Analysis
-
max time kernel
118s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 07:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://emiratisation.ai
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://emiratisation.ai
Resource
win10v2004-20231215-en
General
-
Target
http://emiratisation.ai
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410084775" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30cdff91f53ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa00000000020000000000106600000001000020000000a46d53e51eb0004ab8154a16f3d2482e2cbe50ee25f25b66a7847e323d670e4d000000000e80000000020000200000001846488dc2b79f4b06deea25d7d49adf2ed17f92e5b2f500b5b88cf57ebd765020000000a8e62ccaf9eef29e45ec00fdfc7a7987bc6b5476906511983c2197fe51056e0f4000000007d7ab5fee657162d39cd2fe56fc10e21a2e2fb5e2fb3953598446c6fb3d993cd48666edd53c7e8fef3085cf743111435b7af19cd2720cf4e204f8b48588b6bb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B6DE4EB1-A6E8-11EE-B279-56B3956C75C7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1820 1732 iexplore.exe 28 PID 1732 wrote to memory of 1820 1732 iexplore.exe 28 PID 1732 wrote to memory of 1820 1732 iexplore.exe 28 PID 1732 wrote to memory of 1820 1732 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://emiratisation.ai1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8a13fe09dfa32a9ccb185ec1357cbe1
SHA11ce4d4e3df307df3158b25ffbacd7615cc4c4959
SHA256e03c2fd3553536caff2be51895a483a004d288e0fd6ca686362336b4b93cd757
SHA512671a8e6350e5cd54f26f94065dbf34f1332e24ede38fd57edd9b0e28b8b2f88cc127845863d476b5a225f4a85c7e4d949e6a9512b5074965636e4acc61a9c5c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3030c603b10f8c1f3d3bf6d9604dbca
SHA147050e15e15870e220869b77ed056943e0d7579c
SHA256085ecf09e43af3ca19fcf638bb813c5398c476e92531359c91616584ad1d36c2
SHA5122e6f82e3bc56c19fea782915a238333e0bde80fe664d6906db6147dd1df8130d177ad2784857d5c3a741e7b1ba64e08e3be043a7fa036f8451b16e40dd00d500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bec514744693a589e40ddd987e2b63d
SHA1f2ac35fd0f7fa9c96bec5252452e10417a879e73
SHA25688b5577ea7c4b7e55dd6bd5900cf8aadcbc07eb019550e6170ed0acd3a42e898
SHA51225dcded8e79e86f7dd513f7f21627a73202f1b768d652b6d312d639e4643d2322a78e94d1aa5d49df7aa122856099b84a37841fb83c05e82b8f6524fdd0e7825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d880d8ff29f241cc288a606eae5face4
SHA1c27e2ade8a23fcc76ddbc04c8f260a0fe05da9e9
SHA2560688bcafe3f1e0d4d0b278a921aba63ad7bb3d6ff4ef94c4e1e00269f934fdc0
SHA51294ae964fe1a9e180867f18c90cb43271d495ed4bfa699795dcf68e2cf719e74b32d49b7d35821358b48ed0f30fc42b7af3da351047ec0165bdcdb05155c0e406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576d180c1acf76edd8410fb2d1ef0a412
SHA196e556064253bf3456f29e7a46302dd60e287811
SHA25635131b6c48e613aca6e1a237db9b6362fce6ebec12ce880e49ca3598b97fc052
SHA512cb14a27cdb0dbbd89d310d0de137327be8f791f7dec7ec13b8a2aeb5ebc3c87248c256481eed930f5bd308cf2c2c4e5d0104d44327c35f4594c2d05f4833c7fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e20c10a9d65f38af2b1d0af730b88166
SHA1cb0b85534e4ae26f34d9c3108108f78d75ba6303
SHA256899005cbd0b20946fd7046ebc9143a2aa764165582ad3d72065237c34c295594
SHA5120448d184c91c5114b54e4f877a7c21bb7a3df6b72a125e6d9c7870655e852c27ce21f91f62166ccf11e481d5ed91d192d9a616eb05a4ec6ac5209109606a9605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e548e46e2cf99072cdae0ee58856e2ca
SHA1a57d94f867dcc98f25a59a18d33133b2f83dac68
SHA256c7e4a5cf753bd300716485056d68635cfba978ca4745ece1753d11e6c88ba83e
SHA51285353484cb18cd5c3c2b6883dbf3edcd991ba2069073c7a3ba949722da5f62557f162ea5b04c618cbe15afc896300fa0b91b0308a87ef5678c5fa4fd35f5b79b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58044060cf6ec066f1efaa081ae5557df
SHA1f04d90ac77feca7add7b0e5319a51bb7afa6faa2
SHA256b07876259e1217db1ac3910b8c74d5f1017a206ade777e010d1f3ad7aabd3ea9
SHA5122ccf077f30ecb98935016500e47062210617f21ac8f74bbcec419db2830db6b2066edf9f052d8ccaa4fce2e71932f2aecbaebc81d91f55788609622f94e029ef
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06