Analysis
-
max time kernel
63s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2023, 17:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://downloads.dell.com/FOLDER10192118M/1/InvColPC_11.0.3.0.exe
Resource
win10v2004-20230621-en
General
-
Target
https://downloads.dell.com/FOLDER10192118M/1/InvColPC_11.0.3.0.exe
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 1672 InvColPC_11.0.3.0.exe 3928 invcol.exe -
Loads dropped DLL 6 IoCs
pid Process 3928 invcol.exe 3928 invcol.exe 3928 invcol.exe 3928 invcol.exe 3928 invcol.exe 3928 invcol.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3976 3928 WerFault.exe 88 -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = acb2985b55a4d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{B8FD8DEC-1512-11EE-BEC7-D2427B744E66} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2374923321" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\SOFTWARE\Microsoft\Internet Explorer\RepId\PublicId = "{82589995-F644-4096-966C-02D0E94C81F0}" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2374923321" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31041823" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31041823" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DownloadWindowPlacement = 2c0000000000000000000000ffffffffffffffffffffffffffffffff100100003c000000900300001c020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4956 iexplore.exe 4956 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4956 iexplore.exe 4956 iexplore.exe 3568 IEXPLORE.EXE 3568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4956 wrote to memory of 3568 4956 iexplore.exe 84 PID 4956 wrote to memory of 3568 4956 iexplore.exe 84 PID 4956 wrote to memory of 3568 4956 iexplore.exe 84 PID 4956 wrote to memory of 1672 4956 iexplore.exe 85 PID 4956 wrote to memory of 1672 4956 iexplore.exe 85 PID 4956 wrote to memory of 1672 4956 iexplore.exe 85 PID 1672 wrote to memory of 3928 1672 InvColPC_11.0.3.0.exe 88 PID 1672 wrote to memory of 3928 1672 InvColPC_11.0.3.0.exe 88 PID 1672 wrote to memory of 3928 1672 InvColPC_11.0.3.0.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://downloads.dell.com/FOLDER10192118M/1/InvColPC_11.0.3.0.exe1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4956 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3568
-
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XW4YEBB9\InvColPC_11.0.3.0.exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XW4YEBB9\InvColPC_11.0.3.0.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\invCBFF_tmp\invcol.exeC:\Users\Admin\AppData\Local\Temp\invCBFF_tmp\.\invcol.exe -bdir="C:\Users\Admin\Desktop"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 7004⤵
- Program crash
PID:3976
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3928 -ip 39281⤵PID:3240
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.5MB
MD533317adb46ee3a45b65bce5821f1f7b9
SHA172f4a67c325d3147f54d344d88171cb21869b75b
SHA25673ef899432e5895c5c044c1cdbd9054759008ffd4b1d80cdb2391fdc4c859858
SHA512c6bb7e02b468b97227fa10e8811c1bc3b4932c61ef7ef175c7a694695df7ca8af9101be25d1360bec6f7fccdf8d66310cc0e5331a4c003ab9c36836ff5437c59
-
Filesize
11.5MB
MD533317adb46ee3a45b65bce5821f1f7b9
SHA172f4a67c325d3147f54d344d88171cb21869b75b
SHA25673ef899432e5895c5c044c1cdbd9054759008ffd4b1d80cdb2391fdc4c859858
SHA512c6bb7e02b468b97227fa10e8811c1bc3b4932c61ef7ef175c7a694695df7ca8af9101be25d1360bec6f7fccdf8d66310cc0e5331a4c003ab9c36836ff5437c59
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XW4YEBB9\InvColPC_11.0.3.0.exe.6q1ketb.partial
Filesize11.5MB
MD533317adb46ee3a45b65bce5821f1f7b9
SHA172f4a67c325d3147f54d344d88171cb21869b75b
SHA25673ef899432e5895c5c044c1cdbd9054759008ffd4b1d80cdb2391fdc4c859858
SHA512c6bb7e02b468b97227fa10e8811c1bc3b4932c61ef7ef175c7a694695df7ca8af9101be25d1360bec6f7fccdf8d66310cc0e5331a4c003ab9c36836ff5437c59
-
Filesize
69B
MD5309382d03a5668b46a6a99ef235c8380
SHA19c74fbfb082a2e8e9fd663e2523b26b6b73fe529
SHA2560fb9216ed2d3331177a4353f45a553b27b590ea86f16affde510b4d9955f0ca9
SHA51206c631748216eec90f87a1bc3878c3097f4cf0384ef7c6b34c970b3c22c7050905e22fa2a03c0426edefeffca7110bc9a4101d0360f134ab2ddf9f5d60d3c52e
-
Filesize
5KB
MD543b8b7358adedb0c648341e3793525f2
SHA166f1a7c386834d9b2d541e49f293a9982dd4e837
SHA2565c80c1ee6233cdffd0ba077d124162ca2ddb8524d0fb7891ac7ef099c082ea3b
SHA51222a1bc5f845132814a7b0e57b93d8e00832ad455475c5adb484a27d0b6c67ac30ef57bf3b427cd38bdaf86a6ddf273140bc9e0301a3145dcfca086b362b64f85
-
Filesize
499B
MD54228bbca64f8930e731f86a04c315a97
SHA1832e5c640c186f23097012a05029435d9e334bc7
SHA2561bc14f6aae8579e18446fad5fca50568dc2ebbbda16f7bc9fee78e6f85d5eb71
SHA512ea2646c663c84bf8c30d8b215e991991cc2033a3cc117bac343275b59525b3f222c4b1471606f74affa00d59d633c659f62778e2d41a8cdf6b48941e6e64703f
-
Filesize
1KB
MD5e5d2eaf60bc56b14989f57a58f5a0829
SHA1d53d62084936dfd5a8081b84d8fe0412b66109ac
SHA256da569fdf18a6d18ceec6c1fa850ff702bb947a1559a2671817e2955e37481938
SHA51229d19a8a5dd1ddedf12e25a93c0903e57babd7822669d839765583dd9834fe5d817e05da52c2543faf9bc8977d7446b4e391056f3fdf0677bcf23995f165cb35
-
Filesize
436KB
MD537dcbba718886e5c24703b1268ce10b9
SHA1441738a1ea802c266cb0a84789ace62e40010335
SHA256968bbd2a36b04cc5795c6fc99afe85e4d294ff9c28032ce0e870463827181799
SHA51200ab4cfe4b5bb989f2931cc8928982819a99df027b118c731957fc84c58cc8d636687ff39cf90dac313e3fe7c7738a4899fba98ebab5b6ed4cbfa372b0eb2561
-
Filesize
130B
MD5dd9f9c913dc476d6a64449e4842de944
SHA142fff2606077cee64232101df710a653d2357f4c
SHA25693d3534ede6a89da26a22cca4856c007c7804f0f90337970fe7a2e9e9f3c0c8d
SHA51263971868f96d350d8988e25ceb656769bddcdbeb586aa0ed7a3571c4c84edcee70753cc98fba469b76c891b2a20a7b9a68d5b7c4e8261edf25db704112446fbe
-
Filesize
2KB
MD599f748c247b79478f7652133ebb12cb2
SHA13324f5df4edd293beb03490196b26a0f36674944
SHA256a1e59eb0cda090faf87b83da67afa11e44b2ab6f81c815fc5286c93397f9ba04
SHA512ede81ef11ffcd6404300bba3f05ac97d6c6ded6f71065576ec916db0abae8dbfd74e914c9f03779fdc835c1fee359ce13bdfe00fbc2af182b88052569d150e06
-
Filesize
375KB
MD5e0e2408478a1466a33186205f7d3d6dd
SHA150062188947b371469460464aedb8a2ebface3f4
SHA256964b4819b91c7577ce5c07356f7ebae3825d37c86e259c2cdcaa50be710ff8c9
SHA512016160d1a8b3a0fbafea1a2315824e3525a952d30de09fe4e7eb699d4294ec69327ae0cf54e90db5a0751279b9f6069a7902844aa050dfa9d31c58049c531e7f
-
Filesize
128KB
MD530aa7e953010b6b40f5cb83f6aff782e
SHA15ec0f4e8c60db66567983c858bd9b2780158b881
SHA25695fdc46b7b1f57f0546304f9816894a6caf5fb767b7dd0aff2889cdc79f97ee0
SHA512f58676f8f517da6aba2b02da014fd4b5c6e66d646c9635783e7f4af9d65e9c37e3ce7f86e87f11bef53c8d03a5938c732f3b777b7109f7177062049e1b0e8c9c
-
Filesize
1KB
MD59512cb4a8245bea4322f8bc680ac0dc3
SHA17ed23dc741ca0328562629f782e6456372f1c04b
SHA2569141964056b46365da57f704104eea7d222741b3438d567c7f1b7569e0c0534c
SHA512aae4d6e8c6edb14b774e348fec4e5fa3a3790e747c8526fc313efe34d7c2607779ff81785aca2640a60a7e308ec398a3035adac6488d66946b3e06fdaeddbdf4
-
Filesize
2KB
MD554bfe695f971a7fea12f6c03fcc252a8
SHA1f833610b2b4d71af25284dcd1f5d6656d18f2732
SHA256f5e71f263f0cffe305fa085fa27030ed4e652e8a363e8beaf04673a6d19a3215
SHA5125f0132086647cd317a0130ee6dac12afe975ad00bd6eeed7e7f216215667815dc1a9487bed23a848d6853498e74731112175270c49ea9690251f949bb5a42015
-
Filesize
88KB
MD581b11024a8ed0c9adfd5fbf6916b133c
SHA1c87f446d9655ba2f6fddd33014c75dc783941c33
SHA256eb6a3a491efcc911f9dff457d42fed85c4c170139414470ea951b0dafe352829
SHA512e4b1c694cb028fa960d750fa6a202bc3a477673b097b2a9e0991219b9891b5f879aa13aa741f73acd41eb23feee58e3dd6032821a23e9090ecd9cc2c3ec826a1
-
Filesize
701KB
MD5a43f77d8dd56898bb162f5635d49d1ac
SHA1cb2d297ddbd14524bffa448bf4ab1dcdd7ae9b0f
SHA256ecb0049859e8200072e86e9b6e204bfd5b9477f63205e9693d9caa45f7fca136
SHA512b6b0e3e69f5165f4d6f42fd7a4c952a3079f01db7b1b5e6707fb4c7c58dcb12ce558a5902b59cafe0120148b7cd3d7cec23e0281ef4c509e230337dc09b2a15d
-
Filesize
701KB
MD5a43f77d8dd56898bb162f5635d49d1ac
SHA1cb2d297ddbd14524bffa448bf4ab1dcdd7ae9b0f
SHA256ecb0049859e8200072e86e9b6e204bfd5b9477f63205e9693d9caa45f7fca136
SHA512b6b0e3e69f5165f4d6f42fd7a4c952a3079f01db7b1b5e6707fb4c7c58dcb12ce558a5902b59cafe0120148b7cd3d7cec23e0281ef4c509e230337dc09b2a15d
-
Filesize
1.1MB
MD50aa4f4528cba2001b8e4c98f1fe74bdb
SHA18529373454de4190802fcd0211c6c1b71f80ff45
SHA2563d2febe2fdd92f07253f1537ee964c40f56d77ac85711aa358681c7cd01aa02a
SHA5128c2039864865da1ef68be681e056f7bccd36ca4d605c705203ece64dc8c204410cff7ec81c747eeb6ff67285818d17fc104e46eabb91e3e751b5c3d1a51e3527
-
Filesize
1.1MB
MD50aa4f4528cba2001b8e4c98f1fe74bdb
SHA18529373454de4190802fcd0211c6c1b71f80ff45
SHA2563d2febe2fdd92f07253f1537ee964c40f56d77ac85711aa358681c7cd01aa02a
SHA5128c2039864865da1ef68be681e056f7bccd36ca4d605c705203ece64dc8c204410cff7ec81c747eeb6ff67285818d17fc104e46eabb91e3e751b5c3d1a51e3527
-
Filesize
1.1MB
MD50aa4f4528cba2001b8e4c98f1fe74bdb
SHA18529373454de4190802fcd0211c6c1b71f80ff45
SHA2563d2febe2fdd92f07253f1537ee964c40f56d77ac85711aa358681c7cd01aa02a
SHA5128c2039864865da1ef68be681e056f7bccd36ca4d605c705203ece64dc8c204410cff7ec81c747eeb6ff67285818d17fc104e46eabb91e3e751b5c3d1a51e3527
-
Filesize
40KB
MD573fb3504f2a9f114453260759848e872
SHA194a7ff3f93f5468e0f1308ff07b82cb1cabae64b
SHA256ec1e24fc3d95204c4044707bc4171acb5241c4dad17ae758e044ad0a0a2a6b31
SHA5121008f76184f7d1a51651c3c68709abe4b5b271dfce3fe78484a231a64b00f616789d08efc2254e2a69542a1d7da20b33552033b1090d024e4d6568313d4fa89a
-
Filesize
40KB
MD573fb3504f2a9f114453260759848e872
SHA194a7ff3f93f5468e0f1308ff07b82cb1cabae64b
SHA256ec1e24fc3d95204c4044707bc4171acb5241c4dad17ae758e044ad0a0a2a6b31
SHA5121008f76184f7d1a51651c3c68709abe4b5b271dfce3fe78484a231a64b00f616789d08efc2254e2a69542a1d7da20b33552033b1090d024e4d6568313d4fa89a
-
Filesize
436KB
MD537dcbba718886e5c24703b1268ce10b9
SHA1441738a1ea802c266cb0a84789ace62e40010335
SHA256968bbd2a36b04cc5795c6fc99afe85e4d294ff9c28032ce0e870463827181799
SHA51200ab4cfe4b5bb989f2931cc8928982819a99df027b118c731957fc84c58cc8d636687ff39cf90dac313e3fe7c7738a4899fba98ebab5b6ed4cbfa372b0eb2561
-
Filesize
88KB
MD581b11024a8ed0c9adfd5fbf6916b133c
SHA1c87f446d9655ba2f6fddd33014c75dc783941c33
SHA256eb6a3a491efcc911f9dff457d42fed85c4c170139414470ea951b0dafe352829
SHA512e4b1c694cb028fa960d750fa6a202bc3a477673b097b2a9e0991219b9891b5f879aa13aa741f73acd41eb23feee58e3dd6032821a23e9090ecd9cc2c3ec826a1
-
Filesize
88KB
MD581b11024a8ed0c9adfd5fbf6916b133c
SHA1c87f446d9655ba2f6fddd33014c75dc783941c33
SHA256eb6a3a491efcc911f9dff457d42fed85c4c170139414470ea951b0dafe352829
SHA512e4b1c694cb028fa960d750fa6a202bc3a477673b097b2a9e0991219b9891b5f879aa13aa741f73acd41eb23feee58e3dd6032821a23e9090ecd9cc2c3ec826a1