Analysis
-
max time kernel
121s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 14:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://lego.com
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
http://lego.com
Resource
win10v2004-20231215-en
General
-
Target
http://lego.com
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{84CBA251-A720-11EE-9DE3-E6B549E8BD88} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 208b825b2d3bda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f1200000000002000000000010660000000100002000000001260e294e9f73c38c8429fc75a6caf5c9817942442aba14b6dd861a0f74d5b1000000000e8000000002000020000000babf96caf87d4595e017a460059d8feeed945c6ebcc18d2b442c94a5eec51f4690000000620e6ca5bbbadb83ed9f29cb0c0d29849427d195b0e6c6156f489271b3121af66fd94d91752ad9ffaa7fd06195c0a8499fde383d3ae2da5b6df1f9466bef058d1cde211c727f1ae76d4537440e89053c30a57691ce96cdff8304a08f59eec3fb60f61896d73f37133bc8a825f0b8d1261b324437df8982563698efc7741c7a5303bb418530aabb6fd15edd288168d4994000000019e56a0310c9e68349baed61db3cea19f45ff966f7d63df4448127082aeed2557c0ddd6dc7cf4f00fa79a6e088b542e6991502be6a8186f03a746d97137563c6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410108732" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f120000000000200000000001066000000010000200000005cead5cdfc013b6978f7429745f7224317fb355f2b7bf3973f4bc7dc96ebfa3c000000000e800000000200002000000069e198efd4b91c55d1f8010015cf3fdc9e022d56079d001137799cedb58bc5e0200000000f5bc9a5ae3a0ece38cf204915525f32e05c783d382318bf7c1887340b37918b40000000f49d062e3a4a1530ec45fcf93d050d4241b2f653aaf7b11717f50550742c5d68725a0193dfc301d57cf6c64d37c17211fc49d1da057aaa153faa889918cb0cb9 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1560 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1560 iexplore.exe 1560 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1560 wrote to memory of 2348 1560 iexplore.exe 28 PID 1560 wrote to memory of 2348 1560 iexplore.exe 28 PID 1560 wrote to memory of 2348 1560 iexplore.exe 28 PID 1560 wrote to memory of 2348 1560 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://lego.com1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1560 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD57fe2ecf233803170d644279dcac63a9a
SHA149cd6a11c7fd246e7171646a76a0916227fd20c8
SHA256ac2c11e94dc34c1e8487dc25ed7922cc9336d6f2606cb0ff2f55756064ef2580
SHA512c143651f89107b7e0b667957aff8d37bbfb7f5d2d4001e93fea3eff9cf32718a854878b2886937b410fd1d49c25d3ba7a6e272ac11ff9b437cf879bc5e69e272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5047bd4b26e8f7cfc5fbd82597bd6238c
SHA1aa9508a1bee6d523f95e4338b0462a94699c1a9a
SHA2562d7cd45d22a7f428758e5c4a61692b834ac0d65b91494a94fb5d9ffd26cb0450
SHA5126676b4863d3768a175da264b374e6d49e12ff660b41446da5d0912d6d1b7b78cecce2a2bc6b2fff928c63745e380ee7aa91641ae0141bd07c03d0145266752e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557d8442ab6ff9795ddb7fd9e2089644a
SHA18f62d25b2b25244ea8b77d92735144026bc98da2
SHA256567d3d851bede0b76dbe01ce80404e80020d1407ed2796227c44127ea14ff4c6
SHA512e457bb2b747b4246e908a1bf466302db63e1c581b4ef4a22cf2a408a68ac96951befa7281e44160dd96ebca903c10e205887d72ebdee1e8f0ea379d4d4787cb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7499ac71970dc1a71ef62721ec46b80
SHA1703f2aea19317a16cc230fb0a8f3caa93936b334
SHA25670cbd8efefa86c2d02d973d245a1887017cc3d8a2c3b37801bc89615a64bcb7b
SHA51283fa52067e9e9dd2bd9faf670c15026139686a69403c35aebdc110b9b894bbf2e2e046edde206671fac41c4fca5e7df64d91b9de50844a3ece3f1d83618926ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54289b9b3196aef6b41b3e33df8d173d7
SHA11a947376d0da4b25d9b7b8f2eb2fe47a7afe7cb7
SHA2566f4b4ee339acb318f3fb8f83b2558239c5c07959bff300af1c2f315c31c2c27b
SHA5120d627626cbf88f9e4e49a958c6e1e797d046c425d4df162421b3d1b9a4d5b73f076b5443acd607ca8bce1d27b54ce0a8ab76a9d04e720a644d0a3129664c01f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb30558871c6d1ed12aac3a124edbbca
SHA17ce6fe19f8a687fadddbcd2b8857f6ce70dc63c3
SHA256e8258632832bf597c385ff99956a1f7d8b52ad3460fa24762d3fdbbb1fd24fa1
SHA512c577aad4a36e9475a7d2d077b4e5cfde5ba704178c384497d25f8b982269360e3af4880aec608ffab546f9549be99f22b2c60a36de1b1d4ff7df6f70f5527b5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c476c73e071ce0c99cbf6179a59b9534
SHA10d0e93e9aa2f7dc649343879537a006e8c9c24fd
SHA256b0fcb5d6f96fdf871d200922c732827698f9ecd471bce5adb35364a8c7ef84bf
SHA5122dd4501e690d0c7a4ddd86158b17402d3229afb6935fe6fb35565c6d9f4c3583c400d4ce02f6383f1c8f46e75a34677319629efa88bd997c302ba2cc95cdb73a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57caaea91573170c327fc0b384418235f
SHA190946cc6e71060d629ca2d5cf2e9e86b1e2659fc
SHA25688f496ef18d782192e28450f255e509e9f41d932b581187e76a1c1ceb4105286
SHA512e3aed1a0b1758910e6cb2369bb2d907c3792cda57eee6f941b81c5dd72d84516d958da6a32eefed34d6509d66be3577aaad761f33cffbc23805695cc9fffeb4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a252a26f8cf03dd8e03cb64e8df4c877
SHA1ea460d1526b78e4cac7a2c6e495b8bdf38cf4f0a
SHA2561c012abbdb49af1a066b7e27d08e916a8218a92d932e41b4cfb9ea5c69cfd08c
SHA512d4f7e2e2939a6024680e611da52bc55889585500514f300d2dfc2e970aec50cbe1370957f2a7f440138b14e758b6f212901d24be649ef31665c7f350fef8d823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564406601ba21c0570a35fcfca2d9103f
SHA10a002b2cca1d15f8414336355c51b95f5c1b9039
SHA2563da626e5c40d7065be8793fca47fbd29cf106ceccf3cbd23c545c4c00595eec4
SHA512140a158e2b0fb7934cc6642d734821fe5e5eb3f64fdb79917243d1be6b58cdea4fb25c384e8ed084bdc856ab3ce08115df424840b0916d82f8f6bcf5f3246b5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58222aa038dff3c64c88f77c54f055cd4
SHA14360608da2267f416e4e2f895dd02cb06d6e94c9
SHA256a3e69a1a91cb7ecb3f121b165caac2a3a23b866252f4df1bce4bef024b14d896
SHA51218f26922e8872d56006b87c5d118e2e9f1ba133269d11bbbb70525339fd736aea7b4d70f8e892c33c06eebb2e86205effa9cec4eacd15a5847ef63428b190da9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bfcf2910de049c9d06985af06771c9e
SHA1f26772626a9ebefab3240263af6ff979f889ac50
SHA256c5d0211e7692bc847ba5f39afa43d8692281e83d67df8a1740a438a9e486d260
SHA512eac476d420c784a5ac53b443f89f3bca8eed1864ce45fce3ff7c11ce456c85c00fa3041abe301c0d6f3f0dc95ee60b5fef391be6f1ca713206cf513d2ae1c48e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1e33c6983f2f89a6d6c855321edef52
SHA178e5bad000d15e4dcb6ae6c43d51e2d2a852d95d
SHA2569b3e6f0b84ed1113a05d7735689306e4c27f3ff8f16c4eebf79f242015c66d8e
SHA512ae425d4fd603337ef49eca1aaedc1db2b76406c64049e2a7993a679f53edfe8baa95f0b3736aefbb93a0c34b3eaf4eb9f8e908e4cf81dc7c99ae39aba87e6809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d59f8d5a68a714ae0e96b89bb6a5981a
SHA1f27d0b1f918518e617d2974798cc5beb75b1e306
SHA256406f2862c0001515907e47361d0ea691b024b8eda8fb2845b52a6e76d5916457
SHA51282d51cb752e44472c9930565f39c6b0786f46b49c52fe3bc16149aa029d445697437367403301ca0d2234a83678b8dc31bc4637c7eff530c796df52b0f60c40b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f37ed4f93efb18972642facf844ec509
SHA1ad1dc137a7aa70ba6359b73ac38f51ea01ae8801
SHA256aed6977db6a1090881bd6664c891034543c162d2d4fa7984b6e0832d1d4671d3
SHA512e6d04f64abfd9d3d6b9c34370331aa65288c5bcd1213f98da09c40cb132d98012aaa716d05b4c6f5b9b327ab8b5c063e6cc41e04ebae1829dc086ec8899a8467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c362a38e1d2a9400418e4e350c939db1
SHA152d11e0fcccaf28dcf8b496dc92cf90740bd5ca0
SHA2569db2b7fe0e878abc233a83e3b597e335690f673759e912cf0502fe82a804907b
SHA512a39f564a94d369bca700189d9a04112312041351f4e10a04036f6d1d9eb14d78ba683a923d8926e5d02f9afa6a3fc6c04e035f464ae0d8920e225d0008029706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD543b6d514bf7fc91241dfdea8021fe3f3
SHA1d0ef0b3874d79450e7d9e08a48e0320ba755ee17
SHA2567a0efaf205d6a0093bf73c90a8dae8b5da368c6829f6f5472fbc474b1a65305b
SHA512954fe25b86ef306d609e3c8a11a408a2e67d8db4b435f5c7fb079d52972b691bdfb903e4d51aa6807bb22092f46dcb2329a373b115af9eb0e0b4c2c69b559527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06