Analysis
-
max time kernel
0s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-01-2024 04:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://docs.google.com/presentation/d/e/2PACX-1vSykO4_SbpUf2oCt249FHDhdyPYctjF2FZcD9c6w9dc1Ut7Y3MJHc-B-dJGiny4QYnL8k3CXP8yyY7s/pub?start=false&loop=false&delayms=3000
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://docs.google.com/presentation/d/e/2PACX-1vSykO4_SbpUf2oCt249FHDhdyPYctjF2FZcD9c6w9dc1Ut7Y3MJHc-B-dJGiny4QYnL8k3CXP8yyY7s/pub?start=false&loop=false&delayms=3000
Resource
win10v2004-20231215-en
General
-
Target
https://docs.google.com/presentation/d/e/2PACX-1vSykO4_SbpUf2oCt249FHDhdyPYctjF2FZcD9c6w9dc1Ut7Y3MJHc-B-dJGiny4QYnL8k3CXP8yyY7s/pub?start=false&loop=false&delayms=3000
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4332AC61-B104-11EE-9FF3-46FAA8558A22} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2044 iexplore.exe 2044 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2408 2044 iexplore.exe 15 PID 2044 wrote to memory of 2408 2044 iexplore.exe 15 PID 2044 wrote to memory of 2408 2044 iexplore.exe 15 PID 2044 wrote to memory of 2408 2044 iexplore.exe 15
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://docs.google.com/presentation/d/e/2PACX-1vSykO4_SbpUf2oCt249FHDhdyPYctjF2FZcD9c6w9dc1Ut7Y3MJHc-B-dJGiny4QYnL8k3CXP8yyY7s/pub?start=false&loop=false&delayms=30001⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2044 CREDAT:275457 /prefetch:22⤵PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cd0fcf3fa73eb65bd0bf76ab43aef97
SHA193afffabd7cff92f631b1bd57d6c9ff9e7d15c30
SHA256c4e1b22508b6b863a15c9f7d7109aa0019bbe45027861c71b9c6244f7268a06a
SHA512d5fdcaec50ba27e9ae4ae4ff8b2b25688b9ae58e76510d6ba9975459bb90f403908022f18c13d32df4a08466c395d46da90849605aaa6bbc72683602ba35d564