Analysis
-
max time kernel
48s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 17:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://educapital.activehosted.com/proc.php?nl=37&c=581&m=762&s=6f0bf38169b2308bf9148b804d814260&act=unsub
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
http://educapital.activehosted.com/proc.php?nl=37&c=581&m=762&s=6f0bf38169b2308bf9148b804d814260&act=unsub
Resource
win10v2004-20231222-en
General
-
Target
http://educapital.activehosted.com/proc.php?nl=37&c=581&m=762&s=6f0bf38169b2308bf9148b804d814260&act=unsub
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{866B90A1-AD85-11EE-9278-CE7E212FECBD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e02b71649241da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f12000000000020000000000106600000001000020000000c7d84d3ceb0a43db8a83480bebb8f72285ec25ff3a6889c99710818e68ceac67000000000e800000000200002000000064c8730121ca678c7f082e1acd24e78efab6e5359c68467d9fc945efcb0c0bff20000000c1218cddcbd34f00571c8e98c7b6c591208946bb76567e4bbf50879c3d14f1174000000094c7b09cb411abe00e8d103aef5b784bfe091c34912cc99dda7596ec77d5a4366549d3022c6e6791f0073a4613e40c0c963f37087553f26ee69a14f239079eed iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2824 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2824 iexplore.exe 2824 iexplore.exe 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2976 2824 iexplore.exe 16 PID 2824 wrote to memory of 2976 2824 iexplore.exe 16 PID 2824 wrote to memory of 2976 2824 iexplore.exe 16 PID 2824 wrote to memory of 2976 2824 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://educapital.activehosted.com/proc.php?nl=37&c=581&m=762&s=6f0bf38169b2308bf9148b804d814260&act=unsub1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2824 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD51e2de780e1b9ca854e52ad35a84f86aa
SHA1d602585ae1ea58903935b4d82bc0c9b743a89774
SHA256811e8e4bab58633097112812cb1f1876ae32b9ac4acb66143f015a2625467539
SHA512cdb471f3fe57bd39de0ff0bcdd91a2c544900d3fa1b740cfc74b2a3bb7a4d5439deecb5a4d86f54079d4ff3e0ecb7f02c837969ffced80486da47be0012ba053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD57ba6f589793b7f173be1ccafcc3e8506
SHA1c024fe3a85b384bd1341c0404744f86dcd1c909d
SHA256a50c743f697ee88c51630fe3fe34866f5f29abccd6dce07c0ed6dd0947329ca8
SHA512fc516d5cac8541d2e1bb9569e46dfd19a9e244d007192f7c9dac82d3eff1db3fd9e7dcc74f6308170282e59a3768216079ef3faf64a704628aea34e2c7f211fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563862373990c7441e438e09d9dac63ef
SHA12116abdef3266f734bb2811314b6dd1491416c34
SHA256ceac14a929986554b22e7662980e01877c2882ed7cbec0a3c75957f080d0c7c6
SHA512fc14c8d3173c98db649ad99a106e7a92e306b5cd605c1c59ab6c4259fc127f91f7c844d4b9d960074fe89ef56887860598ea5d401f24c0c1e52577306a27601e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52620be91d453bab3e7d903aede5dd19e
SHA1b583931c56d07c5cf2326dc0ab79da0e561db5f1
SHA256ef447eb56189609dafd2f414f6b0d0a1b1225e0aa67d21cdb29092cb1e05d0c5
SHA5123cb2a91a85509930adfddb9bb70db29473ef294a7dc49db877f083cb9171bc88488039a804512318eea3d4f1292890c5d64f60373f623c45356cfe719404fa79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f271870eb9a3053747a4d021dfd48e0
SHA153c39e511ab32fd5454e8d6ae2107a6af3141e0b
SHA2569e99f92d7f17b943788fa065d6a68584602912fe7dba3e7ac9e5ed36d2918640
SHA512fd4abdff8ef12ec6b0e55a90458528500b6005bcee57d7153546e747177d3348cfee7c8292874a54b5219891c046977821cdce116d7eae1fe0fdf1a2d7a2aee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52485eb531f8fd48dc6cc24e742d0139d
SHA145d5f8c6efaaf0d508cb4dfd628f2fd761f73e24
SHA256b1ca598b3cb85a01cd119d4116b0d7c5859d32e4ee150dac097076eb6b90c66e
SHA51228953e8d0a709d9dd23dfdf252a68a25d842e5121c185982564ec3c6c6ae4f2d9baccec35829f65fe85d4407a2e13c793e8bbb3bbe351da57f27c57bf8e1081d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596538cdf112e69d8b8961c5a9d1847cc
SHA1b58ad0aa7963d2cf37d6776b93a3bdbbbc17d28b
SHA256c4023a4ec193720775f5999c1c47e053ed5f3b50f379ddc385b3c2f3abfcd67b
SHA512e0e8c37d1debee77c602a0618c357f5526fe063e905c9b001d3d21d40cd9abe9943eb0a197262ded433d0fdffa71c4f15b905f343d2ca36cb155780780460054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD59124210a79e39b349069f67e14e664c0
SHA1a55c83105c97bd87d25d3facd0bd21872e18b76d
SHA25688ec68f041d00cae96c691cbe7cd63e0531f57eeb13eeacd26de19fbe7775d9e
SHA512cba9d3b7d2f1faf9887ec8b9db9e50181bea08e40368c129612da4286dd539c1616a7b08fb2cd28b74a829d6a0e7f665e906093a7bbd0660d993ff9b622b57f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
3KB
MD532bcde456b80402938ae30caeb9d48f6
SHA19581aa6745f1add2c9944028d911fde62232d27d
SHA2565a78f99864cab22f721b448cbec391046a48cf0a29dfd8254e0bffe231669bde
SHA5125173feecb3b90c69159a610bf0e00a91a272b184fbed00e5d8a4e2f65b01015cf5110966d753241e96ff303a851a298ac6966166aac75fe5e35c70e1c50d93ce