Overview
overview
7Static
static
1URLScan
urlscan
1https://google.com
windows10-1703-x64
1https://google.com
windows7-x64
1https://google.com
windows10-1703-x64
1https://google.com
windows10-2004-x64
1https://google.com
windows11-21h2-x64
1https://google.com
android-9-x86
1https://google.com
android-10-x64
7https://google.com
android-11-x64
1https://google.com
android-13-x64
1https://google.com
android-9-x86
1https://google.com
macos-10.15-amd64
4https://google.com
macos-10.15-amd64
4https://google.com
debian-12-armhf
https://google.com
debian-12-armhf
https://google.com
debian-12-mipsel
https://google.com
debian-9-armhf
https://google.com
debian-9-mips
https://google.com
debian-9-mipsel
https://google.com
ubuntu-18.04-amd64
7https://google.com
ubuntu-20.04-amd64
7Analysis
-
max time kernel
11s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-03-2024 20:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://google.com
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
https://google.com
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
https://google.com
Resource
win10-20240221-en
Behavioral task
behavioral4
Sample
https://google.com
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
https://google.com
Resource
win11-20240221-en
Behavioral task
behavioral6
Sample
https://google.com
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral7
Sample
https://google.com
Resource
android-x64-20240221-en
Behavioral task
behavioral8
Sample
https://google.com
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral9
Sample
https://google.com
Resource
android-33-x64-arm64-20240229-en
Behavioral task
behavioral10
Sample
https://google.com
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral11
Sample
https://google.com
Resource
macos-20240214-en
Behavioral task
behavioral12
Sample
https://google.com
Resource
macos-20240214-en
Behavioral task
behavioral13
Sample
https://google.com
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral14
Sample
https://google.com
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral15
Sample
https://google.com
Resource
debian12-mipsel-20240221-en
Behavioral task
behavioral16
Sample
https://google.com
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral17
Sample
https://google.com
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral18
Sample
https://google.com
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral19
Sample
https://google.com
Resource
ubuntu1804-amd64-20240226-en
General
-
Target
https://google.com
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AA8B8C11-ED40-11EE-A1FB-E299A69EE862} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "25" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "25" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "25" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2868 iexplore.exe 2868 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2868 wrote to memory of 3036 2868 iexplore.exe IEXPLORE.EXE PID 2868 wrote to memory of 3036 2868 iexplore.exe IEXPLORE.EXE PID 2868 wrote to memory of 3036 2868 iexplore.exe IEXPLORE.EXE PID 2868 wrote to memory of 3036 2868 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://google.com1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5719545123c79f44358349aa542e510a7
SHA1979470603e7366d25bfc408fbcb9edcbd0f83e32
SHA25689020d9c9f99675632b1424b5ab338e0d5b8cce9f65f307070349b03ba7742b8
SHA512a2619cf73324e574701b837cfaae4d9bd0ce0965bf6c5bfe849f968913f2fc461e1367c3054306ad165503e70404abc44619007001b2eccee93af9b8bebdee22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e4ed8da55733a3c5bde87e8c885eb87d
SHA190d0ee8dcd21a20152a9e771180315ff1f13111d
SHA256260fc73427e966aab60794880256964eef1c459ec0bcf8cbe85cfa4d5f567323
SHA5129de7be758058dff48f8e199ee3e51bca1f45ce4c3c938137d77d9e4f61421c69105c4a4cfd3650217663793e2b4cf625bc84e51bff99969dddf5e89fffd6ee0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50c6847c4b7a5091921b96724d0eaf959
SHA1e070d38ffb8ecc68acbde661991a807cf99fa6e0
SHA2561415de7be5b1ad104102cd98015e7df787a03dd77e1e140cf95813f514d56757
SHA5123796ac52f3cf2e5ab370d503dee3a00b6fd9ae13cce513c185930d788d723458e6b5add494ad152f0af88ca5062843aa34226c212308bd47df9b0abcfd94b3b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ab5f96781078cc079ba45c5585082ddf
SHA14af9301626c3d6c3f353ad57aa8f0e446455f664
SHA256fc515c10d4b3558e4beeb839ec0c4f62af0b7ffb395f445c85a30644220275d3
SHA5126125f35e50801d5878b38f1799fbb4b16a6276a975c373886d83b74f12aeaeae9f6bbe6bc9bf6afbda23913971991acf9643f069f21c5db57958e2cf225cf939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51ba320f38897df9bd58a23420d8c08c4
SHA1e956ae7fef0530b51929a0623d7b228d68b6249d
SHA256dc373ac4bcedd7a68702c8bc2e0bbb2642dd0e42f33e515f3ae3ca352b318ce7
SHA5126c59e81d78f7bb62dd050b00fd0831e989b98c8deafdeb7aaa48ddbc2243e6be3d55e8892f85a05c43cf5b168ae1d54ffb0f72dd1c0db5661287cb8c4e33211e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5cf549e54e1dcb536a53ed48156cab677
SHA1329d6600422e4059878de41f723cf6dc4c23d66d
SHA25691eb5756c6c6037757f86299f74a491209edb1d8c317300b954fbe7ce4f778a4
SHA512c3313d08cf47635c34aa351ef80d3604cb9894dfc7ba21bb68c8f7378fd209cd626e4b3b68beb0512c0b6a3caadf959c9539cf999d88478f500a3cb2676c0055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a84b5f0a9ec6d0a62c791a34d53d0df9
SHA1816d5fb16c170d51e3394d8988f28975ec6b14e2
SHA2560237a7c9f6e2934af9dd05297d13049aa87c8563260f66bae87b26e84fbe4180
SHA512eaf4bbb6cfc4cbaa5bb502c1b201aff97e24d04df2d68f58ff51c2faae60160f7d98ae341b035b89ed622556ff9c403f3a232d237b666a0c3524aece46d6d533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5add1bcec45299e22596dea52037f5abf
SHA18f01a2aff8293330b26bae1f527a45e78db8b66b
SHA2569eecdda1afbc4fcf0b7ea096c477be53fc8b4350c1d5bad7fdeb8beda3909cb8
SHA5121dbc1d0b8dcd0507a788b01c28648632c436138910b013b746872f91ca14a0dfe0a82d18c9399b8bffa98078425b0e2508a5ad023d2bb7f3351925daa97c5957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57a96f3193cbcb359aeb8555c6842e098
SHA13249503a5f8179f1e6285cfb6ad92eaecf509f05
SHA256a91ce8b6959034d8d2e8830b526c72f3b79fe0f4af1e209690ef123340e886e8
SHA5123c2b5e9e288b25e4b8af24d2f5b7529d19c4b153eae34c3db81da56c7d2c1a3aa592705ffc331aa395cb3d303884a0a7257caa1ec433673e21c0fc6ee6f51347
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\49CWZ1TF\www.google[1].xmlFilesize
99B
MD5ba1272b0bb296cb21295b7d163112522
SHA152e295c102549dd81aa2ef421cb34ff4749ed4d6
SHA256ec637d52ccef529f99150a42888f1b9d826d5134196ffdb34fab32f905785fe4
SHA512b91b8ae31d603b7f0136464644bf6241469321c9145b4d9c3f65f14b15db803840544e8fce27ce2c16579342391f6a5dde28e8b6ea3617c42ed32c6529cdd426
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\q905y6j\imagestore.datFilesize
5KB
MD5641d041f4d7d8d8a8209f63fe4366531
SHA13d94acf8cac7fabe93b41bf23d0e2a658db07a32
SHA256d50c6a093bc8f537fb101f68b64020704861436262a4f81dc43cfc065d4cec03
SHA512e059c350aeb6bde0299c940f794f3716602c9ff1dc91e954138a8e5e4a46f6ed3359f84dfe84fee3c5f44d9bb5f3f8c57221661b8a54bcda826221623996b39d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5DKX8QD5\recaptcha__en[1].jsFilesize
499KB
MD548c590d47c8b1868cecab334e9a34cbe
SHA15f1a9f94294ec337f657ac2ebec1c74e097ce5b3
SHA256f3756825df5194a174b7a55ebd3b484c276766eef21343d34b053b98ed386801
SHA51224b9e42bcebefcb81d2dc8760256a63e84846c2a49cee2a6b3904eb5dba4551dbea599e0892c7fa6674e32d6e047ca31b396add5467f6d3fadfe8f9b3a72a6f2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9M0HR0P6\styles__ltr[1].cssFilesize
55KB
MD5eb4bc511f79f7a1573b45f5775b3a99b
SHA1d910fb51ad7316aa54f055079374574698e74b35
SHA2567859a62e04b0acb06516eb12454de6673883ecfaeaed6c254659bca7cd59c050
SHA512ec9bdf1c91b6262b183fd23f640eac22016d1f42db631380676ed34b962e01badda91f9cbdfa189b42fe3182a992f1b95a7353af41e41b2d6e1dab17e87637a0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U8A9A2DI\favicon[1].icoFilesize
5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563
-
C:\Users\Admin\AppData\Local\Temp\Cab9E07.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar9E06.tmpFilesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
C:\Users\Admin\AppData\Local\Temp\Tar9F07.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a