Analysis
-
max time kernel
117s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-03-2024 23:43
Static task
static1
Behavioral task
behavioral1
Sample
Regent.SmsService.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Regent.SmsService.html
Resource
win10v2004-20240226-en
General
-
Target
Regent.SmsService.html
-
Size
1KB
-
MD5
2923b250a3660c034aa7831d5e6d7f3c
-
SHA1
646f109012bac000fe1bc58f40d112f77483f22a
-
SHA256
e682dfcdde010f6e15bae0d843696f6ae8d5a85e75441660b782789ee747f075
-
SHA512
e7a323d17f9f1c70bbee04c2d05970eed992e01830f73531a9b08a70a72bf253e5e3365213c96b2495b4b1fe9b9a61b8ee0a43126ed600f4468559a56ca03e74
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{94FB4681-E64A-11EE-87F2-6A83D32C515E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417053742" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94d2d3723739f48802cd6414eea5c7e00000000020000000000106600000001000020000000e9467779634c0b42b3d1985be7787e2174dbd7a6c6e8ac6410e96ae14c778351000000000e8000000002000020000000e415a1582598cbf104730e9f4efe030b3d5aa63c7184ee9befca007d090e41b3200000001d33342df430b49735e542788fd65ce028e30116ee54d49ed47aa262b0c542cd400000009bbfd21952db42d835fd33a0b3535ffb7b6cb3ff82c6ad427b8bc4ca128f9c5a2619c5a95568b373cf3c330d57530571fb99c86ced26b603bf4db8d4d5e7111b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30f4226a577ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2772 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2772 iexplore.exe 2772 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2744 2772 iexplore.exe 28 PID 2772 wrote to memory of 2744 2772 iexplore.exe 28 PID 2772 wrote to memory of 2744 2772 iexplore.exe 28 PID 2772 wrote to memory of 2744 2772 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Regent.SmsService.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b78b8907b29108df57e3334bc8d37099
SHA177c1ca33eedf363e92b6bc154e542cd839ba9d23
SHA2568203c640c7b2857726afdeec453987ca32ed33ed7dcd8daf8117c4a0f21af9a3
SHA5126bc91ef62aaf3ca394a2f811f379f59abee140df1c0928788ac3fbebe09c487c3e3c87cfcba5c0dc90d7fd18781632677989f803205b4d934adf72c557499a9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58521997ff52ac208ea5af05d38f21e95
SHA17f20ada05f484bd3067069eb9e453e54a5e45f7c
SHA2565b7544a2d966d6bf37797b548929e50b4e9731d05be146921bc87fcad14518e2
SHA51271e6a834fed2ed1f9953fcf2a50c4bad253324cca026e4e30fc6a71e41bb9aa46ff72960218318abd14a87a6aff2f7585b764988938be9945fc5f86891c0430a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51842eb61cd595368d526ab8a4f690726
SHA17ccce8ae4e4fb34775704c66056c53fb5f785099
SHA2568051783ceb18cf0c9a8eeb2cb164564c2bdc52357038625f57fc36f2769198e0
SHA512c813fe1c54ae24accce0ec8522a399025a53d157a37f9b0b32e1b0fb31b3da4c63c34a0f2ab87c900ba8f64332260ad9d32b29cd5da93e7a6937efbc549571b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ebc8ee960f6e5ba0499b298c8e0db3b
SHA14140dc4c04a577d1b5ee394ec57dd64b23e12bb4
SHA2565cd907f405015c26b4662333ff84f1308ba4e2a2e1ce1afad768d9cb8f28e6d5
SHA5127e667c50761278de3139dba5a08a4527ce21f106d8b3aee253c3c4bd45c2ebd8ee64f5d94bc76fe7c3de538df3f9e5c8feea489558a536026e7a0bfa36a2978e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561ada4b813499c36887d84aae2f6a786
SHA16cb85d8eeaac8b40aa7fcd5c131d4695dcddcbbe
SHA256e5554f5cf0dfac24b9bb197701844195e40521089ed1ffab7051a27ab189fb68
SHA512124407f496f963044b2b481abf055fa1e4be9e7eaab1b6dbdd584eeda18ceb22768367874497dfcb1013159e3564e0d102f7baea379017cde532fb351b047b01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5415155d29c7016df61e13d6fca832494
SHA19f40493c596cb30f43322e08befab34fb3a9e471
SHA2563d36fef630bf5dd7f32958877a934899976e77d9b33f60f8a81debac2b9c732a
SHA512c055e48baf0e78c64f81d98753016a060613863277d43a5fc8db23c962f111c8c9e21c75264e54e5af82a9fd7951b7cb4eb4cde58e4bc9eba9209d9ba498fa92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57439a48ee601f1b08455b0d5c0200395
SHA17ca4d59e4d0f7729bba0cba29f30b48bc54f4e33
SHA25673d1e1635200c265a330e13ba462e34cf268f2863a00e39d07b5237ebf50a2db
SHA51253eea8cc6b5e3456063c4afbec60fd961e1a2ad4f28c655d8e3658ae400f6c5604bd628b9e57b15e62c00bccb4023cb2f7bced88df2416cc80559f4cdb11536a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0af6915f03b2f365dd701e2fe33608b
SHA1ae498d03e6e9cb6c911ee4dd75fcdbf19a1fd22b
SHA256e41abeb7c96e08d8c0734a9ca0c1747d884fd8fbbf3e6d6b6dcd4457e7b68982
SHA5122821256da3a73900da9785dad2daee91d2e0b103d7e9d3544333e2311c596832146c0b9155bc8988251d145a46c97061b8306c5dcb2c45af66efa89321501e3a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63