Analysis
-
max time kernel
136s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
11/12/2023, 13:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://go2.inndts.com/NzMyLVdNRS05MDMAAAGP4HtT_jdT2TevwKSp6pDtsJUCty1SHsV5NGm3cornSwgsUSzsvTp6mzyBuzacE-NHCdcFxCg=
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
https://go2.inndts.com/NzMyLVdNRS05MDMAAAGP4HtT_jdT2TevwKSp6pDtsJUCty1SHsV5NGm3cornSwgsUSzsvTp6mzyBuzacE-NHCdcFxCg=
Resource
win10v2004-20231127-en
General
-
Target
https://go2.inndts.com/NzMyLVdNRS05MDMAAAGP4HtT_jdT2TevwKSp6pDtsJUCty1SHsV5NGm3cornSwgsUSzsvTp6mzyBuzacE-NHCdcFxCg=
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B20F8761-9828-11EE-945E-4EB5D1862232} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "408462974" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e01c6088352cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008d5ea254cbc3cc499365b391a5fd6692000000000200000000001066000000010000200000003af0562a8f487cc493ca840672762d29f82a878c8b2360e6dfcc2a320ba039c2000000000e8000000002000020000000502d34a9293273bed6491c822d79ce816b06e17cd7aa199c2edb6d70e2db5c0a20000000936ae27d010c9c67438c2644f6dd91f12ea4e9cad825f42143ebe7126b5790b5400000002d70fafa6ea52934275b3f664c27da732aec4b92625b51acb193e49bdd64f6a66c2e204c801eb215a42853e793748497d2707aeb234b1d353e79732646fe0a53 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2920 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2920 iexplore.exe 2920 iexplore.exe 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2620 2920 iexplore.exe 28 PID 2920 wrote to memory of 2620 2920 iexplore.exe 28 PID 2920 wrote to memory of 2620 2920 iexplore.exe 28 PID 2920 wrote to memory of 2620 2920 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://go2.inndts.com/NzMyLVdNRS05MDMAAAGP4HtT_jdT2TevwKSp6pDtsJUCty1SHsV5NGm3cornSwgsUSzsvTp6mzyBuzacE-NHCdcFxCg=1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2920 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD559a4b8adcf6d029ae57dc47062d68e53
SHA1cf8311e85778aa711c4c836272b357138a0c7e9d
SHA2569878ad575239b44334d794b2819c68ee6e5a9d18854322d87d40075ac63451d5
SHA5128c8e8a4c214206465e59817dbb929f24c03797b47742281d589b9a86db39fa5825cf15fef382e51510967de50e1e2470d874df6e9e609bac8d653e805faaeb62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5587aedb042418b5ca014e0e1dba243e7
SHA1040d6a47238cab7e578e56efd2477fba291d54cf
SHA256d2e5b0a4dd503945c3adeb026cdfd365ad680f1639188c4028709ed6104eef6b
SHA512e3b467d8874332d0830201baa31ecf5a500a7a2af5a39d8fe7c214a51c3d33214f843f0c2182ebecc42a260106264f01d2be0187a30c5137be704d2a5a6e7b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dae5a1d561bc71e66e40c79895780e7d
SHA13ef9196dba19b7cc5c3e98667189c2410d143f89
SHA2569a77ef5a68cd8ab506cb5147c3a569363d1cc5aec0204bd1816c4f919a771e67
SHA51232369fa47d447d6f8ca4020ebb7399645d1746131e6ec6f02cb87ef5a35b5a35d11c4ec934202fca715ef6c0499deeb3175c7cc3e9199d87d75e04985f0a58c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c76b2efa9ab49e084e13278e49ffa16
SHA117364cbb36151df1fc5b313218d04878c670d7ce
SHA256c72ceb743858c9f3d113774be813a97b442ef7082e6e8aa05d1cc479fa2fe16a
SHA51299b7b08a06e02b9267c4bcccb74af2e744af8d514e437ec6880239c8332ee8239a5c8d01cfb0507e798ae378b864bfab7a9ef3788d2afdab881fca11b5b4739f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c785665e35ec62d1842889ebbd1262e
SHA1b15a9dae77f487515e87818c6af612db1e39f2d2
SHA256801f5845eeb4479e37e85a247979e55566c3dcc6e18d4aa21c613c1d434da3f6
SHA512cf01350dc6d185c1f5b531f18301976e19d75f4acaf67e2bc44713d9e307df5140b0c76b58c5af5641fb13e784eeca35fc2a22acaba9f9a96403e1ee386ba641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acbe7f4f9bba123f0665e6c6807a0274
SHA1aedf452f5de8c5af9dd503b7018f92a46ad43c60
SHA25693cef9f09268bd313acdf09045d4a62e50b4d280ad70c93163d3a26472bee569
SHA51276ab8faf54f552b87ad3cce721ac5f73e819a94a40060798b4c418e5710e579b0ed33800abbbdab6d7ba37de43b2258fa3d2390048208c5c2200e5d590129573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593a46deab0c777db48ff979d4be8be9b
SHA1893263c0484f15ad08d78eba6e5e0643dfdfb4b4
SHA256def9edde5eadb0f2c44582088ff48e8a8c4bb8c637022fc51823567cecadb36f
SHA512583e9b9f58b6e30f49bc109c59ae3ac6bb2a465aa6b9a42d7bb88d7a91a0e4999d562b8b9f84ff2ac9698562746a4f119b5cebe37eeb58717b104d2be22d0499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5268624f5881df768c0e0a8e0767fdfaf
SHA1a3665466235e2c5781b5bcbedb60f02d3626ada1
SHA256c0a52ca63d39e5010eef38fb93806805cc0659ab56d2c97e6b6695c2eca5febe
SHA5120c6192d49f8f3791761c7f3fe7dfc9c2d21c0f74bda5c1540ca01aab35904c4516f091ff8b67c4e530f61cd65b24b334491705749bed4a98a20a2cffff341100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f67280d363ec2f9640ab7375343c733
SHA17e419e7771360e2528cadd3b0b3a6253608b9349
SHA2569a5eec186ce1d7a5d78a9bb74c673a0bc37c4eea042647c52fcbab3d968b048e
SHA512781b4632e277059f7ee81134a2cfcc48e2b1933b5996ffab67cf7a3c73df874d14f0af6bcc0498236014a56f18b1444a2777962f82ae4f5eea6c1e741bc7b5aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc5859e46edfde70a6a5d8ee7e6eae4b
SHA111dc108347d27305569aa6d1ca9a1119a1147cb8
SHA256779a6354f4d664b0c903575dcf16691c6f68de08e3bf546d9ac1a2a34da386bc
SHA512847448793fe4829166251d6c928cf70218ecc0865b4581a42e1949c95d186284a67522414c7876976009f44f51a350fe0863e86b936001067ec0c603a8b4f6c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537076bfa60ba9ea1d1980dafb4d06bbc
SHA1760b38850112a40f394ea144f5bec657daf7ebd8
SHA256d00b01c81e75a4907bcdd0cd47e7a7c3e1050a2b125852df51862ca12e15ff9f
SHA512d7ab580101080c6655138afaecfda606e9cb037c3bbce3d14c8eeff81a2ab9b93e972a7013546bc96c5b6e34c60a748679e8f71947c43a5c843d729c96caaaa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56845d6926206bff3951420660ea26bd9
SHA1ad342d8d530ee4952a48e022ea69f02e2d4b6340
SHA256c745c2d3cade598bae963ca74ab1b88b106c3ea5949344f3b3538d2055c6015d
SHA5126bd0f7c983e3f7ca92ea6241ae8630c1f38d08289a406c2fd6275c3b8f7747b174bc354a11f957138a0b9a72e0acb26540224a9ae9656c3dd3108932f7ad8e20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efe6124f3feb1817259b8b1405d848cd
SHA1e71b90ec20a0f08a36f73779eb99d0123b962b8a
SHA256b345f92c4527a2572d97193acdeed67edf5a3c7e70f9e6714df096c43a929a7e
SHA512f652cf76b4527d304099e83a76e8dbf0989d1633439ba7c9d7d97759a51091d31b619ce4f008ad1c9f84a4f3ba2b8bdbc718bf5637d838bbea35d5d29e4262c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538be2906e3020f2f4f4ec1449eb5cc2d
SHA18691341e891271884d3e0622f03b502b4af1d924
SHA25629c6d844ef792fb325357cd008e73e53d635e291ccd07c221af6a7226373ac30
SHA512e9c2f595a1ed264581f29590884f4c7e0aeda38bf38cb0fa391c32cf0f772d91988acdee16aab9fd15d488c8eb34b80d7f410065c0dc4417875fb2bff1462011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5297e58cc118e203474a9de47be719157
SHA12adef9ee2ea375b3a827026d2e20006673971793
SHA256521ff065f92369ba2fb2808f76f033d4ec1bb828ce33196a4371964539916a67
SHA512fbf646d23e6e15d75257dd0cd779422bdb718fc63d5eaab2b9312f97e7433ab6cc67faaea7bf208402337791e618ff207b389142b2ff17fec3433c3f7788ead3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530913bcf9b96c208893a51ba046acfae
SHA172cf8305b571ff0d32717145171611b47e4c476b
SHA256c283acb86e99ad5d89b435e80205fbff6b0ff18d6908a1622574bd9f7b01f3f5
SHA51207c669f4c91056ce0e1a4cccd03881f154b153cb71e20b5af8fe3fec619a88f2d71344a8787f04d7cfadc993fd743e49773e56688e64b260b4c77a6586d6ccbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5f0931373416ecb31a4eb6a63999983e1
SHA1ce8df69c2bac1f78fb20f270483ea64056bd98d3
SHA256363d003bc01da27dd7c4e988b3b3cf45112dd7ac178e22f7543487a50a47b449
SHA5121a5fbd1d3727f2340d50eb00224367303b61106663a1b77748b47bf437fd7f8837801284f343c42dc000cde648c2df3f00b3eca31f28f3266f65349bb9251afb
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06