Analysis
-
max time kernel
27s -
max time network
20s -
platform
windows10-1703_x64 -
resource
win10-20230621-en -
resource tags
arch:x64arch:x86image:win10-20230621-enlocale:en-usos:windows10-1703-x64system -
submitted
27-06-2023 20:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://scalpmarmotproclaim.com/tv0cida582?agdmhzi=31&refer=https://ieurostreaming.vip/the-rookie-6/&kw=[]&key=6ab1a97d425f753077683e685e9e164a&scrWidth=1280&scrHeight=720&tz=2&v=23.5.v.1&ship=&psid=CF-2371_0&sub3=invoke_layer&res=14.31&dev=r&adb=y&uuid=9e4f72d2-5589-43dd-bd06-8e808dd7bc08:1:1&adb=y
Resource
win10-20230621-en
Behavioral task
behavioral2
Sample
http://scalpmarmotproclaim.com/tv0cida582?agdmhzi=31&refer=https://ieurostreaming.vip/the-rookie-6/&kw=[]&key=6ab1a97d425f753077683e685e9e164a&scrWidth=1280&scrHeight=720&tz=2&v=23.5.v.1&ship=&psid=CF-2371_0&sub3=invoke_layer&res=14.31&dev=r&adb=y&uuid=9e4f72d2-5589-43dd-bd06-8e808dd7bc08:1:1&adb=y
Resource
win10v2004-20230621-en
General
-
Target
http://scalpmarmotproclaim.com/tv0cida582?agdmhzi=31&refer=https://ieurostreaming.vip/the-rookie-6/&kw=[]&key=6ab1a97d425f753077683e685e9e164a&scrWidth=1280&scrHeight=720&tz=2&v=23.5.v.1&ship=&psid=CF-2371_0&sub3=invoke_layer&res=14.31&dev=r&adb=y&uuid=9e4f72d2-5589-43dd-bd06-8e808dd7bc08:1:1&adb=y
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3592352177-2971570228-3741369827-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8803381A-1525-11EE-B7D4-EEA443BC41B7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3592352177-2971570228-3741369827-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3592352177-2971570228-3741369827-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3592352177-2971570228-3741369827-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3592352177-2971570228-3741369827-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3592352177-2971570228-3741369827-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3592352177-2971570228-3741369827-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3592352177-2971570228-3741369827-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3592352177-2971570228-3741369827-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3592352177-2971570228-3741369827-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3592352177-2971570228-3741369827-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3592352177-2971570228-3741369827-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3592352177-2971570228-3741369827-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4684 iexplore.exe 4684 iexplore.exe 4248 IEXPLORE.EXE 4248 IEXPLORE.EXE 4248 IEXPLORE.EXE 4248 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4684 wrote to memory of 4248 4684 iexplore.exe 66 PID 4684 wrote to memory of 4248 4684 iexplore.exe 66 PID 4684 wrote to memory of 4248 4684 iexplore.exe 66
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://scalpmarmotproclaim.com/tv0cida582?agdmhzi=31&refer=https://ieurostreaming.vip/the-rookie-6/&kw=[]&key=6ab1a97d425f753077683e685e9e164a&scrWidth=1280&scrHeight=720&tz=2&v=23.5.v.1&ship=&psid=CF-2371_0&sub3=invoke_layer&res=14.31&dev=r&adb=y&uuid=9e4f72d2-5589-43dd-bd06-8e808dd7bc08:1:1&adb=y1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4684 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4248
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD560fe01df86be2e5331b0cdbe86165686
SHA12a79f9713c3f192862ff80508062e64e8e0b29bd
SHA256c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8
SHA512ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23
-
Filesize
503B
MD5590dfa5187707508cb062c0956b7093d
SHA16f235713e4028c6f6faaa7f4d076a5bd415cada6
SHA2563f90d5792707b153016b2f08e2046baf4b0222736a2c84daa0baf175889073b5
SHA512858f24e2532d07b4cc046eb442f085bbc83f6fd5bbf25c0dbaeb0df929af41a7ef8bf70c92dbbc2d741f8b1a6581f5fe2519a461e44d860eac63d674f84a7f9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD5699ef5cf7e78b55e2213b6143f57f249
SHA1acc3a737a598343674290c43ff591cb462f3d819
SHA256fa467b564c064152c7bcca1c785a13e0a13b7fac45e98e436b639c410349de21
SHA512ce8334e3768c7c563c33753b3ba58ecc37e8d94bb5c8823a88509725f7b63da429ed7d096dfe893f173439d83befc152fe333da7ccc81f343caad13c7384d326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5B04DF26A916EE6AFD03D3F62E9C5D17
Filesize548B
MD5e9e68ac0f83b87ac5e53879aaa4c0e9c
SHA1a8073a88d012727b87b4fa023b94c23e8d7279e0
SHA25634b28b0454880dd9d1985186877e96d71047dc70d2388225ec76744ce8d095fe
SHA512a33bf5a04b5f7687e55c9777c2527de12c4a49d492b5e0069a917a2a89edb9a32f9edb64e21cb003961995a5b5a1766099c3b5e790179467515d1f95a0dd636e
-
Filesize
576B
MD5f76e95aa42153a9047cd4b8bcca0be00
SHA1f67a235e807ec1d016d394d9d3790a95846e89fd
SHA256cd37f4f58b91e31ceb237b9470026a39bb96cf967b5886698bb2e38e65bf34e2
SHA5127425d21efe1c5d00e42916777675c797388b82b1fe7c521a42010fae59d0644daca5cad7498b26a0285d20b76b3bc9e2c5129abc14870bef574b270abd36e43d