Overview
overview
5Static
static
1E70FACBE-0...90.eml
windows7-x64
5E70FACBE-0...90.eml
windows10-2004-x64
3=?UTF-8?Q?...e.html
windows7-x64
1=?UTF-8?Q?...e.html
windows10-2004-x64
1=?UTF-8?Q?....xls?=
windows7-x64
1=?UTF-8?Q?....xls?=
windows10-2004-x64
1=?UTF-8?Q?....xls?=
windows7-x64
1=?UTF-8?Q?....xls?=
windows10-2004-x64
1=?UTF-8?Q?....xls?=
windows7-x64
1=?UTF-8?Q?....xls?=
windows10-2004-x64
1=?UTF-8?Q?....htm?=
windows7-x64
1=?UTF-8?Q?....htm?=
windows10-2004-x64
1email-html-2.html
windows7-x64
1email-html-2.html
windows10-2004-x64
1email-plain-1.txt
windows7-x64
1email-plain-1.txt
windows10-2004-x64
1Resubmissions
12/01/2024, 13:14
240112-qg1c2shdb4 512/01/2024, 13:02
240112-qaa5ksgdfl 512/01/2024, 08:15
240112-j5sjsadbf3 5Analysis
-
max time kernel
596s -
max time network
604s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 13:02
Static task
static1
Behavioral task
behavioral1
Sample
E70FACBE-0E46-C106-89E7-F94D9FEC5190.eml
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
E70FACBE-0E46-C106-89E7-F94D9FEC5190.eml
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
=?UTF-8?Q?G=C3=BCnl=C3=BCk_Kiral=C4=B1k_Evlerle_=C4=B0lgili_?= =?UTF-8?Q?Y=C3=B6netmelik_Resm=C3=AE_Gazete'de.html
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
=?UTF-8?Q?G=C3=BCnl=C3=BCk_Kiral=C4=B1k_Evlerle_=C4=B0lgili_?= =?UTF-8?Q?Y=C3=B6netmelik_Resm=C3=AE_Gazete'de.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
=?UTF-8?Q?H=C3=87-AC_Ara-Dec_2023.xls?=
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
=?UTF-8?Q?H=C3=87-AC_Ara-Dec_2023.xls?=
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
=?UTF-8?Q?H=C3=87-AC_Ekm-Oct_2023.xls?=
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
=?UTF-8?Q?H=C3=87-AC_Ekm-Oct_2023.xls?=
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
=?UTF-8?Q?H=C3=87-AC_Kas-_Nov_2023.xls?=
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
=?UTF-8?Q?H=C3=87-AC_Kas-_Nov_2023.xls?=
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
=?UTF-8?Q?evini_100_g=C3=BCnden_a=C5=9Fa=C4=9F=C4=B1_kiraya_vermek.htm?=
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
=?UTF-8?Q?evini_100_g=C3=BCnden_a=C5=9Fa=C4=9F=C4=B1_kiraya_vermek.htm?=
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
email-html-2.html
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
email-html-2.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
email-plain-1.txt
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
email-plain-1.txt
Resource
win10v2004-20231222-en
General
-
Target
=?UTF-8?Q?G=C3=BCnl=C3=BCk_Kiral=C4=B1k_Evlerle_=C4=B0lgili_?= =?UTF-8?Q?Y=C3=B6netmelik_Resm=C3=AE_Gazete'de.html
-
Size
309KB
-
MD5
bbd167ae7c3eb6d4fe1289e095a945b7
-
SHA1
bc978547f7ade6338048cafdf8d8ac596a931817
-
SHA256
a2601413162176c9474137ce40b97b80713b397cd92cf6437168c57c4ecaab3d
-
SHA512
2e8019e0839432eca17dddb1d21e8440d25af3c61c06b23aa313880163ae6d057edde4ab9d8b51191846e1e2b9bc64dd75bfd0146ac62e15b69aded97daab7e4
-
SSDEEP
3072:pPDU+89SCjcDE/N2DyMlL6Vz9095SLGfciivW1l4inL:pPDUpSW/pMlWV+uiiOD
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40e974d95745da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{00BCAF6A-B14B-11EE-9A4E-5EB4A22F4468} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31081815" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31081815" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3580929119" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31081815" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3607179352" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411829596" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3580929119" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c47f1af20644814589e7a32def35942f00000000020000000000106600000001000020000000507ae8375bf1a128a2795a423e1438586bd3678c0ea427bc8faac3a4a6daa36d000000000e8000000002000020000000a24b71963a469285189292002c9750128bba63c9a048ca8642069946d2c8e3c52000000084a12c7dbaa0da5882bd18b38390f545055e4f35a304d2ad908a51300f43ee62400000000689a634cf008954e83e157ad8f6e6817652fee1c17513ef27b26dcdbaa9d517aac486b1b61cc756b25a7b59a02e042ec70affe1ee63247a4aa1dad57fecfeab iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c47f1af20644814589e7a32def35942f0000000002000000000010660000000100002000000096d47b64911981ed675c8a2adbc978b78f883cd9a7c44b54d52788871fdc0635000000000e800000000200002000000041bf835ed0f0dc481d2a6efab3b9c5e51cdcfbbfb21a36b3ed08fe163d134cc1200000003c8873b25673f856439d3f38963d1a843abdd1ae7aa62637044010489f7602df40000000e93bfb2628ccc4d8f7cc93b8d14113066fe2a9bad97f1e2850ff49a88f2fd2d63231b0213007ab2166765a3fb592f1d5cfdd5b03d3ca8dd033d2c6b165a91ad2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 803958d95745da01 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2340 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3884 iexplore.exe 3884 iexplore.exe 3200 IEXPLORE.EXE 3200 IEXPLORE.EXE 3200 IEXPLORE.EXE 3200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3884 wrote to memory of 3200 3884 iexplore.exe 88 PID 3884 wrote to memory of 3200 3884 iexplore.exe 88 PID 3884 wrote to memory of 3200 3884 iexplore.exe 88
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\=_UTF-8_Q_G=C3=BCnl=C3=BCk_Kiral=C4=B1k_Evlerle_=C4=B0lgili__= =_UTF-8_Q_Y=C3=B6netmelik_Resm=C3=AE_Gazete'de.html"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3884 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3200
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3904
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD544196fbcbcb8796eca579659131d9a96
SHA1543442020ca235340a89c7a11ed6c83099b93ce6
SHA25656d43e87b594f79db37fd1053eb3e37a4c0c0849dec39657f15b29c28351a3d5
SHA5123f14a8b154eff39cf3c280141cc6d7b21199a205ff59e1b0406392e9167f114f974c6ba1e3b38fcfffb16e3e82865fe046a0b187f0e2e92e6a77b15796dca69c
-
Filesize
1KB
MD57e81a79f38695e467a49ee41dd24146d
SHA1035e110c36bf3072525b05394f73d1ba54d0d316
SHA256a705d1e0916a79b0d6e60c41a9ce301ed95b3fc00e927f940ab27061c208a536
SHA51253c5f2f2b9ad8b555f9ae6644941cf2016108e803ea6ab2c7418e31e66874dea5a2bc04be0fa9766e7206617879520e730e9e3e0de136bae886c2e786082d622
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
4KB
MD5d65ec06f21c379c87040b83cc1abac6b
SHA1208d0a0bb775661758394be7e4afb18357e46c8b
SHA256a1270e90cea31b46432ec44731bf4400d22b38eb2855326bf934fe8f1b169a4f
SHA5128a166d26b49a5d95aea49bc649e5ea58786a2191f4d2adac6f5fbb7523940ce4482d6a2502aa870a931224f215cb2010a8c9b99a2c1820150e4d365cab28299e
-
Filesize
11KB
MD59234071287e637f85d721463c488704c
SHA1cca09b1e0fba38ba29d3972ed8dcecefdef8c152
SHA25665cc039890c7ceb927ce40f6f199d74e49b8058c3f8a6e22e8f916ad90ea8649
SHA51287d691987e7a2f69ad8605f35f94241ab7e68ad4f55ad384f1f0d40dc59ffd1432c758123661ee39443d624c881b01dcd228a67afb8700fe5e66fc794a6c0384