Analysis
-
max time kernel
122s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
02-08-2023 09:56
Static task
static1
Behavioral task
behavioral1
Sample
GH6PeNA6e6_oO6olrdAmJpw1AyM=118.gif
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
GH6PeNA6e6_oO6olrdAmJpw1AyM=118.gif
Resource
win10v2004-20230703-en
General
-
Target
GH6PeNA6e6_oO6olrdAmJpw1AyM=118.gif
-
Size
43B
-
MD5
325472601571f31e1bf00674c368d335
-
SHA1
2daeaa8b5f19f0bc209d976c02bd6acb51b00b0a
-
SHA256
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b
-
SHA512
717ea0ff7f3f624c268eccb244e24ec1305ab21557abb3d6f1a7e183ff68a2d28f13d1d2af926c9ef6d1fb16dd8cbe34cd98cacf79091dddc7874dcee21ecfdc
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002a91d4b999c9854dbdd04be1b9b2202d0000000002000000000010660000000100002000000032dc404fbe4c645fba2478223b01474f89cfeac0d9b7d79d380a9dc07f044aff000000000e800000000200002000000025d17c6a078a9acfecb49eda3880819a3b0c8a4c329e4d8dbb0eb3026e3f5a11200000008541e0c1fd8bce665622ab0277fedb2f01d52ed2776b231d8a3c1b91f104957040000000a6f7b3c79f049b223c06d04840bbb3cf61fc27e79a0f3c078e3d409836500dd119aa997de810085e271800a0be9d353ebc59e068b6d582793800ad6e999f5061 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "397735197" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ED9064F1-311A-11EE-8E9F-F612EC4A90C2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 809695c227c5d901 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1260 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1260 iexplore.exe 1260 iexplore.exe 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2272 1260 iexplore.exe 28 PID 1260 wrote to memory of 2272 1260 iexplore.exe 28 PID 1260 wrote to memory of 2272 1260 iexplore.exe 28 PID 1260 wrote to memory of 2272 1260 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\GH6PeNA6e6_oO6olrdAmJpw1AyM=118.gif1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1260 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557f42d3c105746ad2abcba265699da94
SHA173c316cc10b0d4a06aed857fdba49dd5859604bf
SHA2561bb9a7eaecfe5d1fa915c4327fa005c44d61f62a1e0db576e6c2bbf84e35f3fc
SHA5122ee80bb3b853a51750df96732a5b4ac740afa43341d57218592393c400a3b06ffaac1a8c38b6dca7d16f87fcf908973d50675cfa1883a583d00486aa7293cecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5433b8341480f204d582a314931069585
SHA1bce7183c09bb5c20c8bfdf39617e090ed8ba5562
SHA256fbb72d7c2f7a1b5fdaa45312af91675662b6af22720a4335d89e3974a4219fb1
SHA512aeb36bb222c1c505bf65dce11d4829c5c960d9ef4f517070eb3bfcc070e0d2f6c8e2adc13bd0e66311c201fcdbb092e6cd260f77e87ea476eef151a8faf836e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536f637d42a11405abbf7429718430afa
SHA1b90d5c516a977c9827ef7b77ff9ff6019370d8aa
SHA2565de08e942404d1532eee21e87721166d836b60897ed5acca5cdebb0c0b9fb176
SHA512fc794509a5a71a57d6feadfa3b8d62cf27f73079a4b4e66017cc0a1aff2122375f0e0008badaf746b042b020c404269d2ccc482753c6f24a785683ceeb8c6815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52609fb9686650daf00a58b4fcae9793c
SHA1685d39b9c31dae0e5ce90e46838d672168834289
SHA2564e6a980078ed493701113991ccc89a5901786e4cea3fd5f320364b5527031fbc
SHA512b046689bc9dc81be185a77243b5da22b3128a22e16a63600cbc26fc9f5e974ac440aeeaf9ffc226609f2e638df7dc2196cd77cc9dfbdd177a0fefbc2779d840c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e0ec3d71f2637b49481a11ad008285f
SHA1c6d8c0c2949e842e52a285597ec9a5727b0ca21e
SHA25621167583f2ab1e0a7deed518048a3609da995cdb8f3dfc7d42e8815409b53845
SHA512bfddc4a0e65895b62e6db1695988a81b9c1933fd9413015862bde9c939771289f73bb0a21fea37e692e9c1031f61851f6736320c9804656bda5f670dbd883865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7d98736f163c9ffbe71740e2efa7daf
SHA1c05461be485414ad1760f412d9b9ae6deba03b74
SHA256ad565a5c2b9727f946e87da765f02254b3a18e7251c7b71ca957e87193469fcd
SHA5127d48565e7867f9d62bd52b30b634adcb89e118922d3a2a55a1088e73bd16cbae2add96dc90113e98107ba6df66f80e8eb515d0cbbb9e0ebf9f23882dd013efd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cadebbee422bf7e6f8175eb4480e2fa3
SHA192e466057ebb5f3c41b3b9e01a861f4c03b4bb58
SHA2566c1cdd4344085d9a4dd09f430f11cb62f60d513a4dc2b5579adbff6182825e4f
SHA51201bc57f464c162c7e39109d259857193798ef578b2e4c68e57c1164d1bf9a1c62c6353ee0d8e14cf749e2a6364c627252801b714ec0ef5c46a1de8a1faa3ac2b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\64WRFCMO\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
606B
MD5bbac639bf22ab98c343881d97f689281
SHA19b732b8e28bdb604cc524bff682d0c0e0f21f840
SHA256caa465305c0f5ab2914b3d0f7fcaf81ab7ef6f00dd2889a2112beb6ec91e943b
SHA512eb5397033dce5bb68d0b8f8c271b72f451bb1b6918b292dca7873f7fa48bb1c696327fc079566c9d4a8a113f3eb02d69bbe1852721b41131bd0e4e8685b084ae