Analysis
-
max time kernel
193s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-04-2024 13:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://138.124.180.85/
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
https://138.124.180.85/
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
https://138.124.180.85/
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
https://138.124.180.85/
Resource
win11-20240412-en
General
-
Target
https://138.124.180.85/
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E20082C1-0309-11EF-917A-EA263619F6CB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000082af16f1f562ee6947d152b9725b050115e3b8bdd17b93e9b5ee2235521cb0a6000000000e8000000002000020000000d28500177cd9bf10197f6a1aefe864cb53ffcf8aa66aad634c156f5301854d1520000000a764be2350ee5302b7154a39cdc1c774db04ac6bdf67dc99adbc2fd5ec4f4a13400000007a2d807d858bfe2a4f879eaebcdc672efd076e872cf0fe125b654fad0d4cf7dd7a55ddbdc20e62dd9a242f657b7b7edf98375c3a9a2c098e22827b4e5bd781f6 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420214512" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 702001b71697da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2908 3024 iexplore.exe 28 PID 3024 wrote to memory of 2908 3024 iexplore.exe 28 PID 3024 wrote to memory of 2908 3024 iexplore.exe 28 PID 3024 wrote to memory of 2908 3024 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://138.124.180.85/1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de0c873973859e8d38ec9d59abfc2d5a
SHA1f9efbe2540402f58c097c16de8183e392dbc7160
SHA256e9950888cc3a7930b6add6695caefd41bdf4800fce137968ae215d73fe8c101e
SHA5122eab7613f2d1e64411004cf06505e1b6d00bf76b50307ced65aedced879c2ad8eca076bc469b9ab96a04e22194b9087271bdeb9d1bb05d06f11186f779b4b685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577dfac89e95c90f58795fd8deae89f79
SHA13c4f49bac7da974b186f191c451d25aa8c8401fc
SHA256cd3779e67fb87e8eefa087d82f73def31c6e9c851d22689efa3844e18b11b08b
SHA512aff3f464a1e1383c0f4e4af9385e7544a8dc67f638f42579f6a0d9774519cbc7bb7a363129528b8285456b77d016a7a046bff2702bff47131676c58d59867545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff60eee6d7d4bbb3c16e2b1f6fd84ac0
SHA12aa160239782c4ff06d6bab9a6e3faa582d0dd28
SHA256c7a9073826f08e6575deac341a14ac4610dc8ea6a9637a6db98975e72fd67332
SHA5127d2adf559fd24a66b65b2f41bc4b97d5507bd7bb9dd768fabbb12567610f24b268f445ab6a6d5456e31d9af1090ccb6e74bc1f6e378104a573712876cb5e45de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568d399660d2071c04679d39a1251feef
SHA1040e26cfdc56cf83f2979535d437ff9cae144e00
SHA2563342a7b25fea209a777e02b8b45ba14c2698c76d408035e16d5fc8a251cb330c
SHA512a7a29db1259dfb5a4f985b9ca89ee2a19de36cbdce41afd61b30ea3d05bdfbf39a08a360a7ec746c07f5d44b343719e972ed27965b05d9e7276ff75e8fa95b8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523a160d7a88a56ba72ece150e755dace
SHA1f08ac9dd9efbc86d010a2b74f6955b37dc982cae
SHA2567fedd215f8ba5f26bf05ea99819b3557bce8fb2ce589b53c33041afa030af3ca
SHA51246d8a1999a0e68e965950cdeb8f0dd88359062b9106a46ef35c289fb6bee93bcf3177f19c921ff945127024f3eb9aacdc2acfd6eed6f6c83301162092b0a0c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fc86c4ef40b635ce4d046bc5f1be791
SHA1afbc3b6a8450498671fe5b29c46ab3d0d21e1d4f
SHA256ba5810e383357d0c7c70220af3da7994b3eb4f76005bcd99ecc61b1a8c730e68
SHA51224944e9f4e9b4b61df89ba35048e019a3b4b0e5466e10f3efbf8d279987bec34cba6f5b7fbbd0d8b55fd062bdb9cd3c20cf0da5c0352fc72329009745cfc70a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589bd5e363e7774e394a9a764e936fec7
SHA1e1ed327c973f73adeecb5d6bdadd86a1891766f4
SHA2565f162594973f7029cf46b13bc0e68c035f5a7f13c91e4a14669c3acc727c9057
SHA5124ac9e3357f6cc5294a16dd0371a83fd06b52561638f6fb6b23f44776218199cbbb0ec30baecaf9dc640ea100659ca5f1f09d81be3bbf49f30f6a9a70c9ba26a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e63a208c722cffba256d23db72e2ab45
SHA1f1a3fe816e65d18c6980ee1c6d3db4ad0654e8c1
SHA25682f0cf7cdca260b2171a8f3169b669c36dfb133e21699b248967cb86db8f97d2
SHA512ce1de13cfb18448e17d6776f3d48ae688eba748ec6f3613ad984c689ec5c34fcff0f643760edb8d1f13428dd147c5b47f4b47ca6eca276cb86cd595433bcdba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afd1277a5c6f9052a6a186f4aa73db04
SHA1bd05f129c60e5b8a0617ad28c65f9b6a5612324f
SHA25619833200f4fbe918533f40614ba85580b887afd89211b41d22925ba6328ddce2
SHA5129af5691bb3100bf8c8fc16335a73ac3baf582ca20f30ce76fae2d8c044e1bf09984f2d45c559d511662a8fdd8b7cd92946438fdc712f9cb4a89b9d808010f7e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f1af75494db9e29b7379213be6d26ea
SHA1ef091519f032943bcca2afef70b70400fc415f50
SHA25626605a2a26681cd6846ee7bc43baca4663429c3d77bfd6a30b396a13e0307a27
SHA512aa8da7f98c1f0cc8cdf40e17cc2315bca97f71954fb4ab7c19b40a70a72adbaf091c5a8c28bea6ee73cd51cb51305fd472eccdd9afe59a270e1b081d68610641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fe608fea8b4b9e99083b8a929b741b0
SHA1766484424e2cc437bc8a0a3a5d42861ff875c417
SHA256766a86e9954a2c80b3dc3d620f70603bfd2675515e12d1d1e614d7593c626d56
SHA51213e69f8a0e96bf66c3d41f1f1ac6d53a64ddcf62171e8b7a8a4e44f1236b3939192f1fbdfc305a6f578459c7129d73eb7374e84f57cabf52dda4de678b82527d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e61dde7d656207bca82b73fe5b059d27
SHA1ff8e22523cb375d6bf61382e9323bf098ede4e4e
SHA25603579c1c4452301136e70a42b7c4dce0dcc2bcfeef4fe19bb6a4b05d243a8024
SHA512af8e117e7417da4fd3ff4e45b64c18bb7c58c6497cb74173fbf67f2fe3c19485c5f128d18d1566c9eeb73c082e9429597c55b8c5174387b18a83f8a0604d0e55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f8137290876e02346252e80fdf68b1a
SHA1f6f10ea7d072935b35df7dfbda7e28fa7a115f51
SHA2569f84b145a068a3679c101c49761e0f9dfa1b1db5d6577091fdc32ea2c2ef4d4e
SHA5120453f2952f270c34a690fd8ebe3636f9724aebaff2d4f59ed8d59418e39e82158b4f4b0128cf36ccecb59c383bfe9e89bf5a9c94dcfc24cef940f3865ad9dd7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560283b9b543b1e27d147fe5280b01d67
SHA18abbf5b90724107cd57fb3a6277eacd8e0e1926d
SHA25624e02f1f8d1808928f90ea52d54ba4d0a39e83401375257d2a3778430ca7ee6e
SHA51210fa3e5403a847dff8f14f98807be46f58fccc7e15da670d47ff0be3b76ffca4e91672f401567890216a63b4b483b1acc340d33dd1ab153766a00b019f7e0ada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552503c608fdb61f22508d87fdf3c5bc0
SHA1ea2be388c0ff1a322d70c84e47501e2f3daf94ef
SHA256dbf3caa9183a7e97dfe8321f411e353a6babf8342ba05e6c8fb9f2a5694b2649
SHA5126c60cf9d26c3a283d3b9260503172a4682880521963baef1c7efe79c58bd703cf3a662203da9a47a962c18f4be542a11702f36b0320bd4709d3af42fca14d89c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fbce9b618d9b4d2bb438ac036845f50
SHA117882a5711fc64aeb23f61e100f97161afef413a
SHA256ff2268bcee7d4d1723b1dbd0f0b79b70cdea850eb5d35dffc65080c896438d24
SHA512b0076a875b04f5ee24923fe74516bf194db6ce8232c1965175150bd12d9fd49c0277338a023bc0105f5ce8bf3fe2e30e70a8a708bc9b6afd7062a905106bb846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b63179135a20f07a6f4f0f955a6087b
SHA18912ccdbc53e6d68c63c21bcced9aa5d41ca3347
SHA2563c45c9b908ecfb608c8d0806de606eeb454cbb1843ca06acec7fe01abc357cff
SHA512dc180550794807bd5d1ccf474a1dd49fc927c8cc14acf6ca44240cddcb8fe95606887d74f40e9feec7996209ab43b21be8b40d0d1a4dbeed7a72e6036c22ab85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da44816806f9d155a2f125f1f0dfc056
SHA1ef3b49643df5ecfbb65a5a5cfc63987440751538
SHA2566a521556616ee069c5a4ab00418bf4feb8795169f4f5e2243eac8340e6a79a64
SHA512ddc001dd31c28139a51cb96a835f1b868bfcdf375f51030737d30b63c653ecd89f6bbb9a93d1df59caf8ce1572a59e4d3f67b5c38df5e17c384bfcfe9c545217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5081389d5bc5562c1ebbbe3ba4bcec382
SHA1b9363895d2fc4b813db6c83ee4cad7ca867a2104
SHA25652dcff29fc3f2fc49fb8e0535f44f57d2765420a2402ba38dbab8dd458c69351
SHA512b3186cdc88c0cc8f27184f67965b478a48141d9f63283ea41a48c8ce60039dd8fd0465bcc973f24f741d9b3aba220bcc4aefec1faa711701cab59d59b1368682
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a