Analysis
-
max time kernel
119s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/01/2024, 20:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://2001:7f8:112::1
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://2001:7f8:112::1
Resource
win10v2004-20231215-en
General
-
Target
http://2001:7f8:112::1
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410391007" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BD000241-A9B1-11EE-AC0C-EAAD54D9E991} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2508 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2508 iexplore.exe 2508 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2712 2508 iexplore.exe 28 PID 2508 wrote to memory of 2712 2508 iexplore.exe 28 PID 2508 wrote to memory of 2712 2508 iexplore.exe 28 PID 2508 wrote to memory of 2712 2508 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://2001:7f8:112::11⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2508 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f663de9745bd08c948280029a35d5cb
SHA12ae23103cf93450df1bcf1e7997af6964590727b
SHA256faeba717f7f97b59fef3798832246ea35418183775ab89f564f7074f3349e0b6
SHA5128899000b83111b57bbc44017380eb7eba74fe9817fd497b45c59eb6cb11e8178d93696cf8c4aa98a9cb39dc42160e0cbd5919f40fb6d24254bf3ebd1a57ee01b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c50b2b82846556695ed40e80bf69578
SHA1be5c0d9193caab22a2c3874e495cafe632dffb17
SHA2563990c41116be6b189cfd29e524b04efcd03ef91f043d5ec02c7d82ea3c91c799
SHA512630d7fe572e926d0c3db318c212da2284cfe2352c558f12d238d75319c76cab37e763dbdd0d9af5e8bbdbb7ec1f8e0b250241bd9a6054071f9877afb7d553390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f360e2fe1bcbde6ed55813bcc3641921
SHA118fc9cd29d410ccb912c36e4baf9680b675f149a
SHA256115c722f3b12b8852243b7fa7ce1583a09f0acbb05f5d29640e96291908cca43
SHA51265bddd9c8f4881042cab50a3a67a114e8172de5fb7aa7f7c928def5aaa41c657bba314358b580b1deefa66d5f903fb01cf691446224a35cea49a80aa055b9631
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a3bf78ac49f682fabca658b31e0f7a5
SHA134d2e6e10aab5da0c6524c9a3a542295576be508
SHA25660bc780552c68e1eb996e773dd6a52d112fc87047ca0fa9e87206cac6bad367d
SHA5127bc522773436e0ae83dd643d0835878233612edc9ab4bc9a8386ee556a644a23f3681d6867641edd87714989319b5ba697282aeea62cd8d4e07ba21771c4726c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52918c09b0cec24be361966bb69292cc3
SHA1f4eb94cf607d544f721571ec652a49a3d25ea4e5
SHA25610ef9ff7b2ccee04455fa9de6b08ac9d21a988af0b5b15cd473c0ea8978eeb6e
SHA512f79146dc3848955fde42a5df5bfa3f13005685d3062f89f55e2f06b4891e953b2a6a999587577178c27420d5d6310c74488a2563f40d9b86c0ddbc0693c40c16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c8932d9ab8d1f214ab4d178f58cb6f7
SHA113da835101808d9a03aa4c5f9bea30cc446c809d
SHA256ed3f52c1ebf0ce6ab95f1af69af7a13459c20533f415f927855e0ebfc2e37dd0
SHA512abba987975fdb44129135a0ff70c76033421fc2ce67fe99a17ad0cf89f5e613e164912dabe23e5c74f98b9600ad76eae5cc5c58ddde35e05e1bc5873cff3f057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548c46db360bd02a288fbd51acf64e396
SHA152f0784e5febc5177ae6742d2327795241133dbd
SHA25665dbf768154af481df757d110f1315c3d05c56342bb3984b059443b2c658a343
SHA5123fe37402d3813225b4df760752d67f02a0f9dbe442d69a689d19890cdd240eba647af2eaa388e073a6a5d50dd570743217ea52e6af778f15d9d80f97a03d4dba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f1d6b8cb8bb21b0953a5dbf81f42d5a
SHA1868c0cbd6c65ad47c722fd6f8efa27c1c861d4ed
SHA256f3ccac9b6266848b459420b422cd2986e35bfe8cb196f13c6d45a36bd5b5d3ee
SHA512bf9f0d86be126fcde67cec247d8d650e5acbefc876209354f4ec8f550a0675e817e3b917c8b9e9465b43f443a263d2129945c8636f081260d053d5bd1194dc56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1c356eeb3d224874f2813248f6fbb88
SHA17de99d4de4f55d4899e41f89c0e5afafc9246b29
SHA25622f271b4fe14fefc033544ca6baed55342b70ae06b4e4edf45be4f24b2b32ffe
SHA5121244e6eea6563ac37f8390faf267782bd495d239828b2bc9988499a647db7d599389c555dff36f1d127ad484eb13f1fa42302d2ca408c19fb3553fb9d34c2645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7d7fd439c83f16146ae5560db834e94
SHA1e1329d10b6fd4c1e80d6c14e0830209fb1b96617
SHA25688c1544d2a0766643199caf20216c3a0e82630b50a3dade0947cb744b7a96300
SHA5125eb60a66f9218bf93072f68332aa6d8fa2f0f885c48f67293f8ae7cf1c04c054c2a191011194a5cdcc5a2d865ca0ea4eb53531bbd67965e6f539909d420c51f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525366a78fc3e2dc0e4063aa20562082e
SHA1408d279dd0e7a98ae7c6336026dc56c22703dd9c
SHA25603f05031cc3557fce80e9bbdd5666bc1e157406493cbc1dab135071e55840bbf
SHA5127b248b045593f98e86939ea3fba9886d5c95bae3dcf0ba2fffe9c6ddff6b0a2392da1c74548aa39ae07dc10e8dc3b700f94167c815a57feabfdac55fa77aeea7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc78a11d19ce1ac6583edc68169c3e5d
SHA121aa915ab8968434be771841c341fd46411bdce5
SHA256ff8f73c1b0ddaa686e22eb041e5c6330c3b4e41a65da55f0ae2e942d312c9b10
SHA512420579a55e9869eb0e7a563310ba00768290c390e4c8c9195bba7776fcbaf2dd23800388251dab4d5229975df9d4e1307d01cd6c0e3f5de62155eedd7628f6f1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06