Analysis
-
max time kernel
122s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 06:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://linktrace.ctrip.com/ctripetracetime20231226/EventInterface/map?t=41768046&EASEYEUID=9098939-381428-168-25572&yiyeoriginalurl=NB2HI4DTHIXS6Y3UFZRXI4TJOAXGG33NF53WKYTBOBYC6Y3POJYC2Y3BNVYGC2LHNYXWGYLNOBQWSZ3OF5WW65TFNVSW45DTF5TGWLLYMYWXAYZONB2G23B7MN2G2X3SMVTD243IMFXGO3DWL5TGWX2QINPTG===&enc=1&i=&s=V3-0D9CB716BE4248CF12A896C13841801D76B38209
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://linktrace.ctrip.com/ctripetracetime20231226/EventInterface/map?t=41768046&EASEYEUID=9098939-381428-168-25572&yiyeoriginalurl=NB2HI4DTHIXS6Y3UFZRXI4TJOAXGG33NF53WKYTBOBYC6Y3POJYC2Y3BNVYGC2LHNYXWGYLNOBQWSZ3OF5WW65TFNVSW45DTF5TGWLLYMYWXAYZONB2G23B7MN2G2X3SMVTD243IMFXGO3DWL5TGWX2QINPTG===&enc=1&i=&s=V3-0D9CB716BE4248CF12A896C13841801D76B38209
Resource
win10v2004-20231222-en
General
-
Target
http://linktrace.ctrip.com/ctripetracetime20231226/EventInterface/map?t=41768046&EASEYEUID=9098939-381428-168-25572&yiyeoriginalurl=NB2HI4DTHIXS6Y3UFZRXI4TJOAXGG33NF53WKYTBOBYC6Y3POJYC2Y3BNVYGC2LHNYXWGYLNOBQWSZ3OF5WW65TFNVSW45DTF5TGWLLYMYWXAYZONB2G23B7MN2G2X3SMVTD243IMFXGO3DWL5TGWX2QINPTG===&enc=1&i=&s=V3-0D9CB716BE4248CF12A896C13841801D76B38209
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9C66BF81-A3BA-11EE-84F1-EE5B2FF970AA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409735124" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd76917334189000000000200000000001066000000010000200000006f4159f33a101021ebb0b3257b815b3c051bae22825c8add332728023e4e47a6000000000e80000000020000200000008078c84f8c7c1df8c9880b35a2bac9ba93fefb9be8c2eda3659fd0bb45c122b7200000001b3fae332a98d894153a0e11312b362b20cd81d84abbf31de177fbdaa94f4761400000009d702899c663fdf197049f67ecbc7150244cf3e3f2ede2bfa83f7ac83227dc50316021af782f1ac96efa685725091d3e746717f2eee7242030616ccbfe1810ca iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f68d8ac737da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3040 iexplore.exe 3040 iexplore.exe 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2400 3040 iexplore.exe 28 PID 3040 wrote to memory of 2400 3040 iexplore.exe 28 PID 3040 wrote to memory of 2400 3040 iexplore.exe 28 PID 3040 wrote to memory of 2400 3040 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://linktrace.ctrip.com/ctripetracetime20231226/EventInterface/map?t=41768046&EASEYEUID=9098939-381428-168-25572&yiyeoriginalurl=NB2HI4DTHIXS6Y3UFZRXI4TJOAXGG33NF53WKYTBOBYC6Y3POJYC2Y3BNVYGC2LHNYXWGYLNOBQWSZ3OF5WW65TFNVSW45DTF5TGWLLYMYWXAYZONB2G23B7MN2G2X3SMVTD243IMFXGO3DWL5TGWX2QINPTG===&enc=1&i=&s=V3-0D9CB716BE4248CF12A896C13841801D76B382091⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5826e4ed47825e9ee5c55bd594abfa633
SHA13225545368440213daecfb2251384f497890db05
SHA2567af990c9615040f4a2865dc4754f4c4b00cf855b24ff2e38fdde1e7d0734dae5
SHA512bd03691726e915ccfe642583371fb7abe46aa64f92011fb86104022e93fe58a4ee86e933438fa2d1bac22988815728ce1a33a911b259cfa1f110d2eeb364b220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e8f1eb5890df0add3b62dcc5cbafcea
SHA19911011f2268b55408a22fb5e6afa26a0a8df65b
SHA25653a86613cf49ec1039cf60fc4865badfaaac74dc88d9e03f109af0e57878954e
SHA512174a7b47de06c9c7ed3589e1f449ca197673768f241e209dc2086b8534f676e1ad2a7d183844b07d95778dd25e1ffdbfd2ef68e668c8a1a6b288ccd4cddaf950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b46203048072c922bb3e4eb837fedd3
SHA1dd59a0673f9085e186e242a2bdf8f0f2dbefadb7
SHA256d9d7babec7658fcb981c1a3ed3e786ab197beef5c64b98c4c4fce5f0d1123e52
SHA512775551a63fc69b2fc7b6ed1316e80db024c614966a10761f4d4cc393932214c60df6ad628a52a3cda022cee2ae0e9efc21be8645d2701224ad1c4d148b9d1273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e568c137eda92c908865847ada7150b4
SHA10e88b4362c931afe2b4842b74f0980ea6dfa742c
SHA256b95ee4c65d9c22c87062e088a8f39ed9879a7f77f7ff91f880ef32f442dc6c6c
SHA512280e15e0c8151a051ebeacd46acdfa10a1f046f9e868a8f59be823c1b289929319867936be76ee57060b42676a6b5b16ca2c86a46ee272b0b8fc35db2942900e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd2b3bc00b6372de3746d67059d42f3b
SHA1f38cbf69f9fb1c0d13a948c67dd4bd159bfe726c
SHA256821272424a7cf01a788f98c42e417e871dd822c2a63a4556f5a8dba33484ba6a
SHA512ea59ff470b13f6bb7db5841c6f2ef50d6411df6493571ed57133f6e83bb463dcddcb951ba73112d03d688e9e6762fab694d60c571482d8ff91ac61f5f71a6684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a7422d4225ca6432a2957e53ee5ea53
SHA1b6ed042111efd155050c591a45cf651d279caa77
SHA256376f260040db7c5a5daa9957b69a5c8e7a35dbe8cefd3c7a10a02e349967dec0
SHA51205c333c1fb58bc984c2fc63e47ed57845304ac7f169e4c99b07b4132507cfd2bb47cda04e866339143da0f2bdfebe3d74cec2e2917799d97b31b660eb0cdb4fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55089acfe0c0f3475f5177a3bcd5d0cbf
SHA1aed0b3da26626c0f0a51f6b43de5d6e1f897d349
SHA256cfd6814ee3625d7752c27bf087a1f0936db60ac5c7bbd5144e4f26575c3e068d
SHA5127de663b67e1a5385a018902cf626d6f080cadd8ca6e09073cabd8e2a99c34abdbf0cefab9278a6c5ba4dcd2588298b515b2b7753076fbca7dd0ba696af3be86e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06