Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 21:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.windriver.com/products/linux?gad_source=1&gclid=EAIaIQobChMIwLyO7_DngwMVDmVHAR0yFwiTEAAYASAAEgKeqPD_BwE&utm_source=google&utm_medium=sem&utm_campaign=vp-dg-amer-vhs-sem-linux-phrase-nonbrand-10012021
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://www.windriver.com/products/linux?gad_source=1&gclid=EAIaIQobChMIwLyO7_DngwMVDmVHAR0yFwiTEAAYASAAEgKeqPD_BwE&utm_source=google&utm_medium=sem&utm_campaign=vp-dg-amer-vhs-sem-linux-phrase-nonbrand-10012021
Resource
win10v2004-20231215-en
General
-
Target
https://www.windriver.com/products/linux?gad_source=1&gclid=EAIaIQobChMIwLyO7_DngwMVDmVHAR0yFwiTEAAYASAAEgKeqPD_BwE&utm_source=google&utm_medium=sem&utm_campaign=vp-dg-amer-vhs-sem-linux-phrase-nonbrand-10012021
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411775242" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70e44981554ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC7D56E1-B648-11EE-8AA0-CE9B5D0C5DE4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d6000000000200000000001066000000010000200000006e1da40c76182ab66ee393549e5f5e4e6f7187792eecd8b998a3f748d23a13a0000000000e800000000200002000000047c592d5d45c96b06cbfbe4816e8777ffc5779b89af9234b557eae8b3fd933ad200000000059f97cf80fe31556612fbdf5f374084da68e3cc84370aa6da474ecb1f2b14940000000cca74ef9f45f025cd1ed59b797e960d27c286abf8d0f94186dcd7f1dcdc14f85ec0011f3d4a6248aec0390375c29203c01ed1ee6455c7eff2db141a89d799380 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1248 iexplore.exe 1248 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1248 wrote to memory of 2372 1248 iexplore.exe 28 PID 1248 wrote to memory of 2372 1248 iexplore.exe 28 PID 1248 wrote to memory of 2372 1248 iexplore.exe 28 PID 1248 wrote to memory of 2372 1248 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.windriver.com/products/linux?gad_source=1&gclid=EAIaIQobChMIwLyO7_DngwMVDmVHAR0yFwiTEAAYASAAEgKeqPD_BwE&utm_source=google&utm_medium=sem&utm_campaign=vp-dg-amer-vhs-sem-linux-phrase-nonbrand-100120211⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1248 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e5fa497c5f19d17a9fbbe348533f31f
SHA14fb23257fce9456653995211889ccdffddcd38bd
SHA25642992ef0eda8c8ace81c3270f9895cddd3de6facc959c81577a5bfb98777d945
SHA512d0fa7ae21644c10fa88b63b9f5480546b8eccc7fbf2a8fae0c0b12a5dd8cbcda613db0a0061667e3280c2ae78337bb370ceb89172f5f67cef5e1824c730aba37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b54f351da07d7127d937af1bfc35d6e
SHA1349f041b45571fc5750a8f34feeb6ebff2323782
SHA256a53b7b8c56edd95f37eeb709348fd5376ae00fed021248665de6cc6f45f208f0
SHA5127be1d4ae31f90b337f25dfd0c9b43da917eb2987e3e1b4cb83ca51878518e0bc77a6a134b19b0efdb1e5bf6d5d18e1d0f9275760969ec5148fdb59865fb0d3b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f53cf3baf9f5cddec4f6d1b40a877209
SHA170fba89afd16353ea69422a9585d9d02c2047865
SHA256155ab615456cb4927db6d3097180bf7c0de6dbf9f6e91ffb9f78b19b6c7cc52b
SHA5120a12888645cf0e6d32c18dc3b7e6aa2aada4c8a757bed2ec6701582a58e7f2a8efa640459b2c2e5734d6595e6d18bf789eb64283f71e8fbf8bdbd5aa4da76b96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e4106d6c3f4ae8cea6023e4f8c247e3
SHA13e9536b004c6f07c32e2d0e92b1d291992cab88b
SHA2561764f44787be0e63be702eaf53469d2b91ea9afdc2acee3e625ec0ead7f34e9e
SHA512983ec7842b0a0114029c1fd0f212bfde904cdf265413b740f960bbbb7c8c29834584515fa3bf911925ae8342a35ebd0c86f16623008277bc0b13e1f1b6a96eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a1513df2e81fe5a05459855582a5487
SHA13d0a0dc049a59b50985a2a2e83a2ee930a9a3d82
SHA256f8319f01b28f92b070a918469e6a1c6bada1e177c7829cd0e4a32407953c76af
SHA512aee658385d5125e089371fccc1a4b16170d097aec2ce34e6aad6155b2cfd946428b5e1ff31704c03623ae8faeb1cb022357106e39d6f50dab0351582e7c50434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c550c9d1f829b9728c11ad3572c1fe9
SHA1a81288d25ddb0d47b039ff7f8ca108aa42fa6a94
SHA256a4db3392d6b1aa87ad442d0fa415b39957a79969123caa4974f6a4a2ae672ef4
SHA5122ffe3d1c568ebc18ab3b6ab531d5b9c444f13bfef1f42f1eeea8c1c96240e465a2812149dcaab9a04ead0d6f8dcf20065ccadaac6904007262b86aae16ccb2ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590b92d1347033b4945bea20af4b82870
SHA1e7fc8bda4c98566147f4e8786fb651c96f2e7b79
SHA2560fab90e5364603cd094ce76b86e6d0f06dda203982050037d6468b8bb64eeca3
SHA51204703a880bc7087359d62c07ccd568ea602223d1f1cac1b52ff2fab2048a3651a89195ecf8399309ae1fac16f8e003fb1c129dae6a453f6024be30c8521904c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad729465303d1a1874c2eeee01a9124d
SHA1b6149f2e68733b89214a956d1240a1b718b8907c
SHA2567b9b3f752c319b11b474babff9de6bdd0f75bd2fcbe43e0744e1a4c59064cf79
SHA51252ce51459bf06a23d4199aa8eac485152b4d984e58a79f0e6317be1110b2365f1a534b4ed3c7e4ebc193e33ac84d362e8776989bb30779cc190eab7bb05a3943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582654a45c62c24b3e82cce5dcd70e159
SHA15e92a2d576116388742819896e462779f7b7a96b
SHA2561c515b7378c5347debc1ce686047984eb9d5aa1f20fa626d4bba65fe3789a734
SHA512afc3ec299699d5d0c8fd19bd41bcb3145cbccaafb3573b965c8487f2a623bafa1d02cd949800e9bf7058483374383dd43517089c9712f347f0cef1c18f8764a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a6baac2820dc155da177816d20df118
SHA1b09d1c60181c98700338442c9633027e4de2c9cc
SHA2560427e78f741d3cc193e3e5057a930b2f3b5523a1f823e50dc0cfe0f68fdfd4b0
SHA51291f99a5d6e96819162aaff26d77ea2170dc0e8d4b4ee49d915a61b9777097713a320ca51a3cb449254b58213e34f11768de8fe6ebae7a90e3212742a798e4f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad05e0e34c910ce52969fec95f4cc851
SHA16cea5bc0ea81a8018dc7ac0fe390cb1fb8c646ed
SHA2564c35f404c1cef25ac118096d834ddc8126f7ecc14b5e77b826191beebf3b4655
SHA51202cef81d6117d19c4b817177043df6155a24bf8acd21e13461d5ee59d154f217c995afadcaa40781084d72f7fee67859e8707d042581fe39923e31b3d70c27e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a16094cd4312e3ca37ce29a607fbb919
SHA132d39f3206f00c5181f495cdbde0293c88daa7c3
SHA2562a53ec3550adbf30e75493ed2344644982a54f88558ebc3dce03a481ea889b23
SHA5127884238711c7d67acb201cd167e8f3f40eb2f3489b199543cb6b673de034da11b354f6fb8929e97ef07b962bd32e783892e0198836166660553ad5a7b6f352fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5158831d5698a270863943eab454039d2
SHA10d74c8334111ab3121fcb6c7425773abca120f8b
SHA256fd41711a9b08636196eb3fbc96a40a96a614d1422c99c28520d87e76f7663a9e
SHA512445e65a758c5de8cbdf2100771ae05c497092a0562eafb37126825a4a2dc72a9537675d22c039052c916cab36ff216d4f476c717750c1e5097d36e481553f176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a9bd1327ea09aa0a6fceba1279a4008
SHA15eabc709d1554e6b78646195b3b1558d577944a1
SHA25637a8611315473f63d171bf844dece4611b7ad8ab75ea5890b6c218056bbfd441
SHA51273f404f910806b839dd8fea5b1fb44a2a141d296102e0fd5ea7de35c0f4ae37a8bb0db86f8617c38779eaa2f2488853d398a503cda43b07df42dea64614ee972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc6157258952bcd22515572fadc319f4
SHA12cf9e0b4888fda38d72327a70b54ce8d1d433c8e
SHA25663136dcb38e0528aabc505ccf97d8a6c2586a8af5bde5c8989a20b579721c488
SHA512d02675f19d20bcbb32e3dd743af7eb934db3258ffe0ba8ab00b9b5aa7f6751e1f42f46c30f3065c7d2bf136c5e2615609fc9f29683fb04fe44d2d7981fb87e5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579215ab90dd4a7b57c015cf2bc6e5c8d
SHA1a62cc19271d3d023ed4576af912b3a78eef382ff
SHA25617db8f2429af94bcb3b18af79509bd2511575661ed27cb41fc88f0a2f0f889f3
SHA512e02606a3df6d748b12191c393e27c6486a7d424fa327960239fd19ab018cd37eab7d7c635795f40a366cacaae3646005557a6286233103eeff8e042ed9e6bd71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536e59ea4ed5fad25b56cd86298f197c9
SHA17011ab14061316f36f30222e86dff0beaf8f8f57
SHA256551effc3f84f7e61edcc7d52e9eef308164792f63de49e7da22dd111fbb6762e
SHA5122600b5e6387b0171724dfa880b59c3abce96210180b6b41a38680339a24a3a3b75bef730df838d7ec647c6ca40d6a1e6ce8047755475fb5ee2b064f023b3014e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586c8010b9e485c66cf29461ab9150095
SHA1349eb6b09af5eaab51aabdd79a914c2998e03528
SHA256e2fc43df5c5d3c3c4504b325865ad953a8455978e7621af772f03b7baa16ba1a
SHA512e3913a75afa27318c1f310ac6ff83cfde11762eb82c5cb29ec7c3ff4048d5c3d86b83153c871dc328aeffe41867ebe2c68ed31a65eec846b813f9930f606eccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f6b548bb10606f60cde7121d7e0867b
SHA1adda2e117a00bcd3323fc4a0891a698f94aa90b3
SHA256f3f876fa4ed01f659d88d452399ac6ab68e58d89139c5dada53cd04d03f93c6b
SHA512652c794347b8f8b37c67c6ef6faf1d6c64d42c8fe99937e49b5b551099773567b4a25bd36f076b4377094dd8ae9571fe03ede7dc61eeb43c24556c9e33b83675
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06