Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
13-12-2023 13:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.lindsaylangedesign.unidad22.com/hjgudsmndiudajmnadhiyuadmbady8ad/dcfo/
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
https://www.lindsaylangedesign.unidad22.com/hjgudsmndiudajmnadhiyuadmbady8ad/dcfo/
Resource
win10v2004-20231130-en
General
-
Target
https://www.lindsaylangedesign.unidad22.com/hjgudsmndiudajmnadhiyuadmbady8ad/dcfo/
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b08c179bc52dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "408634804" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C572DF01-99B8-11EE-888E-E6337F2BB1FD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d79072038c960342ab421b8facb933e900000000020000000000106600000001000020000000d81415965db90fdaec71ea0bc42e3ee35302b53313a7396074ca72ad907b96ff000000000e80000000020000200000006e695ac5a592e2c3b01147b1f7412348f53c8d53dda217398d52e1c08686328b200000002e9e8dd89e21608177f5ac417e4219bd16c5bbe1ed7b43588db1ea02baa98ad840000000b5c66a8062c12a0316f6081dd80ad2d5589b30b4a7652d0b90514fd35e986e2d842d9ad0f8900469fa05027245e1da5c159704e4acd1d59b948b750a1204d482 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2376 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2376 iexplore.exe 2376 iexplore.exe 1016 IEXPLORE.EXE 1016 IEXPLORE.EXE 1016 IEXPLORE.EXE 1016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2376 wrote to memory of 1016 2376 iexplore.exe IEXPLORE.EXE PID 2376 wrote to memory of 1016 2376 iexplore.exe IEXPLORE.EXE PID 2376 wrote to memory of 1016 2376 iexplore.exe IEXPLORE.EXE PID 2376 wrote to memory of 1016 2376 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.lindsaylangedesign.unidad22.com/hjgudsmndiudajmnadhiyuadmbady8ad/dcfo/1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56392744a55f0a05831c80cf2f9caca4d
SHA188dfaab76d73aa02c9991a48fda0e1b5505dfa8e
SHA256daf3b39ecfacdffc3557821644c25573340511d7cb011f05522608a78aa2122b
SHA51261e5eb199c351d57c849708b40ea48575d2866e7062c38b7f86020bbf3efa3f4fb7332fba105235253b6215a593081857ca8f1cce844aab6ec4cf4bc7304d7fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e1ae523df17d01b7c8a8a837bcd8df35
SHA1489ae798b855a946f12324e268312d588015a9c2
SHA2565d588ad1e06a818147c421082fa75536ac743395d99e1d363b969c590240cc4a
SHA512e879352b0a2aeab78747f05434121500be0b71443e8347a74f630be9316225aea260713004c13b2b5770168e471d8f45ce44000d00da263ceb5a50cd36622d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57677f49b6460c996d97e2ea863415361
SHA140ef93f58200f6b02d3fa602306292da429441d8
SHA256ece6b09e28ef86f7e224c6478480b9118a19dc0a6d86f3ff260361c304a8a3f0
SHA5129e15fc6c0d7280435804486a1ed2104c91fd9e74a2e0ac093d6f0ba7a454a29593728f05f82aee25710048c23c312436dd410ea0294e86a9c6773eac7a7065a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5cd21840401669d9a795efb7b66a441c7
SHA16cab8721c1815ced640fb9adc8e6ebc878a00785
SHA256804a7e26f6fde58f7b548c16669c13d52b79f02a730e160df7bac8e5c197728d
SHA5127f91de9b7cb1600717bdb321ac963366d4104f90bb645a68d8fcc7993a8010d8e377f3d08efd87d3e05a833675647f8ebb9976d98f75feebd9c6e41e3899bf5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c7e073b1bca3840fc73f2471556e55ac
SHA1a309f1af3019274b6e2d42ef152f7fe238a1dbd4
SHA256a187a07cedd229bd742d9a33b7bae1a7432a12c6610bcf8dc1aaf01bf67a40dc
SHA512a96b0a0da6eef389bce1874e52f774b7d42de283188b538dd8469cd7094b9455b99f735438658aa566d2bd6547febb7c3f22c9157178b852b0af9c07377b8718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50fac84cd024c40a77780ebb9122b3fdc
SHA18fd7f97057c17b13b7cbda7da006a000fa5fae91
SHA256e041cdbf02682005ddae3d4f8574fc598093de9c2988d26cd4a93dc3e1425318
SHA512221be52832ec41f6f89fba5cacbbb362e3fd6173cd59de732598325be1db351c8880479d465a24a77d3d53fc00e65edd1567c0f4f01bf1ae1b1a150bdc1be470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD529a151902a4c3894cd2d507fd62b96d2
SHA180b7653d7e28cbe92aba2a0b9fb1cc91e6a53dfb
SHA25616957a94e021fefb38b13de00e7ac2eaf48cdf562d844683913c822e75999dc9
SHA5121ddee95d4191fecdd6662897f82efd9bff08a53e87f30e4a3814629485656bf7b6e0b1380dff49c472dec0028135fa25ca86945f27e79a3184ba753d19d60cb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5be840ea05cc5459bebf20d16afbd067f
SHA103840cf9c29f9b6cce4cb1107d183308af801c7f
SHA256fb02b352e4aedd56dd7dec4a270c9e0531dd4f2f8e433e1c72e3018f6df8b8f5
SHA5125877a79fb8b325e2c474c23decc8c51fbdb73ae17327f926e9f8842aef60c7476ec994967fa23a27bc500cbeae5951458100d36af379ea06f952f309479e3ba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54a80ec4c80353ed8373cbdaca433087f
SHA1c5f2192075a07537573e94cc178086ecc969c14f
SHA25653e92d8b2585412a3936a1569ca1b677e2620f5edaf773a13391a35d8ce76438
SHA5120b0fe519bb769c462260b68c39bc0041da224800cbc503b4dab47b74aafda1b4c144a6d6e2d9f743ead9f468f3305095fae64e17ece704397386c3724a5cd4c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55baf9c97a3fdc7205560956cf4bc7687
SHA12d4b77e73745b8c53a8a15a2d74c8496876b55d3
SHA2566b46063476597266069c702af90c563ff8f4f35e35bc6923576b93b2f724220e
SHA512fba50e9492ffdffc3777e4f5fe46be43221388558676b3261ba67e97fd01cb41d468eb6eb49616de4019a3e4e2351623ddd43fe71c5e6733391b520ab34fe0c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59f4a7cb607c0226db0f36fbc9f5b947c
SHA10900b64ff843a0abc3803ec14ef256680fac8068
SHA256e8547189db9aa01b65268bc5e277f07f15b6c8e72511982bc4ff7c7e207861b8
SHA512ffa479fbc1aefaf29ea5e517ecf1013201c2d4bdb4282ee6936b6a4a91816585ee5cd6b134ff6becca857787b708cf30e9a52b69555457cd8a69997582abaa3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c9f090fdd7558c1bc1abd471f83c9f00
SHA1b2b2576314c32fdc706ddb9fcb99b4ed8db42dfd
SHA2565a79f3704624b3d3a83d7906eccd2f693d63a6850e0c6df33506883109719a3a
SHA51209eb0136e16fac2967c3caf89492ec55e4d4675301b0061711f8ad9bd639d6a041d08284f6c8fe8abf72d76cd4ee9d62bede68b26cbe93b70ecdc94ab0060731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55e7a02847e4aef917559fdab946f3f07
SHA142dc4d3bb716c09c2c434be925a6ae2ef14819d2
SHA25671b27ead2888f7e9fcfa5d39d036a75388cddc7b2c8efa1706e0c7aa83de4f7f
SHA512ee50c7d1459d6d22ccf0aa8c40bd5376dbeb1ef80dfe90e9e96683be68de191ca1b971ca30fb170fc757d5922e577f2c2cc428202205fe39398dfc0f04a3df11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50358b59014297287f9ee99db02088acb
SHA1756038124feed85f21f69d62ab2097cadbaac5ad
SHA256a0595f701e6ed747cfba9cc2d51ceb3433f4f4140c2fddb2743d9ff39cf0b5ec
SHA5123bb5d4db17f8dc87c5ec080e93fe846debd59ce4ffa2d169d99beb09c8bf9ffde33592d0e38d25e2dc2f49606dfe186a6b09085836a1f8ae94142c8fdefb9249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56d0a1a1af2ac2a817ec829e03f02a91f
SHA189299607c2b4c5dd133511be6b331ae9e72693dc
SHA256ea78e1b86172b9c4494c618c1948b1baf8e5295ba003308c53836040f36da61e
SHA512776e8459c3a8825eb1c1ebc2dc06ed514e7d58f4af02629c253806a07610da8baa962ff9780aba34bd5568b969fc59f71384b9ac09a6b01723a1427201de3def
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a17ce44608c9e5039c7777e2414702b0
SHA11a64450c1b107d43b5db5bf51529a15d7a8af90e
SHA256d548c30933348e72f8675525969bad654bbc398233a7dba850f22ba67869d7f2
SHA512441db18b1917f6595e45b5ea7f4ceff4ca743acadc336af4289f4ed630911e2935f64fc864f1d518e494bcc53bc353ccb21bf648801f5ded2ce2a9b1df38eb1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD559943ad37bcefcfece192c0744aff3c4
SHA1f70647c0743e3b8a38e68a2bf89aa5f50bde2714
SHA256cd68c7af59a6ff477b2429a1f80057a8b141b3217b1cf53b4c8f13140d4b22cf
SHA512c1411eec6cbf218b3b89b8d08c042641f93fe565fe8a445d1f0484e3ac08558293251f045eeecb869f11e3e6531d7c32fb26cd4b2b16fad49e105948875c6821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57a01c397b38d7c39e36b99206aa3ba2b
SHA11d40e26ce03628554ff38d289abecc92b8759c21
SHA2566989bfbdca003411a0a30259969e3dc3a1df5eec2094f4f8974436df4a5c8d3f
SHA51227b378b8506fd7d100110e1d3caa7fa37b8e3e06c75b40eb8aff1167dbd34d0975cbfcd32884aa9a232b9b8227c25a58208626015195e79dc9fbfa1e4ae8ebee
-
C:\Users\Admin\AppData\Local\Temp\Cab5B0D.tmpFilesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
C:\Users\Admin\AppData\Local\Temp\Tar5BE0.tmpFilesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06