Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20230220-es -
resource tags
arch:x64arch:x86image:win7-20230220-eslocale:es-esos:windows7-x64systemwindows -
submitted
03/06/2023, 16:48
Static task
static1
Behavioral task
behavioral1
Sample
index.template.html
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
index.template.html
Resource
win10v2004-20230220-es
Behavioral task
behavioral3
Sample
swap-icon.xml
Resource
win7-20230220-es
Behavioral task
behavioral4
Sample
swap-icon.xml
Resource
win10v2004-20230220-es
General
-
Target
swap-icon.xml
-
Size
1KB
-
MD5
ad781283fae062e34a4da58eb9c7361a
-
SHA1
cf880eb57cf23d60e0a01c11e42c36c8a6d53ffa
-
SHA256
ac5ebdc87b6617ef0ec6eca25138aa0b2c6fd6525d09208337784a111375dbac
-
SHA512
2f69be129b31ec7045e98be4cec414f6fbf701f84e52a7c9e3113063110ed2e00d9add2beb24b1128dc3df9b2de838ba7dbeefa57a1d7495b080f31f0b035d04
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\es-ES = "es-ES.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{775DDF81-022E-11EE-B39C-7A574369CBCF} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "392575884" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000de6f24c55fa58a458f6a3f0c46c7b255000000000200000000001066000000010000200000000a4a9a36aad068ad2fa445c2c4a1f1f3670e2cb985bd9412dece40f59e8a0d6e000000000e80000000020000200000000ad6afbd9626a3247d4ca0b71e91575d521cd903021d83d2bb703137f29e6aa120000000aa76c7ec8db0106ec65d377f5865a414481a50bed30b2e74e90ed1891657048f40000000b7f74181154c29a67687471123c09c2d815c4b246c0c6d223786715eb323088c281f726ce84eff2f69803721a60445530e427cbf5aae16e4e7eed668219f8431 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e3c74e3b96d901 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1260 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1260 IEXPLORE.EXE 1260 IEXPLORE.EXE 240 IEXPLORE.EXE 240 IEXPLORE.EXE 240 IEXPLORE.EXE 240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 956 wrote to memory of 764 956 MSOXMLED.EXE 29 PID 956 wrote to memory of 764 956 MSOXMLED.EXE 29 PID 956 wrote to memory of 764 956 MSOXMLED.EXE 29 PID 956 wrote to memory of 764 956 MSOXMLED.EXE 29 PID 764 wrote to memory of 1260 764 iexplore.exe 30 PID 764 wrote to memory of 1260 764 iexplore.exe 30 PID 764 wrote to memory of 1260 764 iexplore.exe 30 PID 764 wrote to memory of 1260 764 iexplore.exe 30 PID 1260 wrote to memory of 240 1260 IEXPLORE.EXE 31 PID 1260 wrote to memory of 240 1260 IEXPLORE.EXE 31 PID 1260 wrote to memory of 240 1260 IEXPLORE.EXE 31 PID 1260 wrote to memory of 240 1260 IEXPLORE.EXE 31
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\swap-icon.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1260 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:240
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cebfddad017aaf5b958cc523851af763
SHA1a075fa321005f1e3304aadfd8ca1d0bb001517d2
SHA2568452199c282e807ce292dfc8d1a8c25709da66025329c4b8ae9c1b2a8323b936
SHA51206beb46d153a796bf249794392a701c479d3d138a1d199ef563fd01a7222c163eceb646cf5e123f4098f08881a20d203dd59e5167bfd76f1278289185496c1f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59844dedf7b517bfb92943691ace48f9b
SHA11828f0ee4a29e5d132ad176c1d29b88a5d14f6b7
SHA256b844fbd8c9bfb2e7958bd8457f8302d50060186d23d5b23f0663f9042ea4d7c5
SHA5127bf888523f28d2dc3b5776e0617e60da12741e402b33ab1c2e09058fff929af4c802d53f37394faa33f770f9b1687bf9355c9f0534f05217a9a2185c80203148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52268697c4a184684a320a5fa6ecd8dc7
SHA1dc0801f0964efa2098fa61e436ab27f942b8bcc2
SHA2568f1e68555ccba8d496314ab696e46bae7f1e846e870b2550bc95fd381d74cf41
SHA512250e92a864b0347e16884b418adca322649ee9865cad3bcfdd09f52815debf509d867bc9f4c6d4fda502bc4208480728d6dff1ab072a023b4a298a15e7b1a89f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57481c727b86d0446f16b45e3c242ba70
SHA15c0055f7ad9eab4ef8acb5f077f386fc67b7f3f2
SHA2563944140e9ca60fdf82b8f3264100a6c6b876be1e49a9f6feb12c8d7a1e3b12c4
SHA512c1b1c8c085ebd68d85e344afe7485d1e07ca18362f0a82d19a02f9da004fdcfc5b8ed0917af5b565a12f09d319ace63ad09c6ff92da0dba3323f38d82f84c20b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a04fb68ef0b4e5ace780ccde9a3e4e4b
SHA109d71ab48c00742fa916b13138655670e8e89e4d
SHA25658e986a2421ca6520c7329ba0eeb9bb59db37d011ba292f928084d65e8b61d83
SHA512096c6a91eb0329e78f157d20dcbeb950601dbb4be5c4f1ada7fe94fd6a2aab4b109996679927059597a85ca2e8cbae510e5c28606611ee443ce63f818cb83444
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VQ77JNZF\suggestions[1].es-ES
Filesize18KB
MD5e2749896090665aeb9b29bce1a591a75
SHA159e05283e04c6c0252d2b75d5141ba62d73e9df9
SHA256d428ea8ca335c7cccf1e1564554d81b52fb5a1f20617aa99136cacf73354e0b7
SHA512c750e9ccb30c45e2c4844df384ee9b02b81aa4c8e576197c0811910a63376a7d60e68f964dad858ff0e46a8fd0952ddaf19c8f79f3fd05cefd7dbf2c043d52c5
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
608B
MD5a07bcf09798f272868e85fdef5345e35
SHA165d6f5a860bf549dca9c3ef4e8408bbe265f4f0c
SHA256e1ee7dc8144196dd83e725532fc687d2d43e8cc080221e5ffe7545bfb5f9349f
SHA512adac8b05febf8fd222146d530b4a09741c912f3670d4312cc97fa7aca94da9631a53e927b094daf0da287e8adddd7350d98ba11adde5989dee675615a5ebeba5