aeb76fde79905c43
SHA256fc2d65d764b938bd5efa6a771aaaf13db2ce7266a6a393b05c1ab61635e3191f
SHA512cba164de0a038b27f04c0ca64411e342703128bb6011136ddac4485fadf1b59d658f3452d4484635037270c7326a604e36c357268c82cb9003d2a96077eb6bd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d462d43b374428b0f161d4a9003f010
SHA1bec86be9a14692ace01d2cc77ae341e6f7f11a61
SHA2568f284796eb7b8c2ca8a3e7cd0d8400ad46d05ea858b031613adb3386842ae730
SHA5123b7b2dd7442ad09b81c3610665551cfa111c5ae36dec1b00616e2128ee7df2e7c5ae1eb61195989944fc2430e48c1f51cfd2277a0e0f7fff810efb18d76b8984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c1e1debcfa27ae40e722011b6f5660e
SHA13dc2ab14ee043a68517b6eeee3d6789f901b1a37
SHA25684efddd5f5c6c9ad55348e057dc9d494321d04fc39df33f68f64a05fcd98e996
SHA5129dc039b834dd21d3edc9e41a00bf965e32bdca31dbc769083a940b941867a1e58d564b0e8458171cf6d867b162b3c5c38eceb5621b26965407b9907f128ef322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5d457665fd1bd73c85cff90a3684f08
SHA1b6ff7696f6a92373afb2ad45630c903b4ef61ccc
SHA256143fbabb51f6b2563efecc93b19674e3f37c4eade954b6a9023b51057746deb4
SHA512bd7c52ef39089557c94b972da088ffbc3cbe76a3617e69ff4c71b2b9606bfcdcc94c4bd882a76957e65fa5bd7b4391b23d5debd3f0bd8878414ca68145f6624c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b109d1c32b5e3948f11533f51d969e0b
SHA1c456e303eaaba6d765fda4a42f79facb65cf2b15
SHA2565fc1b1f9ff1330c8c24bf716975236a9ea87c09943c4e7838259d9a07ef06939
SHA512e4196983c4276d3b9052a633114fd922c3ce0ced3dcbfb2db76b8cf82ea881124fb604a77cd1e697675ce86a63eee73ae37d54e5cf081512042b1fd8b337419b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcd837647843c83695440b4b756dd15a
SHA1efa91019e81382a3a875270eede0d30bf3a17572
SHA25619099458c8519b0c1be60d4e0e9f93e604dbd60cd07d2be7e296acdc2f8c4773
SHA512215bf260c9a16baa49e1dc47320137d278ae21d6fb476a175ad320f46660fa4444e3e70a8210297bfa8671dc74050cfe7310546df19e042819f4d8288cbf4655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509508bdb3d5ba74676089e95eb2825a9
SHA1b9e5e05605640205881fe4e6ffd26afc6208c720
SHA2562e3a07fad56cebf5c74a2deff88382a3bf01bb0bdc609c1a85b7e4b08dc03091
SHA512010bdcb4fe9c69d865ee4e2aa2111d680bf5c8c06aee2671d9e558136ee42e203f07cb2b71a1b67bf0f0fc80febe0f84fdaac203b80a4c84da442ba358839f0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c6095fd8068db617c898fdf4ac53021
SHA13511dbe6f9e9651ae8980f9b633b27c660e30518
SHA2561adf1cb0f34e2dc1d06039528d2b3119e8c1b43d07e1efba31df1510348257d2
SHA512e041276eeb93a5aac584a5bfd4d357f4d91270624b79e4f9c7af7595f02db01ab4ce40627e8f1ff2c78d3095658db95d5083e285db923b4c2610f38fa1b20867
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYXN1WWD\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
603B
MD518d0be226dcfe06803e984d76f8a0b56
SHA1c2f9ab3b4b8cb05dafd2bf4888b9750bc7812c96
SHA2569604d3e8175839d2fb01b4b43a9264995d96c958469a628c31d3a91140d1425c
SHA512a9459fb3330fb891b8baad5402e56fca8d831896acc842bb48c3e67bc214c6374f5e45036bf86b54e5f4af22bfd5ba94fe3bc6c4f4830143ca42d4fe55bc7d08