Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 16:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.style.it/
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://www.style.it/
Resource
win10v2004-20231215-en
General
-
Target
https://www.style.it/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410979464" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D8DFC221-AF0B-11EE-B432-EEC5CD00071E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d60000000002000000000010660000000100002000000086ec9eaf222cdfd9a52def022d1e66980da0de931725384697b4e27f872986ac000000000e80000000020000200000000591c6ba9e5a97624b2bc6b9bd4c689e8ef6288419ad21f1a536e2b5bd6d79c52000000002e28f557125f3f3fefebc53ce9b18fa90b49ca40e943d8916c57282f129583240000000ef151717a1ff128598d4f32c8a3ac9e66c85472500d352b007e123ffc681ff09bfca1485307398eebc727903364c92df746f26bf2e6371d023f7ff905a8f0427 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 304115b01843da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3052 iexplore.exe 3052 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2708 3052 iexplore.exe 28 PID 3052 wrote to memory of 2708 3052 iexplore.exe 28 PID 3052 wrote to memory of 2708 3052 iexplore.exe 28 PID 3052 wrote to memory of 2708 3052 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.style.it/1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3052 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56355e7716b7a1c3907fc478e9a7aa181
SHA1a7b0179166b1868d39c48e92dbbefadf55f9531c
SHA256bba28693e9d6550aed20abbf8235859c68d606f35fb343fb6a177270d242d19d
SHA512e41a7fc1c5af5aec6c88224c57c9483a2d58a64903b591207d1d6857c710016246c52a9db830798c61b2ddc453b166bf23384e1323b8b6b51b7dac749f91a6ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5baef91a3eb8ea6f09abe07fd08a81e53
SHA1259fd8668205a3b211122b437ba233e15063795a
SHA256eea74b470ae0301ac6e6385af1cd1304351b1bc0e7b9f86229a306a651a2b83f
SHA512308f92326c092f119058a03c5d956deb5055928b27efb59906f50d03097925981626b4a969829eff1bec4fc8713285213dbd7113d2cf21b683595c4eec1752d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dea3eeb57d7f77df3446541052c449a
SHA1957002976087e26272e123e680d9b50ce0dd00ad
SHA256dae3d7aa42106f7d372fde32cfa6ff6510278b9568f7e5ef157bfb0f2897d2e8
SHA5124fbc77f6878ebdb84731f2487b337bb8e5f3c281bc8e721f772d060385a8728f1a4aabdb164c5850330193257ae128cf23b5cebbe2c2e0bbfcf1cefae191f5e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1c47708eaf936e16d7ed142491f2f71
SHA13f8941a53c4c044672bdef09fcf227903b3eb51b
SHA25642c722b573bf2f1c170a7c1228628e0ee27febbc1644980ea95670c601d7574e
SHA51200cec6b22827416fff02e4fb61634ac7e6e6b0859d6ca72cf4c932e61315b624a8e7b3e934bc3525296cc470b8904239b4a491199a74ef9cf6f0a0f552df4636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527c7af6c7da6ea018c2b7d9576ce586a
SHA1add83416960069873c206f7ca2f237cd4dff59f2
SHA256614940c00630973e120e578623c250945c0e61f7d892adbd447aba3f61461ffa
SHA512c41a2b43f957b3841114bd7472b455fecfe8f177546d66831aaa3bc6e923a421c33bb98bb2c6e15a559e168f1cbd4808f6322cf10fca64ff658d2f852aa350d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5752997f2d8f3a5445a8080b3118c9b
SHA14320270aeb8fadfa22e971031773a6500244c6a9
SHA256ba5ee512dbe9d0693051a72c10f45d55abcb0c96f6b19a0109236bcf621c6a99
SHA512631c8c9f64e8a39102711d0572b3458e5b47751a2804f8680f465a5a37a52a9cd2bd13855202680327de8cdd2fe527ba89fb4a9c746d54b6c5eb5f1893b12461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c979c8ea7decdeffab2ccc9c052426b
SHA11df61f1a5065eac634431381e895c5ab56df4c77
SHA256119764cada29e8fcbbbdad802c75234a02d216a7a82e132a78c03057701964b3
SHA5125a7b6f4f5c7d95091f2334643976e7df8aa90fb7c33cdfb2000e2e477992e4753b56d672eb54e94bb72254713f716c61738e43a364ea8273c63916bbf83cb798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54082c4d5dc803b1d30da13e67f25a390
SHA1621067d0117cb0ec289b14b2e29f6089d3786834
SHA256aa37c4884bdfac080c3edc78fedbdeb8312efda586f92d320ab5aade2c93a134
SHA512d00ff05a5d60468a987d5b80740ead9585f092285849368ec99b9130e8c73014244132cec185b168ca428216d02ac57140d0ffb5fb97286d6308fbeb48e70019
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06