Overview
overview
9Static
static
1jokescript...av.xml
windows10-2004-x64
1jokescript...x.html
windows10-2004-x64
9jokescript...n.html
windows10-2004-x64
1jokescript...av.xml
windows10-2004-x64
1jokescript...7.html
windows10-2004-x64
1jokescript...2.html
windows10-2004-x64
1jokescript...e.html
windows10-2004-x64
1Analysis
-
max time kernel
1550s -
max time network
1516s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2023 07:08
Static task
static1
Behavioral task
behavioral1
Sample
jokescript-main/ygn-redbot-whowhere-garticflix/garticflix/fav.xml
Resource
win10v2004-20230221-en
Behavioral task
behavioral2
Sample
jokescript-main/ygn-redbot-whowhere-garticflix/garticflix/garticflix.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
jokescript-main/ygn-redbot-whowhere-garticflix/garticflix/main.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
jokescript-main/ygn-redbot-whowhere-garticflix/garticflix/unfav.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
jokescript-main/ygn-redbot-whowhere-garticflix/redbot-v1.7.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
jokescript-main/ygn-redbot-whowhere-garticflix/redbotv2.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
jokescript-main/ygn-redbot-whowhere-garticflix/whowhere.html
Resource
win10v2004-20230220-en
General
-
Target
jokescript-main/ygn-redbot-whowhere-garticflix/garticflix/unfav.xml
-
Size
1019B
-
MD5
298c389cf76d61a892fe9397b28853da
-
SHA1
1e38950eba2ff37184069c37c710be07718af5ff
-
SHA256
562230ab9597f98dc12498cf24ddfba7a720f049d057f63a82c4447e8c799ff9
-
SHA512
8c79cc0ddb5355a9a8e209f1ad2094e1ab1ff1e7a93e210cf0f7265264bf3b43f3010661ca9146133838ef2f210f64e11e2377dc6f8fb18be59ce38af0e41517
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31038314" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c661734e21f29b49af1d7b23e5bf740000000000020000000000106600000001000020000000207b646eed2471932e1d10c935595aabcb90c82a97fd48f3f71ca6639200db3a000000000e800000000200002000000026fb5f8a6a248d11a4d7952e43e97c8668ed959d0141b6f08e5d89f232b851f720000000a78dd0efd20511b404975e56b7720e0991a4b81a7d56eb65634532991ccdee4d40000000ae4df07e1d27b4bace38017cc230bb7432f5b49be5a78e8d12055589da75f5e26c18300e0bb08e92cfccbbd0619b25d53f367362d44a025ec0978194f4a633b7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31038314" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1816919810" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1804106314" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "393145886" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{96AA1B60-075D-11EE-9156-5A0CB913B9C1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1804106314" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c661734e21f29b49af1d7b23e5bf7400000000000200000000001066000000010000200000005ad553fd2ef67beb7f65d5f176d85d2fc293c5ae9928cb6f8cfe1cbbf4b027a8000000000e8000000002000020000000fb03cbf491386a81126b6d0376414e79c9e0e6581a1728b8cf800bc8edb3d9ac20000000ed6769a040ab5453d20a00043a83cb44d057110fb0f6c195a773d3b9dfe43272400000000ed3054612d5b4e7f4cbe3b3461000abb19a825a9f76fb4f2587c33203592743d777882542e91a42dc93e311b5db26fec9472e18adbb7c9b2c0a3585c56bd5f2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31038314" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5069b66d6a9bd901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10c6cb6d6a9bd901 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 4060 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 4060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 4060 iexplore.exe 4060 iexplore.exe 836 IEXPLORE.EXE 836 IEXPLORE.EXE 836 IEXPLORE.EXE 836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
MSOXMLED.EXEiexplore.exedescription pid process target process PID 2264 wrote to memory of 4060 2264 MSOXMLED.EXE iexplore.exe PID 2264 wrote to memory of 4060 2264 MSOXMLED.EXE iexplore.exe PID 4060 wrote to memory of 836 4060 iexplore.exe IEXPLORE.EXE PID 4060 wrote to memory of 836 4060 iexplore.exe IEXPLORE.EXE PID 4060 wrote to memory of 836 4060 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\jokescript-main\ygn-redbot-whowhere-garticflix\garticflix\unfav.xml"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\jokescript-main\ygn-redbot-whowhere-garticflix\garticflix\unfav.xml2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4060 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
471B
MD56a696bab5dbda1f9e3dead87bbdfda15
SHA1efa2517cc9c306a85acce2f45a1b1a4763bc0ad9
SHA25627afd05f059c8af3bf76e14ec650eee55d2d4ef298669efd65ca1acaeb66ac2c
SHA5127bed5bb59abb768ebbf6d597e8b3b14be75cb23b08bd64945bfc80fcb0b9ce155d961c8b67512943ad30895be6201e669c1c0f8481373f2a95a744170e3a9050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
404B
MD58a1c82bdff677a1ec4f56c5338390616
SHA169ac67ff018ea3f3506024dcb453fe3642afabd3
SHA25603618579d75aab49d14d10f43745aca5794022fc48f47a7ca215312f383491ef
SHA51272362d045777df42e1a6c011e540017906f816986c0982967d6b34924129c1edd996243e40fb65578605e8fe049f50d88b5cce5fdf245bb2937da2b2c8f8e6b4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\JXO1ZP0L\suggestions[1].en-USFilesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
memory/2264-133-0x00007FFC6DB90000-0x00007FFC6DBA0000-memory.dmpFilesize
64KB
-
memory/2264-134-0x00007FFC6DB90000-0x00007FFC6DBA0000-memory.dmpFilesize
64KB
-
memory/2264-135-0x00007FFC6DB90000-0x00007FFC6DBA0000-memory.dmpFilesize
64KB
-
memory/2264-136-0x00007FFC6DB90000-0x00007FFC6DBA0000-memory.dmpFilesize
64KB
-
memory/2264-137-0x00007FFC6DB90000-0x00007FFC6DBA0000-memory.dmpFilesize
64KB
-
memory/2264-138-0x00007FFC6DB90000-0x00007FFC6DBA0000-memory.dmpFilesize
64KB
-
memory/2264-139-0x00007FFC6DB90000-0x00007FFC6DBA0000-memory.dmpFilesize
64KB
-
memory/2264-140-0x00007FFC6DB90000-0x00007FFC6DBA0000-memory.dmpFilesize
64KB
-
memory/2264-141-0x00007FFC6DB90000-0x00007FFC6DBA0000-memory.dmpFilesize
64KB