Overview
overview
9Static
static
1jokescript...av.xml
windows10-2004-x64
1jokescript...x.html
windows10-2004-x64
9jokescript...n.html
windows10-2004-x64
1jokescript...av.xml
windows10-2004-x64
1jokescript...7.html
windows10-2004-x64
1jokescript...2.html
windows10-2004-x64
1jokescript...e.html
windows10-2004-x64
1Analysis
-
max time kernel
1745s -
max time network
1748s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2023 07:08
Static task
static1
Behavioral task
behavioral1
Sample
jokescript-main/ygn-redbot-whowhere-garticflix/garticflix/fav.xml
Resource
win10v2004-20230221-en
Behavioral task
behavioral2
Sample
jokescript-main/ygn-redbot-whowhere-garticflix/garticflix/garticflix.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
jokescript-main/ygn-redbot-whowhere-garticflix/garticflix/main.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
jokescript-main/ygn-redbot-whowhere-garticflix/garticflix/unfav.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
jokescript-main/ygn-redbot-whowhere-garticflix/redbot-v1.7.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
jokescript-main/ygn-redbot-whowhere-garticflix/redbotv2.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
jokescript-main/ygn-redbot-whowhere-garticflix/whowhere.html
Resource
win10v2004-20230220-en
General
-
Target
jokescript-main/ygn-redbot-whowhere-garticflix/garticflix/fav.xml
-
Size
1019B
-
MD5
56a34e9ec7074dcf1c5e143174c0ab30
-
SHA1
f909d8344d0064647b9607e1224ca62684aaee28
-
SHA256
2008a37d2a97b9412804537bfa4a43661088108614d27e9c9e26337eb7a0826a
-
SHA512
cd321c1e8327931dcdc982b87828fd4cdc0847b3e541989843a8874c010405df79058825cbc85b1428a67c86579408b3c2eebb27d013ff3ef1990d509c915365
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{9619D8AD-075D-11EE-8227-720160798C78} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1791527708" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1059fe6b6a9bd901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0081b6c6a9bd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31038314" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31038314" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000087afbe8804688c4cae86ce16eb0a60cb000000000200000000001066000000010000200000001f87c9fb4edd2ea06d41df4745a70bc9e4d2a00827672885f6391982bf8de1b7000000000e800000000200002000000027d66e7e45060a168723a34c939ae3cf056236da0c756429c2b36294a77d99bf20000000f2cbff2dc6926c06884deb55154637014a493bebc59165d41fae05659c699b95400000006bc9a850f4c597142e8a111f14b3ebb112bf89ccc68a18df680ba01b358eb8bbaed2f23a0a2a1db56a97a624ba4d184e56f018efc1557982d6d2356046519437 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000087afbe8804688c4cae86ce16eb0a60cb000000000200000000001066000000010000200000003fef0175c96612a31b31c8f3f03225fcb22fd9f7624ea4720868a2f4440b7797000000000e8000000002000020000000f599f8e7355c8f7bf9bcc35c645bc4f0ccfaf347b7bd5f323550c4b604e6266c200000001a6392561112c5907001e65380c40b49c93b7da2eb47256447606e7d4cce7db140000000548d745d6ee3d8d64a9b98fa233cb1e29a4d6068f64ff813fffb36e35ad64423489e52117eda8617fc5c48377c3826a93893bc5a5524cf33d5d569cbb483e841 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1791527708" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "393145878" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 3584 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3584 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3584 iexplore.exe 3584 iexplore.exe 5000 IEXPLORE.EXE 5000 IEXPLORE.EXE 5000 IEXPLORE.EXE 5000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
MSOXMLED.EXEiexplore.exedescription pid process target process PID 2440 wrote to memory of 3584 2440 MSOXMLED.EXE iexplore.exe PID 2440 wrote to memory of 3584 2440 MSOXMLED.EXE iexplore.exe PID 3584 wrote to memory of 5000 3584 iexplore.exe IEXPLORE.EXE PID 3584 wrote to memory of 5000 3584 iexplore.exe IEXPLORE.EXE PID 3584 wrote to memory of 5000 3584 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\jokescript-main\ygn-redbot-whowhere-garticflix\garticflix\fav.xml"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\jokescript-main\ygn-redbot-whowhere-garticflix\garticflix\fav.xml2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3584 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RP56V4OA\suggestions[1].en-USFilesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Temp\~DF267D917503AB7964.TMPFilesize
16KB
MD5b8de5229f087f6b751a42ada323f6530
SHA10b4f549f5ef98701c3b02a021ed31056afa61579
SHA2560115032cc36c34ac65b16b9a273553dafa207ecf97ba61172b9f8a734f061843
SHA5122baaf8054a63167cb167e9ffde8cab7dca927ff0613e7454ba28afd45b2bb610e71babb1d4373238b379a85090983a77db4741e895a9f090a49e00a8327caadd
-
memory/2440-133-0x00007FFF6F770000-0x00007FFF6F780000-memory.dmpFilesize
64KB
-
memory/2440-134-0x00007FFF6F770000-0x00007FFF6F780000-memory.dmpFilesize
64KB
-
memory/2440-135-0x00007FFF6F770000-0x00007FFF6F780000-memory.dmpFilesize
64KB
-
memory/2440-136-0x00007FFF6F770000-0x00007FFF6F780000-memory.dmpFilesize
64KB
-
memory/2440-137-0x00007FFF6F770000-0x00007FFF6F780000-memory.dmpFilesize
64KB
-
memory/2440-138-0x00007FFF6F770000-0x00007FFF6F780000-memory.dmpFilesize
64KB
-
memory/2440-139-0x00007FFF6F770000-0x00007FFF6F780000-memory.dmpFilesize
64KB
-
memory/2440-140-0x00007FFF6F770000-0x00007FFF6F780000-memory.dmpFilesize
64KB
-
memory/2440-141-0x00007FFF6F770000-0x00007FFF6F780000-memory.dmpFilesize
64KB