Analysis
-
max time kernel
38s -
max time network
42s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2023, 20:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://abbmotion.smarpshare.com
Resource
win10v2004-20230220-en
General
-
Target
http://abbmotion.smarpshare.com
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{81FF61C8-F36D-11ED-9EF6-E2BD7878EA51} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4464 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4464 iexplore.exe 4464 iexplore.exe 3720 IEXPLORE.EXE 3720 IEXPLORE.EXE 3720 IEXPLORE.EXE 3720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4464 wrote to memory of 3720 4464 iexplore.exe 83 PID 4464 wrote to memory of 3720 4464 iexplore.exe 83 PID 4464 wrote to memory of 3720 4464 iexplore.exe 83
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://abbmotion.smarpshare.com1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4464 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3720
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD55380e9305ea102d77a4ba7c7c36385b1
SHA1a92f48245ebec75adc54251d2d445216bb48512f
SHA2564e994322d00f9022b06e3bdb2d14fc9a1e529b86fbf2df103c7479d41ab116ef
SHA512e8efc59f4e2ce85b624cad7acae20df5b1252d40456bb55c689174d73c936b0da824e3c58e1adcbc58028af456a8403381393dd2d72a9bbf8c9604e7da3c7c58
-
Filesize
11KB
MD586a8d5ce9dbf94a725a3cb4ba7be7ba8
SHA155a0a20337f8c6e61695cbdc0c361c4d249136d2
SHA256e0eb0f73f49e4adbd437c719b887a29f9c8dac45a929b69c337407b441e6a958
SHA512721d583eb720f189f78a1f0677008d03e2f8d2ad942a54a31756ad3a28a4a288ff6c31f38c6ee6ac1cba4fdba1a694090cdbb92705949521bcc10b7bdbaed102
-
Filesize
11KB
MD586a8d5ce9dbf94a725a3cb4ba7be7ba8
SHA155a0a20337f8c6e61695cbdc0c361c4d249136d2
SHA256e0eb0f73f49e4adbd437c719b887a29f9c8dac45a929b69c337407b441e6a958
SHA512721d583eb720f189f78a1f0677008d03e2f8d2ad942a54a31756ad3a28a4a288ff6c31f38c6ee6ac1cba4fdba1a694090cdbb92705949521bcc10b7bdbaed102