Analysis
-
max time kernel
4s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/01/2024, 08:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.arpanelearn.com/patch.php
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://www.arpanelearn.com/patch.php
Resource
win10v2004-20231215-en
General
-
Target
https://www.arpanelearn.com/patch.php
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2BD93001-A94A-11EE-A5E0-76D8C56D161B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 3016 2372 iexplore.exe 14 PID 2372 wrote to memory of 3016 2372 iexplore.exe 14 PID 2372 wrote to memory of 3016 2372 iexplore.exe 14 PID 2372 wrote to memory of 3016 2372 iexplore.exe 14
Processes
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:21⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.arpanelearn.com/patch.php1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a66697c4981fe008aab2924e0d751b59
SHA1920d0fdaadeb995e83a00c9b305be785eeb62203
SHA256b92efb38a24fd9fc583f60e31e34507b34bf98be43ebda302f7a7285f657ce84
SHA512136b116a57bbdb1959f66ddbd48cc4e5458fb7d33e47b8c7f70d537ea5bb928662f5b78450e37ba953f82bf40cfd843019041a5427402429a952204ee39c0d71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569b3c6a85d7873e2fa432a32b2b0fb49
SHA1855bbaee1b7de036b05bd80b6b612bedf998182a
SHA256718e9fe7509d4482517e5843104e66d61e8d03251ec3cc8b8a25ad5da9ae36b2
SHA51236c747e25d54cb27c7e0a4791aabc5c036d2f0b2ffef394046c04c99db2cf017314d49389900536793b400a719ed3a9d42f70c86b866eab6173e833f50633c1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2f2feeea2e8429f970d249ad958d972
SHA1ff8955af5305f78fbe45976a6ecf0383be596e01
SHA25642638b4217e087a334f5fbeb28264b9a2e982c2ac03897a9d529059b25e0ed50
SHA5120cd2567bb2078c5dd68c8203c4c5bf317adf3ff52a96ab110f13da0ffb2a261a7faa4f169246b10dc1e48b55197069d2bec9bc67587dea578c826fe70f0245eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e45b54080cf28742fcfdfc28ef73443
SHA13cc971849b5d4079eb8aafa38ea491ca5172fa78
SHA2560996a26d1a42d574e4bdf6f02e13c98c28f059bad5f7227600cde3e17b5b7da5
SHA512bc4efbf55708e1c65185c6a197194a9c6ec7efa3af5923c433f5ab242e20ae4e8e201435a80f9bfb18f3e1231019004248e6f9d04c4a8803b7651e261c1f5b79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c250585f96fd360d837813924ad5133
SHA1ee3d57086592cfa98f72a5e41e62373e87db374b
SHA2563bb5ed3953211b6ffcf309785d3202c549589e931d09ae5b74bd344893cfba7a
SHA512887b7b956da858e8504bb16b4b36d7067a03e8f646749e13e5065c4698d0ebc5839bc4c97d0312623bc9099942e088298aa310f05f9d09cdf669806c2ba52184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1024943847fb4bef6a6fd8cd5257c16
SHA165ac5508c23243d016602d88bdb7141e5af9efe5
SHA2567b1504b44cb7a800d24600064dcad61fb5247dcdc0cbcd4b0226faef2e8a8fbb
SHA512a89938f55cc462d2989008266091ac102dd6f968ef4704e8cb0efb3b46b5daa89708c7944498e3b009ff434740c1e9f67c2ddf24289592cd2cfaa2dad5bbb7da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f027fffed20588936488dd396ec09b8
SHA14478be1ca3ca87fc559bbeca728d466b755d8d98
SHA256e231da07a830ed3bdc2d4a9a9d1711a345b4267799289fa42595c550567da8e7
SHA512de2d9a2101a04ebd97cb04e06f268e222c416338a34007323025dc95edf8a99f8c0c243a15ca357b045e3ea525d67013edffdc795beabdbdbfa8a1ba714aa249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c71011e987ea03230f1d92db7ae6c78
SHA101653f5c286fcceca18b5f5677f8894a974ce2b6
SHA256fb070774b03e8da24e3a4ab44a449c750a7cf4848a851e078143ed60ca27d00e
SHA512adbbd9507a3b5ff304d83a52fc887bc7ba6d6565746827a9c9ace16f62de69f9ac85c22cdf757b7f6b76e672cf6cfda2122eca64b2dc8cb94fa88e6a232931f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0301d4acf02c878cbce27a99ea408d6
SHA16cab6356b3484b694045ec757835c9fee93f81f9
SHA256ed049c288a23e2ea1beb77cc782b27683142d2fb93d0be905411ffea290e6917
SHA512a7a28ff373d401cc8b1907762290e697afb86b7c38d79d492efd828a62c9acec0853eccfabf6ee28dc11fcf2ed0c1659035efcface1ff92912074bbc8220ddbf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06