Analysis
-
max time kernel
15s -
max time network
23s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
08-07-2023 09:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://copelyroq.ristorantelatrafila.it/
Resource
win10-20230703-en
General
-
Target
https://copelyroq.ristorantelatrafila.it/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2767205360-3565838719-3800013281-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2767205360-3565838719-3800013281-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2767205360-3565838719-3800013281-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2767205360-3565838719-3800013281-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2767205360-3565838719-3800013281-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2767205360-3565838719-3800013281-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2767205360-3565838719-3800013281-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2767205360-3565838719-3800013281-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2505C827-1D75-11EE-B5F0-DA41075C5F00} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2767205360-3565838719-3800013281-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2767205360-3565838719-3800013281-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2767205360-3565838719-3800013281-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2767205360-3565838719-3800013281-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2767205360-3565838719-3800013281-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2767205360-3565838719-3800013281-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4952 iexplore.exe 4952 iexplore.exe 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4952 wrote to memory of 2240 4952 iexplore.exe 70 PID 4952 wrote to memory of 2240 4952 iexplore.exe 70 PID 4952 wrote to memory of 2240 4952 iexplore.exe 70
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://copelyroq.ristorantelatrafila.it/1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4952 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2240
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5c6844a7892056ca8c0418cf1b91bbf7b
SHA12a3403af55c4a566fb4a1146ddd939884f0c7a30
SHA2567fa766627d4be753b3cedceeef36d62d3f33475e87233313ed0c476be178a731
SHA512e482be79ec2f0190043a42583e3019c9578d12a0870063a2200c43434f0021a2a15ead7da82d7ff24380b818d8e1b142af424dc0ddf6911b5e799c7909872387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD5cfbc16e33dcbef6f773f0f79af528f45
SHA1ecb8d5e8107bc671dd57fb2a137c00bffa419f1f
SHA256f0937890fb1053069baac97b7992c6d22cb74cae20317fc05d51070d96950ffa
SHA51259ac2ead1eb84edffb06867850beb1e63f72c5b5415abd2fd4e7c2a1922c368f612d2a0288c00e32d5da47c4a77968ffbe72660a8d1f577f44fb20df9c11a4af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5d181df8cfd35e6855875098f7214fce2
SHA166407763ff86fe4f3b8a0d0c0d4e0f6967b81c72
SHA256700953fc201678218b7707f2ce8b8cc3cb17c2450bfd5b72dc770150e119a72c
SHA51287c31263c0350a5c1a939dcacebc04f3c427b4f9be16b99ec72d934c646e4621fd6784e6a4260bd4b0158f875325a8e7f03af38ea68514f6a0e1ecb8c0f401fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD513d12b891a450b135219c0876a84c583
SHA15da86dca84c1f47496981be8d7792ec732f229fb
SHA2565912c77e92262525e01e1b59205deb4ef5594f8d750ba10b3b7ca8292ec38f82
SHA512a25f7b4d17477540324d3800eeb49dadab7e2df5ef0cd43c61efad7d629c671e002554e6ddbaa68cc97bf1bfebaa1391ed36215761a4a66ecd92750cc0cc5f6e