Analysis
-
max time kernel
118s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 22:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://eurofinsgenomics.com/handlers/sitenavigator.aspx?returnurl=https://cloudkingsoopersmailserervice.com
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://eurofinsgenomics.com/handlers/sitenavigator.aspx?returnurl=https://cloudkingsoopersmailserervice.com
Resource
win10v2004-20231215-en
General
-
Target
https://eurofinsgenomics.com/handlers/sitenavigator.aspx?returnurl=https://cloudkingsoopersmailserervice.com
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409445234" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a000000000200000000001066000000010000200000007c2b0266b51f55596b7462d7715ae6944d31d2b58d7c4f043dc918192de9c5fe000000000e80000000020000200000008a74b2b2718af47edb999cfcf69fe6115c4933441252b850ef9fcbe9b2a2474c2000000097219381db4fa2e0ab656df97d874a74ba63c0c0c867ffcd9bddaa823237532e4000000012a8131f3a61a14ab22402744092371bf8f06eb3af354bd511f89aaadba6629a36d745f6d607cc23875b50fc1dfdc22bf4ef875654128d33d49d8578d75a694a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AFF40261-A117-11EE-A586-F2B23B8A8DD7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d010b98a2435da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000cdcea8224052a0fe8ec3bf4cfeab3b05a6060b60ab4aca10a1e486f180b7a010000000000e80000000020000200000000b95b9e910b76c96dc6dcbbebc38d1b71c10eef1b68847821e1b78958bc54b65900000005931bac1230a1ec9bd6b1077f1f70ae4276c59afa2bab8e3c78c2c016546349dd5365026fe3b55cd67d83692f84e4731450c3a7510b401dcf056daa130ffe1fa9fdefa1cd103f0f93f5f329a884fbc0c671f28e0cfccc09abafe3661f419ed2a991878519591772968e17192dcc0c37cd146eece53a0a625ddd42f82d4f585b22e422f80b474d87a548f9881e234951840000000e1fd9cab11b86f671b52b92e375ae23b8c17e1e4da1741bead361d89d375b7729eff9852ca634136337e369e90f5da74c31b5e2d99106af5afed9f03f1f4aa3c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2628 2104 iexplore.exe 28 PID 2104 wrote to memory of 2628 2104 iexplore.exe 28 PID 2104 wrote to memory of 2628 2104 iexplore.exe 28 PID 2104 wrote to memory of 2628 2104 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://eurofinsgenomics.com/handlers/sitenavigator.aspx?returnurl=https://cloudkingsoopersmailserervice.com1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f621bdc93378a6c7b06027f16ae9d982
SHA1ea83a3441b653e06dc8bd9089fa8131d0f08269a
SHA2567d8a40d7d7d6f97b65e9ff18eee559148764c54b29ca8ef439f8295630e6a471
SHA512dcc0b69e9312c81df020f1955f4bade7b5cb9d569f24142fd04642b3db714b1fa0780c6a397d5139d969ac39b285d8040d1538799ce60995ca2edb6be0f1aa62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eda08964c1e08ed30bf6e188593ece05
SHA1930b7bb748c0383911577f5adada2180568ffe2f
SHA256578033ebdcf8ea597a0423b8d877bb6e0925b54c2b97f17ec8a742c69f77c9f5
SHA512378d01bb0634bee39201211bb4b57f42a75feec8ad8bc7bb4b70657249b7b132ef237d4154b70eeda61ad83bff1f85acbdb5e530b43bd0976f656ff5618a1fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cb6eb8df78e8c1ec7dabf71e79733ca
SHA15011c075dda81c469a0a78d15a830a20520556c0
SHA2565598b2d90a1bba9b1655d1fcd6a8a9a82d37b7c1c06434f1376c22dce9af2492
SHA512f07cdafe3b57209d9094f6312a418f85f8da7173c1a2de42062752ead62114e7c4810f0e3f65e67e905fe5d8f8cb21fbadf609f5cec5ebdbaaab03f8c25cfdb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4121b631350552e69296a36bda05b58
SHA16425f45de13ce2f678fbda9d86eecaa217502c70
SHA2560c8c83941bf7eb88e10c8c795ee13cb44d3c065d33455bbb55382d65e24a1bdc
SHA512fa2fc7f5adee3e9750bb6f05d2efa42033baf6e2a0f7394d412fe7b7fff2ad68b9354b7c70e4036472f32e6942ce594d2f65aaa6ca762621b11ec17cbaed9fcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6c17a1bb5d85a6010c71a5d91b24e04
SHA1ccdce0f607a1813302a9ef370feb8acf5ec30236
SHA256a4019caa2d2ddbc6f9dbd04faa2a3348d9ce8a9f5108aa7f607b9535f3181d05
SHA512fa57aaefce1baebb42441e86314191eba7e6e5813e3a4415e845b7636149bbd14d302b75167f5761ccd26e88d49ed02d35f1760851994bc97dce0dca72288d9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc199207cba91f8b64940b9d17f2c27c
SHA121705ec9ca622d286187642f187bf11bbdffcd4b
SHA256ff567f8d2895809560772ebdc1ad89ee3c3a848cb72f04ab8c7cea4892bcf0e7
SHA5124d65e738d4f7a3e26e9d46a6d6800f2b83e2cff4d363b32207d8bd51bbc880275c8d89bc047ba85f5a475174f5fec072b07e8db22dce8ea4646d094d98793a91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e45d1f4a2813c1fb9b1f040bef01924b
SHA1b345c33946893ca329b4d5d735e59079282dfc22
SHA2564a43bf104b7db200616bcecbb7ed9c8a6945ede8f9587c3bc5a800daad68c0c1
SHA51244c341b5a96ad343fca20da296b9691cab69e2bac0c011b27770aa95b6b23e9e61583f0b1f7557d176441aed2db3835f6ef4411e11eadff36868d124261d8105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea33f4fb9bef784182a5c6e7171311ee
SHA15e8f7bf1adfbb148b9e7ef79964f09844b2c21ae
SHA2560f6c48a5155f6dfa0339c84664d62c7071f4bcae30fcb0e43edb97de977f67c0
SHA512ea2af6e75a60a53013823bb0bcb0dc27204809d62e21af7c5eb9307d2a8fc50cb6d3eb73dc7f0b8ade6da637f6edd794f29696f88862de5b81884960cd0227d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53666abb4cd025e2aaecdd8a2bfd5711b
SHA16f837a40a1ec5553eef7f1b05dedeac468d069fd
SHA2565008b81c1454697c97ea66c5d86447844d9d6bad4f790e0604b55dd3335db1eb
SHA512d061ccf2606a90ce22f283514d96ec6b91ac52b19c8eac484f4d7e756f5af3dd869402f9c8f17c067beee590506bd1a3de1e82357d517ab2d75d4e5cd27d1906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a97229b109b7fdd80248da9c32c7b66
SHA194f7b0ed7d2058fe3a4ba765f792d2a15521d7b1
SHA256690ae58f052d52dc60805e0962673a01633cdbc320ada7c2a6690d9784ad8180
SHA512bc852930b6234223693dfeed9a5bc2f1f2e6d329cc0b76778707b92187ee8a7cc2ddd2bf95611d85aa86d92ba5fa27fccac75decd1f9a4aa1447e4dc457a4ffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50216a5efbe9073c2a1df2fb178723491
SHA16dd8a3ef90c1fe1085dd62c94148f96b35041bae
SHA2565f05660d157891c265209287f5dece64b50e9cb39838e57e180bad20982317e4
SHA512f1cb217d24b7199f0bf43913c27842e49c582e64e85fa82f279c931f57cf5b5a3d603062d1790388fd97f1c5d5c18989127f12729ab71c159fd3e1f522f8fd22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd293f562d9d3c25cda669e9a2a42f00
SHA1433ea1ab4a0ca6a7415dbff039a7bc817148a940
SHA25675400b19dafaec68dd422377e8684fbdddcbb65c1349bd95ca42c9ea8f850379
SHA512bff1b8f08917f2db7e0bd5e4d83f48d28330a3378a07ad9b789007480322431d0d31ffd5336145c9fe2b681cdf6b1b1978c1259c86a95b61efeaee7e54382831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502e03f94b75d2119f82f491f710a42b1
SHA10b821976e395fb310ca9b4c0ed5556b9747099cb
SHA25654a9dcb34176f70cebf105c74bbb878b71637b29dba0a065e414e3595654c68c
SHA512d55417476315944504c816f39623ab41b99a04fb910b551211866e6fd954be8645dfbce54f445351aa9991509cad22e453ae6cbe895172767fa7d3938e62b6c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1ec394100b216cb9aab7cfeefc956c3
SHA131ea32710d8a3c90ac0e3503e756080beb0fbf43
SHA25674348d6a55b0b9d43c3a3f344504f92e5a24c3f88b0730e9a4bacf70acc14b52
SHA51291ad27b4c82662f71083387a1b2ee5d68fdb9ea16fb5595fae099b8e348eff333c50380db027f84cc024160c4a290db398c654168f8389b198daa3cff3786d7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cda9fcf5165bb22288e6d6e7c667735
SHA14ea32b45b10656000ebc977a427bbf186fa2f812
SHA256d70875ed1e21de297762939b246842444ea26d7088ff946dd751b33048e29fac
SHA512e4e7480ea725f04bbb558fbcd121641f9aa8ae421827ac964057113c2caf9ba9a20f4d7f1a491c21c8b8054423ded8b67c99bd13e5423f6098ae054f9ea4e2a6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06