Analysis
-
max time kernel
66s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29-03-2023 04:04
Static task
static1
Behavioral task
behavioral1
Sample
Tallon SOP Invoice (Single).html
Resource
win7-20230220-en
General
-
Target
Tallon SOP Invoice (Single).html
-
Size
345KB
-
MD5
881f6e49edd32d210e2371fd1819c6bb
-
SHA1
807caad4c7dcef9d6a590703086141014e3579dd
-
SHA256
96d9c5b577b6c83e2452fcda9097290c73eb918bd9bfa751afcdaf9334a28573
-
SHA512
cbde2d9debff79e7859daacc5b145b62943467558077c1563b3be3fa0f6593270bdb2f4b09770e5067dfd8faabfee7e44f896bc9ab0010cae3ed29ff3ed66bd2
-
SSDEEP
6144:D+cONCmQ+ioWY9CLgO/ye730cxHzfjpmUqvMmy:D+cONCmQ+iRLx/yEH3EHvMJ
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000074b2d77a8e7a944ea7c282b9066208cc000000000200000000001066000000010000200000001cb86e40f037e4b3988b266a6ce7fec4f5e5c67b2b325ad9ccc018d336e37d22000000000e800000000200002000000037c78784aade6ca77202dd72f21799afc552878c25d8c5f0b675467fc5e8cdde20000000f9363762138e365911791f35a9c3c73032eaea8861cf924d81750b83c03115af40000000ec1a7eb50364a9e31f55be7d124ad80c548a64eae9448995ee33d9ee6c4d46811138896b7ff257a7a30430bb8b43aaca981d4c322d7fc35e9ca01fc21b13b84a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "386834830" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d05197640462d901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000074b2d77a8e7a944ea7c282b9066208cc0000000002000000000010660000000100002000000096194ee018c6f7a6d98d31c779b56fe0bb2e1b322a433a2c1f442dc193e1fe87000000000e8000000002000020000000cd41338ed0bea6078318ccad61236d3c042f1213000685dd51015248fa70bebb90000000abbfafe901aacddc90c4d5b8b46eae90c29d5abd76130ab796973d4d543f2650f4bef32881d895a4340321a3131b3394fa30cbb4430d8ef6dafafbd45f82d8de4cc7a8d2fd866d20f40d64ab635741625aa4c8eb886c321d9ef0adc0050b4fb14c8521708243abb1b2674e08bb70b35bf035a3f1e49613d1d96631103362023382892999361fbb9f832fa88f8f491587400000005c571c1ab9b4312609bdc7913f8c8b0d50bc8031c7a4770e4193d993a72ebc749cf04d90df0ea04d068be92df8857bb907ddda447622c65f680274d3e5ecb1f1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{88B394C1-CDF7-11ED-B08A-6AEE4B25B7A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1288 iexplore.exe 1288 iexplore.exe 1656 IEXPLORE.EXE 1656 IEXPLORE.EXE 1656 IEXPLORE.EXE 1656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1288 wrote to memory of 1656 1288 iexplore.exe IEXPLORE.EXE PID 1288 wrote to memory of 1656 1288 iexplore.exe IEXPLORE.EXE PID 1288 wrote to memory of 1656 1288 iexplore.exe IEXPLORE.EXE PID 1288 wrote to memory of 1656 1288 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Tallon SOP Invoice (Single).html"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1288 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1656
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8428821c8311b6988eb040257af4d46
SHA17274417a6e1642619bf9665149f710225a0dc8a0
SHA256dd5cb5618a96534fb522a4b2acd89d0b8336eaf820e91904174842a78ccd1fd5
SHA512fa1d8d5673893e168065948e68dc503ad8f3c40e41fef442eb3d3026617ace054511fc234c8aefffecf31e73be5248d4d11d145e61a31a70bb37d02b3cd1c1b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec3b48702bccc70a7233326752be0b24
SHA14fa788d6375f5a3fe24d1a6859db7f58dd8df018
SHA25631b712ebe8bf63e8935fea00adbd5122904388f6968e168ccc9d521d5e6c10df
SHA51265a503f47f6eb579899c610f6092be2fd77df5fbdaf71e19e6b5cf998a7a008e3e7cf08e758ca6761d752ae4e75fd1b53818be49d7be87087d7cc9dc61715397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502b7e902a384efa0a46e98a041b4fda8
SHA19281512f97e1b3315de501e3aa00c4f420c49274
SHA25657eb0dc36ddaaee5aef2a72921c16b7207e64818630e5688143989b32319238e
SHA5125635fdd2626af3d8d83b1d0fad8775d0fa28b1a47b335c080865a8b65b105452d274e394cf09751fd554fa63e02205770fa3833b0b598276a2dcbe47b2c32c69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bbab036dfd5ddf1753c6668d8f204a3
SHA16eb1e4863cb9c5b57cd2c5576bceeff7abe7831e
SHA256bd8b9a811483342c89d7f3560afecb68c47c25b07bfad4013ae8fbc12935a723
SHA51236f30667ff6f90fb6a45b457b51b0445578257410c9057975492d01da6fcac514cba36e6334377d466fd711b79131cb31f831e4e6262e25c5b5ef3de2ad922d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d37d7ce6c4c98b5622a5c9c57a35de3
SHA1deeb96d948e6998a23311bb3486194208df0445a
SHA256a66cbc630ad6258890b22f76e681cfe12681e2ae5ca2600f041aebc20b2b1174
SHA512f0cf70dc9cc2f144e74f251080e67f76ba7922d0df67c2eadbd600406a39270121f4e691aef3fd7a9843bcd2223f53a4098dffff7ededd31174ff3a8fc4fa56d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579daf14eb2967f2bf3eaef3538f0ff9e
SHA1ec95be46888e89a600dff1396719ba86a7649da9
SHA2568f532a1271b9e4152064a896030d29935ee88303e22a17a4d7116ff46c332f31
SHA512ca4c8dc19aea9c245c41c7f8a328b23e4716b71b1f81f6a9ffb3853e5e209f82b74c90f2d12d0bceb562fb11675b3a3a4e02d505ace7be811cbeb78f7de7ee1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fa445f38a76e068c9d62aa80f3709c1
SHA1310b24e900ad80709d283f33633fc9d3e1ec36bc
SHA25606ad580d41c9d99add62e4ab8760165cd8f83fb35fedaa2338e21ec9d9f57091
SHA512e1def920fdb95328324ee303b62b4d6c378d7c892526f0dd1add55f429207360e432d58f2e57232d7043d4501651eb094e4af640700f84816b48a66c6a4df079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b401f51c7c149edb21c6c2da8bd56f50
SHA1707bfabb0db823260e306055b46a78d24b97d527
SHA25605f79cfd6fe833e7b9a7df8ebae7ab7ecde7d79c2940df4900c30d303932c7ce
SHA512874c75490c60a29e3c51312e79de88648d113617e1a7c942c3f56e1087a69b5deb61cfe69f295d42e4b55d934744af4c55c37f4688a3ac3210b47fc38c2762b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510f442a5a77598849957f3516adc05f3
SHA1ee40d25dd232b4ef633437b2fa7f4d0be2da2a10
SHA256d5212bf1af15a6f335a37dea649e2767919a4f563c7f00a9aa80c4e69df64f71
SHA5129097551fdfb5ec94399a4db69bb09b1eb83c5e55ffbc21250461a1f7af78cd0e0b8710c5440f7f87e7dc23f5b55bb7c49490551cf0c268c45a0bb6e07d22dc64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50654b4ff2327be2695372d724c5b31ec
SHA1a1fff8dc517eb350217b660c70f070983331d108
SHA256f901d74b21db6165ea3561bc29eddd6c2c9252e969bdf1bba69ca28e14581991
SHA512ef520d27f75d346f4a60b301ee5102430e4277e35043662388f199ee101393187fbd5564d114165be89b105332b34bb19beaf980428638d73e88bf3f40663e14
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QCNSQOTT\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD573b4b714b42fc9a6aaefd0ae59adb009
SHA1efdaffd5b0ad21913d22001d91bf6c19ecb4ac41
SHA256c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd
SHA51273af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
608B
MD5b02b3f567e40ba69394e8d3f432124d7
SHA1ac054ad4950c41c4d3a09d073dc715f7c08290ef
SHA2567394fcb8a3a2cec378ff28a2d71f5fc5240f9dd72019facd4e0a5df83ff76ff5
SHA5127b6f621509094f1a0caa906400c3bbb557c13e64f17670a9b831e632fa67408c26a523b5beabf0822096ac1ba1b1c8d90f0036b1479034a227e36b19c5eb6753