Analysis
-
max time kernel
141s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05-07-2023 22:15
Static task
static1
Behavioral task
behavioral1
Sample
mail.gif
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
mail.gif
Resource
win10v2004-20230703-en
General
-
Target
mail.gif
-
Size
42B
-
MD5
d89746888da2d9510b64a9f031eaecd5
-
SHA1
d5fceb6532643d0d84ffe09c40c481ecdf59e15a
-
SHA256
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
-
SHA512
d5da26b5d496edb0221df1a4057a8b0285d15592a8f8dc7016a294df37ed335f3fde6a2252962e0df38b62847f8b771463a0124ef3f84299f262ed9d9d3cee4c
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "395360337" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ab35dbc53fd45498f88cda789e11c5000000000020000000000106600000001000020000000c4898e52c6181bd65b842f7836dbb32fd3786309cbdf4440ce5076f9f18ae69e000000000e8000000002000020000000b75c2f822fc44b01f92ee040c89729bd47c3920db00fac2c8ce914c7d6bf150320000000677609020314cb3de9d7916f76f95e67ddc5a1da508b698b243c47ab0059411d4000000048601ee14e5099d3c1762c0b485fdfc2c459214ad9990aea29362a55343f11a04407e6391778703c181aa8c085d7bd6da7886452550ad165b5f374c29b4c75fb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 707acd5b8eafd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{86D12A51-1B81-11EE-AA87-6EF46A3BE504} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2988 iexplore.exe 2988 iexplore.exe 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2260 2988 iexplore.exe 28 PID 2988 wrote to memory of 2260 2988 iexplore.exe 28 PID 2988 wrote to memory of 2260 2988 iexplore.exe 28 PID 2988 wrote to memory of 2260 2988 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\mail.gif1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2988 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2260
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c221d138b343863bcddcbeea251d06e
SHA1ea088e1127f4186f9949fb8eadc5814213f8b6ac
SHA2560821b7ddac517a5fda006600758e00ac02ae7ff124902bc5521b2fa537d842ec
SHA5123cdf2a845971c48b9c2b851fa5df40ed1c3eeec74c5ee1f5d42a77c81dea2bdfa0182329e5216295a11e91ab99dd1029cd7e95ef29985d2b9e7261eaf1dd9766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b31cfcae683e68832df6b694144bbca1
SHA1dbf60f63df32a6cbfd64985390816907ac7d85ce
SHA25679497682a61e289d2699b4679dd8d1b4c9d51a636475f8edd7af354fb3a882ae
SHA512d0a9d4cf67ea1bb9de6f287922d032050cf638ee10c9c330e541792efcb6cbe7e4fafb1ea14c85764b1c1670df1e4288be0a598e5324f0fdc468586a5907e5a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537b1cb4e9d7a96dec6a2e0938a3a3b83
SHA12ab99fef694ffcdf5247c6dd1d53bd77b905e234
SHA2564efd40ba15d12a681c7d1cc1f311d19877c77a4494c04c9eb5eec06f4d33979c
SHA5122677c19eea603d3da3ede67a1500a399bfbfaa86b40df2caa04224d92576da5a039a55fb86f9e395f7b89b05dee6e40a8993783917829d12a8920865f022f479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57603c90889fcb6549cedb24ef67b3737
SHA1a812d6331758cdfb97e7c30a05476b6581151e6e
SHA256bc35ed4176367f717b8fca68ede4cdac0ed92704872453a2c6dfcba8982c50f0
SHA512e2cc49c943692c36a1a53d4412f0044293f285d1f4e4a9ce80b5538ba7c9fc07c1174bb9e0be75d235718dc0cbe14ad689fcbf8f4c2d58c6c628b8af9ec019c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dfd5cb69a5855a315ac2161391c83ef
SHA198d43b4295fc89ae9252b34e997e92f2cee68b63
SHA256c78ac4adda5b838e5037a84bf728de0ee2ca2af6a9511fe460b06e8dc4960a70
SHA512b663f12f65f59e9c26c2d95a8d8715e4587036878c66af70eabdade893c06d5a17a07e17f136d7219ca057efc0c792da3a29a5f3d0f38adf36ac742a2c07be59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521f85fb7c79127f99b52167a0f156fa1
SHA17437221f8af734a91141aac0a7591f30b48faf6b
SHA2561a7bf51d6e0337a9a5f541cf560f3c09197393f53a79c562a0109c4580b2aa1a
SHA5124144063c0b73bff743c27cb58156c6c0cbe56cd2de4eae2deebc7ec85a472c7fac3a4d20246afc5135f3053756bdfccdeba45dd32f3a5a90a996c08c4037e011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ded5066c099ee6de02d3ade445f21f0e
SHA15d353739ed086b0eaca96321a73fb4026e626ff8
SHA25607de6e69430282561493e79ca8ea330075f9aa7ec8ab178f1f1dc05604252e95
SHA512458283756e1ee12e4d3a9ed71e256a5aafac3e554dd66828dc7f0613a439a7b7a7d48936c10b7c7236c0d331c0373676697f64dac74b9add091072c1d0b33e6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e963f5acd453f5670c5e25f6d682158
SHA169e7355bd9df591d1e5906ed1d7ea9a0233f6d37
SHA25659adac048920f62b9219d3d47de6ed9d3eb5ae186915d4218fe7dcc9c5fe5ba7
SHA512ddf7083b910ab63eda6b35f5bedc0d8eb5df5514739ce534335b4f3cc58db08d74aa68eac7e8346849d87ad4c9101622bec9a639e89de2dabaa1919770ebc06f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51163f3b150f04065b201c3d46fe27c71
SHA10a6c16e2c81e7cf23026b855a62e93405abf5d1d
SHA2566dd8d4524630bc9c70ec84d113e7cad2f75a5de2a73dc9e57b39963aa437065a
SHA51296e305fa0f26b7619182eaf88de0b5c9445753cd1b252c1a1b8c60d4423265b7aeec17cd12e451f6dbf73c8fc23cdecdcfdbbe8c7313a577d0a3869eb13edce5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JHFV4GXP\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
601B
MD52a1aafbe716a323bee9dc29fab4f6a08
SHA1015604ce386fe4c9d9b19632cd084bb1c8d715a4
SHA256310f8cd8f7bca1bd6147de740063b06a2b5047d6c44e059f5581f0d07038c0fb
SHA51224bc83393ea4557b5c366ff1c1b54eab991f006e2f6a204645e826440615d921d3e10695ef076febb7785e8b6fc51e312b9d7f31b40557f9ae02e0e99fe0b4e8