Analysis
-
max time kernel
614s -
max time network
618s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09-01-2024 07:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.shodan.io/search?query=oxpguest01.neom.com
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://www.shodan.io/search?query=oxpguest01.neom.com
Resource
win10v2004-20231215-en
General
-
Target
https://www.shodan.io/search?query=oxpguest01.neom.com
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410948070" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BE4ED571-AEC2-11EE-9BD1-F2B23B8A8DD7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e917866400000000020000000000106600000001000020000000ee9cd44124f8d9c3da9cddb7ddf3f6382b5c189c57f1f17e0afc305acedc3e93000000000e8000000002000020000000ef8d47f671a178d786fdc4381b2031a6fcf4c4126ffd569d7fe0eb642a652f70200000009f088626328612cc73ab2c67bdfeffb009986ce8a824af7fb83193e84a6e8230400000009593251efb59040d4497fde725ebc00297ac9ec17a992e87ca482110fd08896645620c93e6d6c69d69bb054cd5fea9680d1a55b0e2c27043697eac2208e6e0c8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f04af7a2cf42da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1700 iexplore.exe 1700 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2700 1700 iexplore.exe 18 PID 1700 wrote to memory of 2700 1700 iexplore.exe 18 PID 1700 wrote to memory of 2700 1700 iexplore.exe 18 PID 1700 wrote to memory of 2700 1700 iexplore.exe 18
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.shodan.io/search?query=oxpguest01.neom.com1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b772e80c389017ecba4fc725215e8b1
SHA13eec76032b5254813ec3af2ed83d39ac2a88f8ec
SHA25635fa1c590fcdd6ecef3da554aadee6de7655c6e1f6d5723634a849dba044ddda
SHA512c146607d0d9a91db19457b5b9feae0d4f5fab118507b989d90f3b508521de2782dac3635f5d1db7d031a7137bcd5cc6c8485b4c8457545dd841cbb7fd28cf21f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa08ff9250e530714ac098efc9f2572d
SHA1b8583de1f8cd2369e356838ff8c7f41fe74f9a83
SHA2565919ee06ef4152b012075e12b0e1bcf5146a7c84941583e70564e2e1d4869f75
SHA512cf9ca0407c70d437b87e5054f6c0b4631b0b28b7712638f1427b684a1f28ace100999b53aec84fd047f031b5786fce7b79d6a0be51a756305774d98bd63b0ec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5107f9167aba4ac178e44c3e9131d037a
SHA12eabd64776e30f7e387d1f3ec7c6bbd56bf72395
SHA256144bf9d9b119ea4aae41baa6ba151e9c63309d2845e530991ca5e8856fa17ef2
SHA512d7cd2d81d7f9bda36e61bf001cacb3a5bff84ff97360e6af88ec5a79b8d2eac70dc8cbf7aaa8edb3bd814d2e8a0ddf3948cd0eb83f470cba788fa3e17835e43f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3b24d3303713812f8e9868d8dcb6233
SHA1a4616be120eccce5c2d85a346c7fd384f625f34a
SHA25693c707a1ed76e01834a2d545e1633d7aeebabf0c0a887a2250a7bab06e39eaf2
SHA5127c39793a424a2f28de6853bb9172c75dd464e98eb41c5fdbae2a1298089181ef615ad2a1cfcc4c55e283d225e373e57a57986990dc8616058ec76474569df8ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597f7947b453563e78bf4756d1a7b9d3c
SHA1dae35cb4646f6dea90510b8e1eb098c40ab1c38c
SHA256adea61c79fdf90623917a56a43065aac94767cf2ff80823744feb3e7f89f4be5
SHA512fa4f8742e2f8ffe28c0f161c1364c61f05e40d0ad52f16e3af0166d8031245185fbca5d49cfbe61a75619807986aecfb2346930a43b1e615c40087e386e531b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555b9e2a3f6a9894ba24f051bd1bc21c0
SHA1a99b3fc03ab15752a56834d5af5e92599193957a
SHA256d28b78f1a1ce4e7858ae5d19a7cef7046c6752ac2acd7cd2256fe98e35e618df
SHA512ea051e39ee6164d97dc324546c886cd87a2ea3ac56621b1026b86c0c945e998751c397b668dbdfed1e8e73f47d50e7899b8c4096c7bec9bf1de0dba13b71899d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8837f95707adf8ed0cfcebca1c7950a
SHA139ac7ef2043dce3eaf7f010309d89b135a36033f
SHA2567e3afbd3273882287bb2733e71dc4db11cd0f29901e21602b49834839907094d
SHA512b347a3ff751fbd1e05dbcb1506a13977ac61cfa9529d5b05bc6218895106f5c3e043e5f77fa634d717cd3846b7a45d7f356eb6987fd7c38df19e93fa571195ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e9e405e696d1d54dfda01f2e78d305b
SHA1ed3c2ca0db33cceed64410502474b32c6a84a6e5
SHA256bd2664a20f749bc02b1f9250fa042f1c681048b843732ae0f5a2c45cbf5e7fa0
SHA5125d0a04261c0695d283f28aa868c3387c227f6f42a830039ec6ead1a3ef30322127a1bed88e5fe058b06b5a6324ad08610cf4eeadd2f2a23f43504812a3cfe257
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bad0257768c22c6a4e10d4bd0784249
SHA17c061163578d1bc9d8afd2244396cd12598b37d5
SHA2560d5b538aff727514f2eee5bde8e78d452d909ac79f73caeec1bf953b9d51e785
SHA5123ce04dcad0b992592a00a25594cc3e87c62ffa4da1b4102072dd804854a3e11030002a372a493df519f126b63e1c918a9e2d6f52f50cc5051074904912f26fc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed9d0a4ae1b6a36efab4b6f7adfb928d
SHA152732d16d5912b6818cbaf348779fa1fe5f46743
SHA256968a71ba03c100a31f6bf04b683b83bce941835479497e84a53fc7e00b729c1f
SHA512835a32a6244efaf53fbff852a0de510cb0786f53053d9b1c5ec826ba99d03fd7ef5d9b7a4c8d2bc83f7e1f5aefa37839c0fcd6c92de8bd831fba483f9a231000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520bc0767305d3744615bcf1c12304c47
SHA120015c5258f8b92bfb22123efdaee0bc3defd84a
SHA2560893fa878f512b93718fcfa183befedf6fd2ac23669ea82db92d1243973f877a
SHA512ee3dffe38b16f8e222a9b24ac8afeee94ef69d6735c393de9a05aceceb79be12e4c76005fe97e491f4f16876761582075b0ee063be50a5f0d63624251292a193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555f2cc1fe6fb934d724e4b65b49e89dd
SHA1f587a728231cadd1b11f9301eb57e779dbdc6a9d
SHA256f10b1be62aae71e5c3994fb735354546042c1e2edbf807db0ab49eea06bb258a
SHA512667b0b1840ba95086580b56357937ac614a15eb5e334e4080edabeffe0edb53ce4c1d3a6e860939fe0ec50f6969d1502220ecd06b82af09177d4694aeb070e21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bbb17816ff612eb5e1eff4b7377969c
SHA1ae29b34223c5f7cd9df7469225f7427428e66631
SHA25608cf79305e13e177d954e2ab8e2d07426879e520ff71aa95680876417f866c67
SHA5125ea084a272f7566848de836a910c233e2e987fcf56c80d7d01c1f01c5822338c09b5a35ee7fca21b9be6f1ddb01d9812ddf547357884061e73808bdb0c70312e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500c24d0ca225276690373fa386aaefb9
SHA1fc5f3fba9581265ec6c56f9be34eb417bbc41720
SHA2560fdfdf7d14bf6fcea3ff24251415549cf5765a360fcba3687c75f1964ff42353
SHA5126cfa066199b93237eaf1786f05a9412b45001d333e72410afc90411f956573b3b014ee2b43460827149e2bb0195c7a667ae31b254c18c8f6953d1fa760245658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db07be2a8f4a3ddc886303a85b69c9a3
SHA1119ed0f557580fe53d98c64bca647fac92e79095
SHA2564bc35383510d6aa45c2c3d65044ac518a66da96d2060793cb8836ed75568a202
SHA5123e9d628f85691e1839c63d11e02061a023823ca0d53b18212552a566cff6ff568bc7ceaaec6101f35bdc4f964e35087f880cc98ac4de6d787ef211af802b3013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d1c3aa59b5aedc01edcab080b1f84bc
SHA15b8aca34bc35e85da31347f1f657e374c504308e
SHA256de53d5ad85135f4c9786d521aa828e63c5680a31225a092d506760bd5cc19f0d
SHA512cf99a69f058bc91a1d7ec32e9042748ec96829f58e82aef3655e93fc7db9b8d87ca0ee5629c02e3473960429bd35127debf30bd6d3f08f0206da4527cb1fcc49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be15085f9ccf73d01a60fcc259935ba1
SHA1c8e9e4ebc5d36d86de04d284439ce718678c43b1
SHA2566b60b1925be18ec24509280188720dce4aad18fac752e56243d43dc27d3e4387
SHA512c5b895217e0d3f9316da977492829a7776d1d90ee092f7699601b4cdc74b09213f0ef43933f0a6baa3d4a43a4da0fd38ac4275a1bc1d27dc0ebdd31bfdba6f7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8546334333bfe2ac6fea3f30d624a3c
SHA1a743e9874b288c7998b76e8becc7051897072da9
SHA2562d394cf6dbc219ddd4bda6c974750314cbee009a426a21cd77b7c29abe1e8ad4
SHA512b778e1214c0fc63b8f2ea6866770fc5037ddb6994dbfc3dae294b7f34ac3ed289abda641a233061bb5a515575fe8fe6e30774ca1a9f608d10e65acc8e5527a81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6d3af2526f0c658c6159a5d4179cbbf
SHA1383c5eadbe97e6fcc1005733532ee92f2bbac8db
SHA256c7932cfbb63a0f9b95ecca9c2186b6b4bf37f8f401f7131dd3e820521bffb7b5
SHA512c806f624ce60b7e934b57546288146e2ddde8d4fa41d7331cfbd08d6840db96ad7359a1cb424129ad76049306911b432ce1c2246157ed439bcd8bda71f979519
-
Filesize
856B
MD522f619d07602b475458b4519c1a66e37
SHA1850a9a07fc0837730447846580156862229b2b44
SHA256a4389ec84f19d1d87845833ddc93fba36ca9790c5e74f4439392574be8754da1
SHA5124e29ad20d9a0574baebb44f98a74017778bbf107720f2f2f890c01ea3616fc4c8a4e889fa690c7c4418bf09f5c1eccfd4b4bfa3e3acf8c684a4b220281df5233
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A89I98IL\favicon-60c1b1cd[1].png
Filesize704B
MD5af8e68b1d4ef60ad4ab180ccb81e05b5
SHA1e571871bcfbe09fa109cc6786da03362236e39ec
SHA2566099510d95ddafa634baa3f56ec08003c8c5a8eff1401fb098a3847ed0c87354
SHA512df270e4e2959259c1a3c579862b6d97d35de47b76ffe13014c1e0c694a3c8d08c7303bc380856b352a6681bb515fa8cff31026081e476481341f6293fd487d59
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
25KB
MD500c309e27f80adf947b35f02430823bb
SHA1f3c58f4b30f0248fe2c6f11879d5a185b64f5c3b
SHA2566c61d85bef2bd21c17f95aa8569a4ebe2270645101d2776bc7367102db677c6e
SHA5125ae50aec7f0176d5338a673c1c05ccdf532ecc9a35cb23bd83cf4485169d3e068df7c02025488dd49d0e561f91c1890ac710bcf3625a52688aeb5e0fd1f8a262