Analysis
-
max time kernel
103s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/01/2024, 10:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://u28850422.ct.sendgrid.net/ls/click?upn=iZnbdU856XOSZf7K5KdjO-2FUSit9y3t8HMa2ZO7DGjRvAMRjOjRYS1p8ZIA1-2BOpdQRhxugsv0iS1ulG24KaR1-2BIEWvR6oT-2FfvPFR5n5fDobPGevfghSJbKyAZu-2B8Bh-2FjGQn07_mZxSWv31xVb0zX8Xwb4lntZJBLtu6RH7FWhRq80Dky-2F1eVQVZpLyAB7kUt3LNABP5VkWmuGm5IE6dp2p1MhCQIzmHuoV4bYp6nyLPiEQB6-2F0N231CpBW28TqPoTK4ffdBvG-2FcgvIDxjnaADyzYcnp094OWAvN7zi9wrp9OaAgXoqD232csosDlI59rtjjPM9KeauQf96AF9TuC-2BMUVyRheQjHFafAhqElX-2BPUuk1QtM-3D
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://u28850422.ct.sendgrid.net/ls/click?upn=iZnbdU856XOSZf7K5KdjO-2FUSit9y3t8HMa2ZO7DGjRvAMRjOjRYS1p8ZIA1-2BOpdQRhxugsv0iS1ulG24KaR1-2BIEWvR6oT-2FfvPFR5n5fDobPGevfghSJbKyAZu-2B8Bh-2FjGQn07_mZxSWv31xVb0zX8Xwb4lntZJBLtu6RH7FWhRq80Dky-2F1eVQVZpLyAB7kUt3LNABP5VkWmuGm5IE6dp2p1MhCQIzmHuoV4bYp6nyLPiEQB6-2F0N231CpBW28TqPoTK4ffdBvG-2FcgvIDxjnaADyzYcnp094OWAvN7zi9wrp9OaAgXoqD232csosDlI59rtjjPM9KeauQf96AF9TuC-2BMUVyRheQjHFafAhqElX-2BPUuk1QtM-3D
Resource
win10v2004-20231215-en
General
-
Target
https://u28850422.ct.sendgrid.net/ls/click?upn=iZnbdU856XOSZf7K5KdjO-2FUSit9y3t8HMa2ZO7DGjRvAMRjOjRYS1p8ZIA1-2BOpdQRhxugsv0iS1ulG24KaR1-2BIEWvR6oT-2FfvPFR5n5fDobPGevfghSJbKyAZu-2B8Bh-2FjGQn07_mZxSWv31xVb0zX8Xwb4lntZJBLtu6RH7FWhRq80Dky-2F1eVQVZpLyAB7kUt3LNABP5VkWmuGm5IE6dp2p1MhCQIzmHuoV4bYp6nyLPiEQB6-2F0N231CpBW28TqPoTK4ffdBvG-2FcgvIDxjnaADyzYcnp094OWAvN7zi9wrp9OaAgXoqD232csosDlI59rtjjPM9KeauQf96AF9TuC-2BMUVyRheQjHFafAhqElX-2BPUuk1QtM-3D
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f06bc558673dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{75CEE461-A95A-11EE-86C9-CE9B5D0C5DE4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d30000000000200000000001066000000010000200000002ee1e3cc9f1a6923599a9a528e38fcfbb03b9ac3829e98e68c7e4a2b332ccdf9000000000e8000000002000020000000bc77befea83d3a26cf3b0edd2cdce2734808bd5e1dce506851baa715d6ec66db200000003d3458dc4ba8f10607c7f1ce3d835d95d752762de8163ef25e509a2cf5bded244000000002ce3196399502836500c1c2507259e7c6601aa3e71fa4522abba00539dc9187c4085ea12d4f541dd32191e1baa290451b49a213aebee5d2819f41bd158578cd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 304 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 304 iexplore.exe 304 iexplore.exe 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 304 wrote to memory of 2404 304 iexplore.exe 28 PID 304 wrote to memory of 2404 304 iexplore.exe 28 PID 304 wrote to memory of 2404 304 iexplore.exe 28 PID 304 wrote to memory of 2404 304 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://u28850422.ct.sendgrid.net/ls/click?upn=iZnbdU856XOSZf7K5KdjO-2FUSit9y3t8HMa2ZO7DGjRvAMRjOjRYS1p8ZIA1-2BOpdQRhxugsv0iS1ulG24KaR1-2BIEWvR6oT-2FfvPFR5n5fDobPGevfghSJbKyAZu-2B8Bh-2FjGQn07_mZxSWv31xVb0zX8Xwb4lntZJBLtu6RH7FWhRq80Dky-2F1eVQVZpLyAB7kUt3LNABP5VkWmuGm5IE6dp2p1MhCQIzmHuoV4bYp6nyLPiEQB6-2F0N231CpBW28TqPoTK4ffdBvG-2FcgvIDxjnaADyzYcnp094OWAvN7zi9wrp9OaAgXoqD232csosDlI59rtjjPM9KeauQf96AF9TuC-2BMUVyRheQjHFafAhqElX-2BPUuk1QtM-3D1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:304 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533036b789b2943ef4d003eeca2a0c6af
SHA158d7dab87546ca90ccc9d1bf177fd8bd90ddedb3
SHA256553898faa17d032bf10bc03b0443eb339453724817ce488776525228ddd9ee5f
SHA51205e012a476d0e415de68c1db8414453d883238139ee04ba15a5f7e3c3308c37ec3d87616eaee113edc4a831b582016c45297721821d28b2c36c35c912548d845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f72a98b6f790e0b4ad3ec71738f5564
SHA19f351b76c933c2e9cdd781ae41eca4c144afdd49
SHA256768a6b46edc3c620ffb07da3d8ae92cb1eb91a6f019d4044408f83dc93bba9fd
SHA512dbae6501afe4f7086624375ee0d6e503d388770941ccd2e4c970234949623f8a1497a369aa7b41866a1a6b31e7c6ca55d61fbe6e5279ab9b9aa8dd899ebb77d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597f66734beaf5609bef55fd32a30bc2c
SHA183ea50f5f787b1f8c30bc7d1232f7996ab51a36c
SHA256f2a92d65fa484585d8ba3985430fdd161eca9849a57c3694f1263dc8d25c3112
SHA51270330917c173c757b398861301e74888be1dcb18f6a6610f2ce3036e43919c4aee803cce75b59d84bb299c5282e2fa411af404e178413afce6f043678fdb8ab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc2bcfe67464e8f28190dbd8488b8133
SHA19265640d30beac735f20884cedd64c9d17fdf3e4
SHA25657cf69ea10ef64859ba3eaba8a934721e2fb14541582fb4a1d4e60b3a8e6ac56
SHA5124ff09f37c4fba3a6e44453fe4a791b7f05e054868ea0769318a97b45f4594675ecef0519788427ef48fc69fa724534676308e152a9f73902babee7dbe7306fb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b4b075a96e209dbbe720d667db86230
SHA144300fd1d1c74dee0aa384cbc437fe306dad52d1
SHA25671ef45b7e93015da609715aa89cb2ba964cfaf2da5f009365fae49905cf9141c
SHA512d9bb5674646184b86f982404cb8349c09a7658a6745ad99968bf50f6fa1917c7dea526700661184816276af188ac3e9f914f2c78a1b6ac2691df93ee4414d342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f79f5b0111c02650ad8efcbd28ddeecd
SHA102d5536f4d5fd11cbab03d2ab1673dc0379c36bc
SHA25671888c0b62baa99ac64e21614c5a429fcfa6162a4ebb3561e6336f4697d2e253
SHA512b11114697a4371c440e83965b0ff8667d23baddc104aebdab7ca8f8366892d2e2e1fde75844d5a8599d46e5dfbd4944051a14440f95111621992b4238d21b6aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b46c85aaedb9b4085704b89edf02391
SHA168b1fd743e5c56efe984599e04b08d54f38aeb26
SHA256f2ca755f26449dd7842ea0b4b75409c40faf48a324e9fd680552cdb51484b8f0
SHA512bd999b04d4a81a2f656e1b9c0bfddd7b7d4e1d073d07b11226bc31f0dd25eb90a6bf1b6c84ddfb878d4b0a660158aa785889f19066784b0999d521ea46f067c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524cea2409e0974204ec0d90fb3af8514
SHA1639b865d922706c81c364cbfeec214bc99d7cbc0
SHA25681bdf8a0c4a966109a6d2eb6ee1dba6b1e45a4e984dca9b73f952763d8b74fbc
SHA51263db7f22b52a170859ffe772a55d7a3b1a042b53a28371fae1dc2ba4c2dca4f6df1a661cf0c21fa634601dbd17d26a03b247d8418fb63ab533be4ca0e7869b6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e16f55b9d08e726ddb8af9439ea31c85
SHA1e9a76a7af039022656738984e1bfab5d3c6a9d92
SHA25681c8772d122bfd36cb275db7c356ace6deb4c976f4b60a30802018095546c262
SHA5122e6a05e807257450f2872ad1fed6f42c96d5e4d9e1576d901624bbd181f82b4b897c520e4a5abaf7b858a8bbfa0a28f97b3a850d315a3c46b7339526b6e3a2da
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06