Resubmissions
18/04/2023, 16:51
230418-vdbbzaee6w 5Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/04/2023, 16:51
Static task
static1
Behavioral task
behavioral1
Sample
Tuesday, March 28, 2023_Reminder Message [email protected]
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Tuesday, March 28, 2023_Reminder Message [email protected]
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
contact.png
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
contact.png
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
email-html-2.html
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
email-html-2.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
email-plain-1.txt
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
email-plain-1.txt
Resource
win10v2004-20231222-en
General
-
Target
email-html-2.html
-
Size
2KB
-
MD5
c0c264fab967f672965fec6e8033960f
-
SHA1
6287f1dd83865afdd27f61d22e42a52b0b833381
-
SHA256
23ddf731ccbe8988e36eeb2ff799193ad9d34c8c6ae553124351e18d079a3b4b
-
SHA512
e88e46c77bee606aad0ac1560b53f188121708ee9245c699c2943707c37c667bc68be1d2a34b0081f246c92017e20921d47388b722dec3a01ee773576baac9ea
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412787775" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000be5ab8f8cec7db52de3c28915d1c0f651d60a0d21ded2899d7f071f76724d614000000000e8000000002000020000000091a3de4189f6b0df77a5e07a4ec7f906daafd5803e29499283717c6e115687f20000000618369fd774cd696cb35a550f7355b5c97ee2af3feeab611a7ecc89cb491ab7440000000118cd84bfd610a881fc602782c15c60ea3d4822e6e589ec1249bf0af0778b61ac1eb96350abace50293320ac3e269a23c2c25c513bc8a9dc55a4c64840f4874c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70a35cfd8a53da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{27EE7EB1-BF7E-11EE-9B21-FA7D6BB1EAA3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2100 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2100 iexplore.exe 2100 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2668 2100 iexplore.exe 28 PID 2100 wrote to memory of 2668 2100 iexplore.exe 28 PID 2100 wrote to memory of 2668 2100 iexplore.exe 28 PID 2100 wrote to memory of 2668 2100 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\email-html-2.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571c8c568f8ccd442aa47efc08eeba84c
SHA1886e8718ec3f051525cecec89f1151b462c4bd1f
SHA256b1459fa6ab5b42b57e469600be06fb4f1ed3c1d896dc7c6bd91ac276a05a3d71
SHA512e6995c48e37c43be75e66ff8e480e175006a692ff3cb723ea0d84ebe2bedd8edbfff56bbd75ab70ba9f5d539f1692d4c3d366cfd2e554f30308e96548af44d97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0a9c34744debcd32d0b98d31638896e
SHA1af05bd4e01cd2515cce445ab6ed03a9809a8d7e3
SHA256e4605c76d32c4ddb446051f3b4854e6d1ec0960c69c4a345a6e4e2b14231255a
SHA5122593daf1dd76c1695c842329d3115502d8067107257b094fdcf519d8bb36419356ba118db06fa626f9fe94891e47434a0237068a899728e415771ba7b8ebcf4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a3c447a395367b1c3ca4c629eabca6f
SHA16f4220dbc35bf339d05b81be6fef61a91e72dfbf
SHA256696a740d72e660cb2f12580d9fce57fe1d7b70ff54ef1af220248f39782102e3
SHA51220c231440b08462bf55c43d7bfe605da88b503b97071500bfc3c8ae2d2837b0e8b146c5971406ce11c6f059b0e1d349bbebc75fcb166001962225d829bb79bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54471ca0dbd3556432483fe351a6894d5
SHA15279b347ce45e22dd596b92dfc510386b0921763
SHA256667c1781b10ee072b47bdd27a589341f1fdf5d3a14ac794b8060cdba2c30ea27
SHA512d87b1b1244bb2710e4d4486d1135370eaefa1e875320983c98653da0310a7719f165cbf64c11cd2c6dfd2b5c398c3241c9d604c9da6f7f22144b4753ee607026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebe2c6267db84793a984efc341b15b85
SHA1bcd642539db07f6143d41e544aa25359a8fbe543
SHA256753265ff5cc9ca383fbab2bd97cfe85e96c0050e81d4642bf53f55ae5f8aad3d
SHA5122d036fa7ee590d13935a4c4a538fc65760ffba936296787816ce4ed580e7436e50464049012e76ec5f5bf461d372cfe7e86da891f5609e04e60c4e6738a6c73b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a69f0844fe2dd0dd8a8a93216085071a
SHA1bbbb734d4fef281fe8938d121b72c6d01f13933a
SHA2565d24fa619e4a84271ee22e8324727d565621ae7205f499ddeef9b921e81aeca3
SHA512ca280de8c27f906ced7249dddd33b8e6e7ab39b5be3eccc50d7654cb3d80e5315ec8eddbe6d1c8588b3cadadae6acc6a7a08b186b1ab12a4a80e1d8b2c75c018
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c37e428e317daffab2b58589007074a1
SHA1234846bb808bd86f7e41ab5d9e737f80d2a4b0d4
SHA2566f52e673eb2ad6a5e03b82260557fa8aa59a89bbbe90a008f218451054baa757
SHA512cc3663f3dac068636b19a8edf8b5cd56997b885082d214e7e8dd12d50709fdba03c15ba36f91b80a1e12aed00c909d3c1fa1b235c0607a4e4d3305c3f6119fe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9992aac1a0c47b493cd04f3fee63ca3
SHA10e772c1cbb814bb298370abb6601054a868399fe
SHA2568828a3041d38106e68e8229132bf65fa907b589bb2182458ec0fc6a2347b1f8a
SHA5124e5aee5697a177f5721d841610fe5d42352a308e3c0582d37db0662f92e65e502047d5fe6724b36028ebcafe3fa58e873f0c7309fbc5f59a6061df103056e350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5117659a84695bd9d9abf3d6af2e44813
SHA1ec2d80585bd9963ed7c19046dc8495eb0c135dd7
SHA2569a67ddc0070a92d6a3380455f644c28a971e8a7307c83b79e5920422379ad8e3
SHA512917227aee87e58cde8a9fa5efb3aad612b8c99fe62abaa590139251ab5e46ad830ea6902f7ea5de5c921c62934c09df9ed9a4103a8c611bab0af52261dd68638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec140953441ec7ce66f8555fe7823caa
SHA14f2d319883ee61cc9891c59ae6a747a0dc90117b
SHA2563c2566eb270a5a749f5d8bdd76d473757b3e96917ab643168c04f806313a51a4
SHA5123e83024c5a744bac744ca2c2c24fc0507a32774bb65ad52adc48417145d14567fd0c7403da933462b958b24871ab8586fe264748efa89d21076ace9bad21e44d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594af1187ce1460e550389ed37e5617d1
SHA19a60f200109575ac355f115ab7287c1c950736ee
SHA256314ba07f0f888b001d603193d893354bb0ebe4de79248f326ffb966e378ecbb3
SHA5126023f7f8ec2614bb647102b5dd3365e6e2f42f9516b06cb7d8ee1f8f5167766870a1cbbf653f41b8421bd638dd1a39239b76a19bee70733a6d73bebc273156a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556a00067ec78c7682aa72b45b1000ce1
SHA1bc9f7751cdc46eb52f99f18c83f3cb7b2222f39c
SHA256fe9dd21e52201ffa84006ea77f3e8eb1a723a313e05e003ca7385790f627063a
SHA512f6daf8a491a0de3b8da5fc056eac73c9ca415b25a80a6375daecabf18f1cc5d483b4d7d7cc34498751d1d00e17973bbcb2090a6a32ddb6506e0ed248fd195be0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58abb15340d4b8521b8155c77c19fe60f
SHA12342fab8ca815aa4bdd7d728561cf1b5e1260e94
SHA256c0ce9e76339bf39f531b4278533afdb1d1cf80745f4942430b9c02237b4b8e66
SHA512c6b77d1d8fc15e218a17fa74b06ed7f36941ca6b20470926a4bd82e2f808c2b772632cee6480248880fd3eb7ec0540b2d34e285b445d41503e0986ddd8be8217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505bffdf6d2b7becbc18c22de3f9c535c
SHA13ca60276144852780e841d40336d17331f9fdd49
SHA256f53746953a636370b4aadbea7e950003629e79f2d0aabbf3c3425b3b1e2f53f9
SHA5129ef09313d9605a344e531837a8c9a9bc2a43cb1d37789f10308c455a7dc37f8e60737df9632ad8c8b4c383c5a6301d373730c7a69837a7ecea7f3b024b34cd10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eec7e6fb5d85be5558f9c2450f3fb4ec
SHA1d3893b8af3b35942d3dba0f5bd91426eef4eadac
SHA2564330102eded0001fbb46be1ce1a1aa244ba270149ac14ba83b12e71055ce0a43
SHA512bc0cee1dba921732eb79c13ab410bc89a5c0c801f8a8b82d175eaa6270582659a63eddd4ffeb23a0311ec18596a021b27a4b9b62300c221723186421f4874e67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a467208eaf5637d63c49603e119b3d6f
SHA12bfa56940d77a584ac29b4938f38f933b3778920
SHA2562098f919f7a8d1fb156997b990e23d561c205b42fbc847ae0447bf704da05ea9
SHA512e76ab57013efdf1a5dfab7e28288e76a66d2032ec6d2af4f5089f65dd01c8452e460f99d1abf7c164fcc72875989c01e4d0dbc7c05d58aa9abc6c216c51c041d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50012cba9e45f26f493630e9f78a11273
SHA1b4d6480f47658d6bff81b5530a861f135a57bb4d
SHA2566e244cb2fcec764e4c23fecd997159cce0afd68b9c69aa5b25c642b8ea3818a4
SHA51240ef2dd3cd99195a0a23331497420ad4e85eaf09ec044aaa47ab2b10d5e8e21bcc08415f399867b1702d27defec7627d44aae3cae274716e2feb834b70b8e840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5279138bc4639495818eaad89de010e34
SHA1095a24cedd467e0571e6e48241b8d374b80c2c54
SHA256c4f0be3da2793db1695b753783309c4b9f04a011feaecddcbe0dfb8b4a1d451a
SHA5126f85d973ccc4b2d757436b98ad7460a426d7b488d3a6ae4c3e075db326b632ef25789717376a821bb65b7deae35314875f0bc948b3993ee434905cd431f9f030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f102a5efc85c5a2fdae796a2f9278c48
SHA16d55b71ae4f75ecfd244e12d862e0cf5b76193a1
SHA256ce5af4bb3033db26f4df2e17232db9db026e991bfd79b06117e6e55ab8e82fa6
SHA512b9ab8fb210e76744dd7d3d8021207446a176f2bb56275d9ee382da2778fabd3da7e4cf07931b7452985656a99fd3bee3a98c47c947d2505c7e87fe5030203cae
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06