Resubmissions
26-05-2023 12:02
230526-n7ne3afc89 126-05-2023 12:01
230526-n62w3afc87 126-05-2023 11:46
230526-nxb92sfg3z 126-05-2023 11:44
230526-nwensafc53 126-05-2023 11:39
230526-nsn32sfc34 1Analysis
-
max time kernel
194s -
max time network
220s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
26-05-2023 11:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://58.22.2.105:18080
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
http://58.22.2.105:18080
Resource
win10v2004-20230220-en
General
-
Target
http://58.22.2.105:18080
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "391873367" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d045c5a5d78fd901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CACA1401-FBCA-11ED-B5B5-7621D5A708C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004fbfdbf4a3c68e45955529abe2254dfd000000000200000000001066000000010000200000008348597ca9226d0bf21a770a584e5af9a24b67845da43f3ae47a48e9811bb7da000000000e80000000020000200000008a0ab4f52779bb6fc118ba8c9fea7d93bd43e5e2a2783f6a83e2378d7c3080532000000034d9b5e74c9c6ee8d742f4e1959ff79d4b09452a7b3d094dcc1b57fe44c3c208400000006d36c59d1db474efe0aacb8809faa47a0bd93a65ea8215a25da85dce45e31fdaaffebbd648e49d8eb195fd101c0df07f2bdbea1bb49f10f4e6e6819a6f6a4339 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
IEXPLORE.EXEpid process 1676 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1204 iexplore.exe 1204 iexplore.exe 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1204 wrote to memory of 1676 1204 iexplore.exe IEXPLORE.EXE PID 1204 wrote to memory of 1676 1204 iexplore.exe IEXPLORE.EXE PID 1204 wrote to memory of 1676 1204 iexplore.exe IEXPLORE.EXE PID 1204 wrote to memory of 1676 1204 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://58.22.2.105:180801⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD526ebbfc447130f3f080c4787a8b241b8
SHA1cbe7c3cccd1fbeab63f768f2b722bacf19fbcb80
SHA2566a8bd7d25023848585da0f6a57dd697e7fc7d2d8a098d4bd929f2692e280ba2d
SHA512b733a8813c58fa66aaf9a650d8e1af8be7b7b4ce15dbb075183c79343043b768d3227deb6b46c23bdeaeb63cbbc7eec96572e26a2bf351f5be3dce5320d324db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5744969be80e9a9be27835a247fb97523
SHA11a44ae725e2905c2c2db73ef0e019dec8b405d9b
SHA256af347327e222b79ecbb2cc03f95551911981c9d862ccca566968934c7c520d5b
SHA5122bb4a2c28cc5833894e5071f47b20ae95d5906d298d8b543eb40cffe6e9f2983b62b4ef28d674a149e4d8629ad0192b48bae328828c26d0ac0356f5c9dd18495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e94fbdcc0a967b79744276ddd7d3ea04
SHA1d9312825b445704e743d6d619b1b3c9c223f427a
SHA256f8a06ad7acfadf2760bf24b95509a673cea6811ac6f0f260bd84cfe45df07372
SHA5123797e2608d02b86d3830451e5d45735b37bc8430dd4839f429e046b5d04506d1bb36dda36120662690078444720683314a159dada47c51bcde08a06e759b48af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD542821238efb841237cdc1b699921ca0a
SHA1b9dbf4b34338f56f0da76895d9399a09ba8c13d0
SHA2563be75214852676a21ebc465330409647dc2b46db8630833e09ed3f23986a9320
SHA512c4e4eba7beeec8102527a2e32c30d5e60cbc707da5f12da0cbfada1b94a28b63a2db6fbda0d06efd021186eacfab8af24f4d0f85b33424247544ebcc1b7e77ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5423a72fa0e2809775d315084aca73a07
SHA14e33a300eb1b281fc99978e4feea6ab3587d472f
SHA256bf7c11f7bf48d80d06f14a29b72d6e90a27de3fd0366dc5b807b9e634c16b99e
SHA512fcc21f1ec7f7458d4c897c6d523735207e5defecd61e87a6cb927c0f1ffbb40dba7b71a3720c7b1bda1a3fb50ba02946f62b37b9e44aed9e0766a0a83f5fea9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5326baaf762543785236cf42d6cc88725
SHA18673b266eaacfb2661d0f441b231415241e6168c
SHA2568d3223759802006d54f45d7376f1a9a329b25a35eaec7e0b29dfc25c4726b9e3
SHA51239a934fcbb5ecbea3f45f640f721e20fe6a7f262de5d9c4412e747ed9409fa7ee92d50a102661bf71765bf4d81891fd649a0e40252ff47bcc6ae251c18e100ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5787570e68808c82712a43df54dd60049
SHA1dd797f5d1027c4aa2d6a488b0db1c398e6c42d72
SHA2568f1480a1cb121fa001f081206907b7d4dc99ae37bcda9ff8de7baf5e7e71c06c
SHA512d76943ea81a95158bc6e890d01e8df3c3463681df535f3cde014b747ae832828d2bf3f3954bf7123131f2d37d372ef0ed677d141b7a7fcec96d3d9ef3c620419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57aa09201eacecbbb4efa73557dedcb84
SHA1abefa65247196434e4d0da183f24cc4e25d67ce9
SHA256053299bf263fb2c29bad028c5e6a90393466ea5b0e68485027f62b2267dba513
SHA512f7dd800ca484271f02674247cbb86cb7bcc7a29ae4f41e80cc6e0fc05d60684c847981018e740aa4605e5eb9491868c65b0d107ae470f766880350f1ef22584c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S7FIT0B8\suggestions[1].en-USFilesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Temp\Cab430B.tmpFilesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\Local\Temp\Cab43DC.tmpFilesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\Local\Temp\Tar443C.tmpFilesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\TYIPQ0LX.txtFilesize
602B
MD51ee7cd52d7baf7916de9d43640ca6568
SHA1ed11191a461e8ae0fda6f2cea3e785266a192079
SHA256908b7183eb6327d104cd128a6bb76cc53348b3c389bc5b12fe7252fbf9e56a79
SHA512c947b30491c3171137d385a3a295cd1311cea1e2f865b9cc390a73cb1647b7584c8dda373c690036b98dafdf98dcdd05c61645411eaf7f3abcb6873c4c57e941