Analysis
-
max time kernel
139s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 08:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://limeerror.org/robots.txt
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
https://limeerror.org/robots.txt
Resource
win10v2004-20231215-en
General
-
Target
https://limeerror.org/robots.txt
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8BB627A1-B05A-11EE-A140-5ABF6C2465D5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d7800000000020000000000106600000001000020000000286a3a18c3ad1538c704251470bb2074bf4d96f977e385e33090dc347e1bbb13000000000e8000000002000020000000a4c9630f715676b28add8570152152f7c6f35cfc9a4c7307da5879a032348a8720000000d7ab5738532b59332c5d45d954d3ce2cf75958957f2582f43826acb6a09acfc840000000287eb689b31d197ff9d83fade295cee33defba977f43bd638963b83fe69ea29e36bfa7ec45980792f4f6f973d61ce6dccaabe1178cef44601029e7e71108d946 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411123212" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 805997616744da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 1696 IEXPLORE.EXE 1696 IEXPLORE.EXE 1696 IEXPLORE.EXE 1696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 1696 2212 iexplore.exe 16 PID 2212 wrote to memory of 1696 2212 iexplore.exe 16 PID 2212 wrote to memory of 1696 2212 iexplore.exe 16 PID 2212 wrote to memory of 1696 2212 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://limeerror.org/robots.txt1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a9dae4d897a50294e0eb0f7768b2f7e
SHA1cad5fde8aacfff1a3c52edc7662f5898612707d0
SHA2566360459446475e0e6bc79d2edae64fb0093d3993ae978811107714e6cf5496f1
SHA5125d8e9fa2d2a40c1b300cc72cca8f2493f430ebaf13ad8f14a1e24235aff0842b09b47e702e2904b726a1fd248f41fb5be9032093049083e4384f915b4c20786e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5619950911238f9096f4e71a54491e4a2
SHA1d6e586476039823a96aa9afc4854aec6520ec742
SHA256393118cd86f27217b9924e351c462cdd2fd2bdc546d2d2979a68383294527f76
SHA51223dae8488521387ae12e9052864091f4de67640f4e369828d31fdfe5197777fe5e19b1cebc8caa66e5f8ab965e9fbf6898d247965db81b8301a170d1dada86f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f373d5ae896f70da337ed36931c514f
SHA17245262c0e44efc4f4df4413382890a48f365024
SHA256d86071c65d1db62605ef103c4d813b51c8cf51acdf7319646c962f3773106aa9
SHA51261f5e0611b4fd582051882ddbce390327057560b7917d95ca3fa9971644da2e6f323399caf14a268214adc6a8b0c2d06bf05b297eadb723ccf6b827999dfcf0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a41d8150edfce2065aeaef325a8c8e9
SHA1a61646c1462860612678a70dbcf189e95ffa14f1
SHA25697e528664a73d46b80005c6c99b7c8904f2fcb221db108cad642940dc1ad627f
SHA512ad9b5a0051e9467440eb88077d141fcb6fda7df282e6dfa7aa3ca5eb6070e50fbe1bbd2c6ec0ba3d850d2782f9ba096ea9009adac55f32fb83daff2934b390b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ca32d880fb05b96d9964010ab426c29
SHA13d6ec90666412202f38909539b25e666ca7d397b
SHA256d1542ee531603d1e79134e53932731d7d2046832112736011d09d431036dd85b
SHA51287ec40e7cebf9d2ce9b8588ae3f49a656f5258bc22297d351d0c22912ab0c256472d68621612324299c79f4ba83a9a6b5675b367da0c632e1872f76f4f41f312
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd32947c8b21b2dc6912f82a166ccee0
SHA1d130b494402326fc4edba3e008a1ff901c7b0cb4
SHA256d5b17c1f20700e8c5af0d2cf0442d96dd737173a883eea7ed5b7cb953c632c76
SHA51217919fd5faab9abb75edefa3a904c5628f94339ec825023bac80e39bc7ff2bad610f0314a7d166450ab5a9ded4cfd56d0b9ab7a265d1789b8bb0d6cf4687513f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0bcb18628c8ee1b54d05cf54116fdef
SHA12e080712950b3bdaa7e5d4ea6dfd327b51224c0f
SHA256c716f014672a32364d9d5480db2f2e86bc93d4b31ebbc526fbbc08a7444271db
SHA5125f025cfa06e0cdd777cf2e3d6e8bac325bda860358a399283fac9604ab07831172be168acba775c4cfa249c3ca744896927d351b3cb00ec8489f27f4ead7811e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD51cf3b8e3df7b8387ce70a087dae294a2
SHA1055fe74861ff6ec81c9bfd0395218fc04d1635e9
SHA256c85d0411022d80ccf72ece859e2964ec1b80b3f89af650b07471fe55df5c2b92
SHA512bad0b14e633a13fb4cd3bf5f5c8c3d3022ba2c3a2f68a1620bfeed39288179bd8c0e2b3aa39d5c4a0a6fed8fb1194cef92f5c53f11b4191e785f3b77b4eca913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5a937cdae7bc79a2aa9a222fab51c7eaf
SHA13e7a4f91f5b67cad1a034da166e858aa780b7d67
SHA2567be080a52a262bc45386f8b691cb5a5cff000a96fde2f3f7180f5d07e4a175ae
SHA512cecb4af01f90261fa5f418645109d58d704cb61b15e5ad02bae6a39c90f0d8cdeafc8771d77f477a915da62d935c14394dabecaf88c7ef07bcf1fb575b1b93bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06