Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 06:28
Static task
static1
Behavioral task
behavioral1
Sample
tmp560779530.vbs
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
tmp560779530.vbs
Resource
win10v2004-20230915-en
General
-
Target
tmp560779530.vbs
-
Size
710B
-
MD5
5e5a87d0034e80e6b86a64387779dc2e
-
SHA1
109469f781a1cd257d7e8ef443ad961c6d740733
-
SHA256
74bb36d7b564db9687d94f8038d5e8b0c951da5d7799c0c9ce8b25fef6238185
-
SHA512
026a957405509add41171907f420ba52b68079d007be9084417adf667accdfa13e3c6af0c096e147935337648a548c9f56d95c83fb9087d4094c99ebd1f08432
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20a92f72d5fcd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003916b9f19191c547a3cd833648cc0b6b00000000020000000000106600000001000020000000cb6a07bd5f64e1f36401f365d2068ac0893c32e647daea687f396f7c1f7c07d9000000000e8000000002000020000000d3acf1e2c3ba3b405673593b24b7234b3e6d0a51c2193d047ad1893351597554200000009cb0e40e6a6e4c1b50b4b1f9a195d6713ef87d5e58ea4395e403817381042e5540000000ab114b7f2ebef2ac43585043ecb07aa8410cc136606c48d890c9f402e0d2d552d536773d875c60b51b99fa98426e6fcc5022112afeafcd037d9ebe73b06dbdc7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{99CB9CF1-68C8-11EE-9302-FA088ABC2EB2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2424 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2424 iexplore.exe 2424 iexplore.exe 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2676 2424 iexplore.exe 30 PID 2424 wrote to memory of 2676 2424 iexplore.exe 30 PID 2424 wrote to memory of 2676 2424 iexplore.exe 30 PID 2424 wrote to memory of 2676 2424 iexplore.exe 30
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tmp560779530.vbs"1⤵PID:2232
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ce1e630de619c781cc7a34049154e563
SHA111e61ea25a2d563c3a0fa6c208f836735f490ef2
SHA2569083cb8aee8606121faa7ae70d8bac97a9eefd5ce573508d84972e9148907a17
SHA512abc29749a482a277e03b4326b5650c03886fd3370f3764612aef3ad793edd8c0ee6e418baeff58126eeded2fbc2f7d3f9e72bbb0dc5c1376a3481083ba57c799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54903d02232af2813454bdd8ca6377735
SHA116d0719ff5c6be9d442470339a1a7066cd9cf3aa
SHA256a13c58bdedd3b55a6b3b8078254aa692fa0b23880b404b1439d2778c633e73dd
SHA512e432953b9590b6d98be569b5fc7205239281ac15ea3d0eb8dee3c1b1c2a6ad8e1e47d73711000e7476b3727be54c4a1b8d808f415e1e62f80df1955bc37343cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD560666192117b76bbd567f9cc9601a2b8
SHA10eb93f7c3cdacc622a8af4d94e5a3f1f1dd7ffd7
SHA256c7209824ebdca8f910db28ff9a7a55255135a5f92f57eba5316df5270c703abe
SHA512694210cc6b8e6933b2ccf8c48ec08d0bf519a1b0029f8bf647277cacb947fec1868bd5608676f0f3d1c1705d4e79ce136615e90ad981fc358450b72d93f92522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5221952cf1f12abd224d8ae3362d6fdac
SHA199659bda4ffc6392376ee9881f6ed1be7c922430
SHA256942de63904235371ba3621c12515852b2066c7249a9547ca660c5a4ff4fcfc62
SHA512428cc1bd52fbb5dbb2c416c1c7e054901b911a2c1d3e2d31d01b11fc71f59047a13ef9188514a8bbc2a732aeb30b978d44ceb6873f12d08f2d28e895cda9b0ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59eda6af9bc3bba07f9044683af54b87b
SHA1c3c3335d53f8e82b8fdc04bea9bd995fcf2a66b1
SHA256bd00b6037adc118bc52e9e4b378e3db70ff5f730a2708bbe1c624646a362ce58
SHA512202ba27cecce9ad69aa56e52735f751b3a33d8cf8b7c9fa37902bfa736a7f46aba2c8bb24312eba564b87bec8a077d82c3b0ee54cbfaf9312433ebc7fbc34d8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5deda3b0cf5a086ee0d2c0ab68563fd68
SHA1975bdb8f8d34197e6a411a18eda4cac3cdbf70d5
SHA25637d68c270fd5e3bb6c2c98c21ab012eeae199bc3be2dbdfb0e0490d52b8ac163
SHA5129be1e56033e1b55e6e84d447bc9667187f59748fddd668608fe4cadfb7d42561d801111d74701102d371e709678b30b0e8578c7eb50ff715a8ae4cb1bfc96cdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f746aa62bc429ff811a4e63fabb0dd95
SHA187aa08385d0edcbd3ea0e2fc66184fb475ac66bb
SHA25614e51043591288f5b21def0a2dcae0d35366d1f594cf7a3b2f1eb82326057d7b
SHA512ed272ada90520f05b35cfd74a630123dfcb55e3e5cdbbe0b00099bd52ef780644f933ea12a34a0bea7c7092acd3aa4947257e438bdc4912e2b67de5f99bd04d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54f7c2edfee49831aee06041c651a76d7
SHA128ffe817d75f268c8261d29416231f4010fc2c5f
SHA25672d930619dbdc42ce591d06065144d516182610ba7c37dd00f5a24da1972d04c
SHA5128a73bc6ec421b8a8782a466cc3e508239c84e407ab6309cd224e14ed5a21d5d1f6cbec1b11b49999772d031887719ef5ad65c9408da4b0509fb7feabb42fa129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58f2791b42e95b4ce3f0a35205265564f
SHA16c02bd0afbedc8f91a8eeb74645d9f386b28c4fc
SHA256a3e071313a5aff49ff43322c326645ed265bbc71f5797f395ca92f2e0afa158e
SHA5128337f94b649e75a1511ad9b8f2a67f42d8b8010ba0b9256b25ac72070eaebdeb12792b25cc2b7c51aed704187f6b81a6e839d5deb874676f6fcc4b64eb949d07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f1dd7af77582973b2cd96174acc4985f
SHA1abc743797d6d564d8f6da6d0182d658ed5c6a9df
SHA25643e4aef74bcd9eb0243ccd18b79befe90d35f0b072b357304f6f159ebae7a69c
SHA512ff3743ebb58b48a20fc66ebf1a156988fef8d04ddfaf19f35ef974a49ed81754e10cb4978bbfec1473e310e382bd1916f1252ffcfcb083129ab9e5c30c7006f1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\N1ZD8WV6\favicon[2].ico
Filesize2KB
MD5a2606f1274e1ca7769c7a713ae7c444a
SHA1f5619384b322523f10b127f89675e1b29ac7db3f
SHA256791525a225922b4680d5dd9cee1a3fe11596045c85569bce6449743ab30af70a
SHA512b0283c2cc9192c1e63a1479e41a64c622495e8305ade63949e36a106ae1ab545bfce1a7dd18d03ae26ca1a321f14fce78aed42d3b16a8568c14234b8d54b1c69
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf