Overview
overview
1Static
static
1irs/bank.js
windows7-x64
1irs/bank.js
windows10-2004-x64
1irs/card.js
windows7-x64
1irs/card.js
windows10-2004-x64
1irs/confirm.js
windows7-x64
1irs/confirm.js
windows10-2004-x64
1irs/index.js
windows7-x64
1irs/index.js
windows10-2004-x64
1irs/js/boo...min.js
windows7-x64
1irs/js/boo...min.js
windows10-2004-x64
1irs/js/jqu...min.js
windows7-x64
1irs/js/jqu...min.js
windows10-2004-x64
1irs/js/jquery.min.js
windows7-x64
1irs/js/jquery.min.js
windows10-2004-x64
1irs/test.html
windows7-x64
1irs/test.html
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 00:29
Static task
static1
Behavioral task
behavioral1
Sample
irs/bank.js
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
irs/bank.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
irs/card.js
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
irs/card.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
irs/confirm.js
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
irs/confirm.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
irs/index.js
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
irs/index.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
irs/js/bootstrap.min.js
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
irs/js/bootstrap.min.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
irs/js/jquery-ui.min.js
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
irs/js/jquery-ui.min.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
irs/js/jquery.min.js
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
irs/js/jquery.min.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
irs/test.html
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
irs/test.html
Resource
win10v2004-20231222-en
General
-
Target
irs/test.html
-
Size
23KB
-
MD5
f8968b5cec271891dfec168f814a0ed7
-
SHA1
b31cd27358e4fe531ee61836b41a943e9c9e2ccf
-
SHA256
2833d9fb8fa07e55dd18b5b22af852f793dcfafc9c645d40b0ca0f42cef5f556
-
SHA512
52e72de8202587fea152098d68cbbb10faeefc05bbd943ab898d5dac361d6560e0f95642af19a024e6e589a7c77f2e3cf594b9e37a2c4148ada62b90e583202f
-
SSDEEP
384:HOu2pjOlLciTa9CH5CK+kSp3NeB5+hTBvyR9kwhCYJbTg1e71LJw0Gmic:HYgL1eK63Ne7aytwvy
Malware Config
Signatures
-
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{C4AF0C61-AB5B-11EE-A0B6-766E2D171A79} = "0" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
iexplore.exepid process 4428 iexplore.exe 4428 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 4428 wrote to memory of 3652 4428 iexplore.exe IEXPLORE.EXE PID 4428 wrote to memory of 3652 4428 iexplore.exe IEXPLORE.EXE PID 4428 wrote to memory of 3652 4428 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\irs\test.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4428 CREDAT:17410 /prefetch:22⤵PID:3652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD51bfe591a4fe3d91b03cdf26eaacd8f89
SHA1719c37c320f518ac168c86723724891950911cea
SHA2569cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8
SHA51202f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d