Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/01/2024, 20:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://r20.rs6.net/tn.jsp?f=001blv32OPQRb6epotJ_g6-cE4uoUtaQAd_X4Clj2Jdr2IOzlSSs4o9CeDX_ElOffPCpO6t7R6OTB2ly_1xHqV4m5AkxctMbLzjsEnBs6DH4YMIoiC8wOANbhwz3Anl_gLT8fdisF0hrqPWhFSW9Q9ci0Sg1Dgfj_ymmc__Hcz2P28=&c=&ch=CXBmzCN2aEMcpumrNUZzfmWC-LsjehoJTuX21pjSanzf1X-1PcbCAA==&__=/qwer/YnJhZC5zaGlyZXNAc3luY3Jlb24uY29t
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://r20.rs6.net/tn.jsp?f=001blv32OPQRb6epotJ_g6-cE4uoUtaQAd_X4Clj2Jdr2IOzlSSs4o9CeDX_ElOffPCpO6t7R6OTB2ly_1xHqV4m5AkxctMbLzjsEnBs6DH4YMIoiC8wOANbhwz3Anl_gLT8fdisF0hrqPWhFSW9Q9ci0Sg1Dgfj_ymmc__Hcz2P28=&c=&ch=CXBmzCN2aEMcpumrNUZzfmWC-LsjehoJTuX21pjSanzf1X-1PcbCAA==&__=/qwer/YnJhZC5zaGlyZXNAc3luY3Jlb24uY29t
Resource
win10v2004-20231215-en
General
-
Target
https://r20.rs6.net/tn.jsp?f=001blv32OPQRb6epotJ_g6-cE4uoUtaQAd_X4Clj2Jdr2IOzlSSs4o9CeDX_ElOffPCpO6t7R6OTB2ly_1xHqV4m5AkxctMbLzjsEnBs6DH4YMIoiC8wOANbhwz3Anl_gLT8fdisF0hrqPWhFSW9Q9ci0Sg1Dgfj_ymmc__Hcz2P28=&c=&ch=CXBmzCN2aEMcpumrNUZzfmWC-LsjehoJTuX21pjSanzf1X-1PcbCAA==&__=/qwer/YnJhZC5zaGlyZXNAc3luY3Jlb24uY29t
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D19FFD31-B966-11EE-B377-EEC5CD00071E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e917866400000000020000000000106600000001000020000000537b794c82a58936f325b5d460dc65eeda7de6491059c1d97c36a5e9ea9d6c54000000000e8000000002000020000000dc9909bd04ecb35e495a0d75d2d5710dd8c9c40e7ce9de53415543941d188dbd20000000e03531d7deffb50115b135e26cda3f4a26e4bba100ce84fde825ee45fa748483400000005453d5a41a9364ac1a9df998678d9ee55121914e40b68c4c067bb44b3be18cd6e1a0cb49afd148ee869ab61f5b44ae2335a3100b0fa6f5b28062924301d76579 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40b93fa7734dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412118044" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2612 iexplore.exe 2612 iexplore.exe 1888 IEXPLORE.EXE 1888 IEXPLORE.EXE 1888 IEXPLORE.EXE 1888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2612 wrote to memory of 1888 2612 iexplore.exe 28 PID 2612 wrote to memory of 1888 2612 iexplore.exe 28 PID 2612 wrote to memory of 1888 2612 iexplore.exe 28 PID 2612 wrote to memory of 1888 2612 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://r20.rs6.net/tn.jsp?f=001blv32OPQRb6epotJ_g6-cE4uoUtaQAd_X4Clj2Jdr2IOzlSSs4o9CeDX_ElOffPCpO6t7R6OTB2ly_1xHqV4m5AkxctMbLzjsEnBs6DH4YMIoiC8wOANbhwz3Anl_gLT8fdisF0hrqPWhFSW9Q9ci0Sg1Dgfj_ymmc__Hcz2P28=&c=&ch=CXBmzCN2aEMcpumrNUZzfmWC-LsjehoJTuX21pjSanzf1X-1PcbCAA==&__=/qwer/YnJhZC5zaGlyZXNAc3luY3Jlb24uY29t1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2612 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572f254b29f61e3a842a538bc5e6d8b17
SHA138cb33d6971e421324dcb01d69da9c5f37549a2f
SHA2563fb6231e002b553b41e551bbba002c76947b3be2a0dfcd834ed0bde527d8eae8
SHA5120b1fd78da19cba7435283db12fec09c7d3f1d735807dea31b7a2c784832d13e724a3993f648f6b735309ead7007257e9580cf0662b748b44e7a5e5c69520559e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5771232145f8fabc8ffcd97697f230c03
SHA1b589feb36bde1e9bc45a71eaaf7fd3a58acac795
SHA256530c65638cf5f7910ea1e07b9380cc1f81bb144461cdbf0642cf808c35501a9b
SHA51229b1c3b4d93303f9bb7dc89e3ad84e7c1215eb6525af8270bd6f9054887669d9a6f18da6c462f7c214ea592a2919fb315015f78be235a8d21f7911dfffdbf0ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54492bc5996acd1bb5912db8cf0abfbed
SHA18885eb553a9757f6f36fd3ab37de490ff1373aef
SHA256630b2b6a78bc54f09c0976a4cba694a064aeae17a76f52f3ecaf248ec3cc90a6
SHA512c9614a6dc8fdf155c3c826b4ca92e32585d64104570c55a1f6133483139cd7589199ef7cceaa04162204c12ab1fe8504edff7e0ebeab325a3374ed369d728511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8e31bf2cddb35075d61e9cabf42421b
SHA106fc7b9a50b6649ba3edf48b0228e591602a9ecd
SHA25602e3a1c917df39810a89a2a12e4ac33a3e5572b627c89e69cb11bb2a6ad75f7c
SHA512d9cd28dec902a499ee9d63137c0f47f481fbcb977080cc3445bbfa555e5dcf94b07b734b332afd0cc88fe8af31484ff3245f449baf6009759a38b2b732005808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a714df26fce45483ea9433b544a4861
SHA102efbb87988bec0b37583d9bde011e165cb06c3b
SHA256f261a129483d883f833508d0c061df307dc1da2ec13aed6e53dd3ddc96b6762e
SHA512597270ceb97c5226f2a44444dddcd1477cca652b4896eded34aa97f4a5f4b98af06b57388b9dfae8ebb213bcfc221fb73d1343751730f3be5ef7fb6e5549a43f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588ab201ab333fd48a838550a6a046525
SHA1ac2d4b84776dd58d86530bdfc47afa63ac85024e
SHA256084e2520b3f38c080e2f438712632f2fe272bd95e8dfc8526cadabe7a1c478ba
SHA51294654455bbc3d5576497cba1a23879145b52d6f1aba3fb85e7528bdd471ff725a4877e5b4876dea5f401e1903ad975cc840c70d552476ee5f933bc45c791a492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6ae0e8445b9fdf6c0776f87bad020d3
SHA10384146a194b08e72dd679c97a0bd86ea36f52a9
SHA256811fa6b273acb2a81c2fb755ad91668dd5f0ddc74e7658acb63c706c53c7a912
SHA5127c29184aee903c4d8bfd6aa71476b6c596acf177053cbfd6d61349d746895b834016f2b81a98a7310f9a39450ab9f7a9d513a8b516d76b54997327defbffeeea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edbf98ec2c34085d30b8e0b56a463a47
SHA1abdc81503a4d80e74a1f871216b87c87a03c1da5
SHA256a818f74d64294f5f22c40f4fee5bd057a69ef400dd074af15819739a7fc6b111
SHA5129ee177f4d3d1d0c11447ae6b269b056ff5dfa9a2bdc9122d21a9a53fb1138291b1eb9ab68021e626636179d11240c45d9b29f8ada14b3188a05c2d273e4da556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8a7ec6420b4f005b6cfcd00e44dca94
SHA1c44e2a1267b5b1f1036a84916cd69882a7cc4284
SHA2560e614582a98469c09915c350bf98f81076de5276269ef25ed526cf749951ce87
SHA5128f2a1b5b4524044296d673e4907fe8cfc25f0890e9dd9ac681ef180e6cfba080c4ee5614179fcd9eacfd27d8f0816c32c95473ab3d3bba8d5e7feb7b574a238c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9f9ac9c989f9242121a66463299602f
SHA1cbb19dcad129e3f127719621c822e816cd1f3e64
SHA256e3972791086cd3d8f05edce9b2a8a498e3213ca9a16e62ab61f27cdcb71f62fd
SHA512bdeb7e5a78e01c708c70d2413cb07c535d70feec7c6632d52aef85ab049f26e33d6f22a3f6dcce5c98638a4d15fdd2f8e357a4d2808435e4b18fcac8a377bbf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb375152183bc4e334174304b9141e99
SHA12420e0768ab853ac96f16af1c8e128b14be946c6
SHA2565b4b793c6bbec0e404dc4124b478309678b789a4e69650330f40b2fea190d412
SHA512b96c416f4d38029e1bbc66f5d15067dee892ca173f80216b1438935fa422a525f3ce8973486421b5e1909454cc0299f2c422a1b38afbe593aeb58c2c0149ae6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51094945d3976fd9fa0f1589f6b1bb85a
SHA1b21417ce6a96bda30f258fc7326b7c539d820076
SHA2567acff17d41c684a57929c85fe8d836d7291d3ff399d1c460b299ba69e10146a6
SHA5124debe1c8e2deb228bf64940bc43a388e1dd29f84ab7a0d440be9bcdead44aac9fd540e5e411924315316bb4a71dd5579df0bb2eadae8528e9a69bb9f767df6d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f568c0af4c3cd425b0ce49cea32573de
SHA114bb0ac341a2719f59b0e0d86219f230e599a1aa
SHA2566857798e409781c3e525b168437830bb2d223fe181410a315054e54a7c1f5e9b
SHA51295991074e6ed173c224e9a13ec064ff6f885e20721607df36b8d8bffb9c7a3bff762d80c50ab17a1e890d66db44062e659f2b1274c42f92da901b08dcf217b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1dd9e9ffc3198849e56278be0c7ee85
SHA1ad5f2ea86a5d6e12162cddff60dbd95783485d63
SHA256cdac3bdb5233065b9d5a6ead63fc3f3440c1c5c7ed822d261579668fbc2693e9
SHA51289ca2d91dab7a89cfc91f65b092d8a4275d79bca6cb4636aa94c4b36575ca0dc785507edddffbb8fa05e0403599fa096f599a26d07d99f80fea0406fb72ef4a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53555264f902462df5fb5446fee81ea73
SHA111718b820b46cd65fae925cc3e9d821e0ed3dbe4
SHA2567712776410848e8a3336cdcf84c304fb2ac64d694a9a0b20a85feb455f8b8f71
SHA512a749209ce77ee3d87f0024c1eaa519f80ef4fc9011e061a3100b30aa94f5aeeccf5a96487f93fdef06b0611ce8fa199a6d3ab00d90ee1db4b557f1a3b65955b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f0b91522a948ee22a5b7e994c670bfd
SHA182d1067cff953769616e7b4031c6be77c68d37b0
SHA256be08103ade2b01612b86b50dc6332ebdf66ee94749fe703f533912af49084e3f
SHA512e31008c0b5538f12eb873a57d18eaa3f3551de521c7529966935067c92a34c5e4c045d7fefe3266844c4f4bed83e3ae44f5142cda1a152776df6ba8133d29b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547ea34f6a1577ea75e42fc0b3b4dfeea
SHA10cde436436437b52bc3df52daccfe7da6fb08a72
SHA256c027bbc9550f62f11510c114b208fee20b3623b71c6af0d3278e85ed2b613a65
SHA512b9927111970dceadb222ba5907df71f64e226a5f99687128f0f22bdf2851f0f05687e5661bed082373d58dd57a4f7da489e46712627afca090034c6430e86370
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06