Analysis
-
max time kernel
193s -
max time network
219s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
02/08/2023, 02:45
Static task
static1
Behavioral task
behavioral1
Sample
KLIPE.xml
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
KLIPE.xml
Resource
win10v2004-20230703-en
General
-
Target
KLIPE.xml
-
Size
231B
-
MD5
11ecbb3916054252fc5a8b803158932c
-
SHA1
ffa94b453798d204157eb319d940652c33caa7a6
-
SHA256
198634c2eed0a4827ce218be98c480b9c4a48778705cd10f46c3041fed312308
-
SHA512
ed7f5afff82ed15781c3f0c7a693fe4add082eb60f36d832577885d8ec992cd5b54fc1de5756f253d443d9cd3d6599e668ac8e8d737032a7643684c40ab33e94
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50fa3490ebc4d901 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BB2C4E21-30DE-11EE-8428-C20AF10CBE7D} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "397709342" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002a91d4b999c9854dbdd04be1b9b2202d00000000020000000000106600000001000020000000d61c5cf5418784242178ab64540eca45656f758c80f69d9a587ace77bb8cdc54000000000e80000000020000200000003042a76c5aa2b7b17118b3d6e712ffe24124cc4a2179110c5a97b4db4deb7ce590000000ed7de9e08cad2554c09768dc63a651cc855a99b3e09ac68078c6129a90a5a91f5b4c9dfd9694e7eb13f1e805f862344b191e6a237cf54f9c08de2f2d8a8e6ae0d5018dad6938c9d5f7fc8297df09af9aa4b1f8e1774c014c32dba87c6fd88607887c58f7ada9626f4c5db432b6d2a2db0ba5431634221c916e58eff9131bee050de1ec6dfe55c95d2651f81c37341f1840000000df62b63ac5a09c0a1acf4c0e87b2908a21a6ba1ce272c608a3941be29a314fad1eb19a3e8012aaf7ea66a0e5e296c23adae5c3637851cc215ac4a1f616e3eb9a IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002a91d4b999c9854dbdd04be1b9b2202d000000000200000000001066000000010000200000002ae4331aa0077675467f72b8f6889840e89757f73774fac729e8fe7ef84882ef000000000e80000000020000200000006e9fcc17d699c44606ae012859fcbc3e5ff40eca287878cca43d9048191198232000000061a5daa05acf8a49d6ca6a30a5633e55782dc8198ef8eba8aa186c495b41075140000000f284fe883de84dcf9dc848bf6c4647930d42b18d1492ca0cab46b8a217910567383ada41d5be896499ce10168208541032b46019765a8768132c6177b92920c4 IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3008 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3008 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2952 2820 MSOXMLED.EXE 28 PID 2820 wrote to memory of 2952 2820 MSOXMLED.EXE 28 PID 2820 wrote to memory of 2952 2820 MSOXMLED.EXE 28 PID 2820 wrote to memory of 2952 2820 MSOXMLED.EXE 28 PID 2952 wrote to memory of 3008 2952 iexplore.exe 29 PID 2952 wrote to memory of 3008 2952 iexplore.exe 29 PID 2952 wrote to memory of 3008 2952 iexplore.exe 29 PID 2952 wrote to memory of 3008 2952 iexplore.exe 29 PID 3008 wrote to memory of 2524 3008 IEXPLORE.EXE 30 PID 3008 wrote to memory of 2524 3008 IEXPLORE.EXE 30 PID 3008 wrote to memory of 2524 3008 IEXPLORE.EXE 30 PID 3008 wrote to memory of 2524 3008 IEXPLORE.EXE 30
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\KLIPE.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b438e9c491dc3fa950df297301f61d68
SHA1de5cfcce81ea64ca68580e0b1e0c80f161a07a5d
SHA2569dbd27c2adde773bcc95a0b9a9d379962b110891cb1551b54b747811478f8ebe
SHA5127898fbae8988d90a693da39c27a238f63767186b882e2283c5f53b935b660de860655ff69fdbbf7aa21c1eace26d0f9303029b8a03ae4ff6fe66cf76b43284a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5058a2945acda14e2ed919920b0d028
SHA16edb5b8e70394b6cdbf11aeb86efc6e33c8a9619
SHA256b750f8d40a662087c4ff6f4f830d0067b3951e05f76ac9be2628f1973f99c39d
SHA5121d28d8c0fca786616257905cc3fa57b1f212b7eadf6b751a70478bb97af7c5d0e3a64b39bf3037907c6416ffc04b1d031c096d7e8b06b76110dfe97af78d1167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5001f6ab56d50aa44ec878a12aad344dd
SHA19e8a5f3dcad38bac9a29fb6f5c18d01f9344b423
SHA256e7feff7becf175b401dd5777f6f4c308775b35dfb5078c33be410e7987ff9b26
SHA5129f0a00f26abeb4423bbc56dfe811ba7b5fb3a3a6ed14fa27c305055efae531cb45e9c3dbb2aae959b5b5c7e6eb66ffee7ba0c3d64df347699e2a7766a3bfb4b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9360a44f30889d6c7fe8f76dae6ec72
SHA1688d87d65ed33065afc0be384b4e4b42f2d7148c
SHA256ccd3742ed1ea6cf3ded48e7a4ee304066104ac785e906d6cf7220584d3978348
SHA512b43dae1de46367030c04a2eeb7bdf5a332a58be7db579cf2aa9f24cc911a61cab60d9885a5051ae78a1e1c44516056e9e34d87b962e66d137444bbdf7acf8d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544145583b4470bd419ddcb3f44ad1c05
SHA11aa60782f7d3bb0b801b731e61f8ad5400ec189e
SHA256a819c3b1e309ac1e81f8beb1bf5d9d837839457eb50168f3e9ed30b84f3bdafc
SHA5120144da43d9f0e81fe42f0e4aa97c29c51517aa3e313deab3d7443b13770fc0c25e4d54ef4e81d128f77d6537e51b775ad692f4609372906ecc0067b4be4a11ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1658f98cb4de3424bc5ff726a6c0470
SHA1eb106e96425940cf912b69e2133de75de4bef56b
SHA256f7d57c7964320fab23b6f2a3abf49a829f35e9de23798db9f0797b1fb42afe8b
SHA512f500d64e3b30d8fd5c31790b21d8a9030b1eba98359db5249bf32be136349cba924948dea9cd65bd19f69c3463bee1a60d8ddbc3274a53d15b2ff2d2892bd4aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5694c22c62677c700e6032b242a8f3fae
SHA138668b2cccb06e806b53d288137d8f4a442f3eb4
SHA2567435050045313222018246c8194684285b17a56d969a45311d9bca0ae98c26a2
SHA512aff9a9c4b4c12666ed18a25ea44057ccd5e5cd4d631318fb84ab8d72e7874d42542d84d39a5fdcb549da957830a0740c3388c4b6db5035a237b37f7d2b9db740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eea43ffac9ea717b6f3274feee91f1a5
SHA1fb98b7653c27d9e3851af669e520befaf20d2fb8
SHA256a98942499f69164cbe314cd8e4ed3f37e1b44a291325e8f96de838bcdbe2fcd5
SHA51200fa49b9b2ab5b84a17d41abcc46f56dc0c613d91dfe858feaf3ccbc31d31ec1ddb3a0d35b036b31d73b6512707d10d2eedac42097f41f74335927c56293436e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b6858caa9485874e87b58e121fbbb11
SHA1b07577801c40d2b17d9a2f196ec43076dc478f74
SHA256b0e333d6bf38cc9bf3dd8826d80e32df26c1fd7ccd94ccd88f8cdf369f5aa926
SHA51264d68f7ceb042f6df241950a5e9b9a0e222ddc11113206e68f2c3e4504367e72f8e0c80d87201b531d95a4e248ff72c96e120ca517b688c2b1a6c1053d0a1eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587040e3c17c25f6f7029bb104dd0cd6f
SHA108bd4a21afe6f12ae2cb57cb900e59b2c98c7b8e
SHA25676da6896615c7583b111995ff7ef92b328d32fdf9bdfdca73967d5e9994ef522
SHA5129709f46a0620fca38d5a10251e1310faad97dde38d55b9a9de5ac95984ef31bb06f6fd63a56e531a81d032d0f9498f219dffc7299ec27db15cb513013f90f0b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5642b33f8b5d0a5ba283a9210c4bc9041
SHA152461f5ade577db35b54a778124d81e07eea5263
SHA2561ef0dc7073aff16cfc75c0dac6de242b7f213b7aa54d78fff51e981f95ff2f56
SHA512af8a28599be2e8a0525d1bea231719193ba966de3980f24b67762a5db2521209c586d05c6ac71a67e741a182a74ce915230bf8935c5fab0b36688031ddcd65a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5347a0303b37ac64415d9fb1b221b256f
SHA1a834e7ff1f38a111c75e732296036b20afd6d369
SHA2569b58fda00b8e739c658b0d592d958cff5cb7b14c5782926b491167b954c95f67
SHA5123ce8d2a28a24b847c06e85a2623b3a80bbf858e459fdd620d35734ab210121a71440eb804ecd75f91d74c79ba34cd27aa63be280dd4f9cba0b6a12ca0ae75a25
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2AKN11NC\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
605B
MD5c5d9ee112b4b01e4e919dfbb93df5bcc
SHA17048143f06aa8182eb73a9a0b5a5fdb4a247a655
SHA256f9028f4df977199023b4b62b74074a3d43792880376db7f45957d5ab041dd611
SHA512b93c40297255c99089ac722520b85203577917bf475e1c5ee14b3336f5745012407ef4d861c84193dc9819b59fc6719eeb0b8617e4601622eaf96e902dd1b119