Analysis
-
max time kernel
193s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 04:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http:///Users/mkasuya/Documents/Research/_malware/shared/todaysample/samples/17233746244/e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
http:///Users/mkasuya/Documents/Research/_malware/shared/todaysample/samples/17233746244/e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757
Resource
win10-20240404-en
General
-
Target
http:///Users/mkasuya/Documents/Research/_malware/shared/todaysample/samples/17233746244/e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421824432" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40321919bba5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{448D2851-11AE-11EF-8745-52ADCDCA366E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000003f1b02d6e27a41f6fdee545cc62abb3042fb559497ca700fe01098cdc4aed193000000000e80000000020000200000007ca191e722dc2e7e5ec354db35b5afa14bf64f1e987bd89957d0301e9161fe3c2000000009e9fb4a449cae8503a09982ab8c86862b7ba5152445bc2035afc570dbb721ac40000000fd72346ff60ede78e096d488b9782f47540ccfb0a66aa1e599beae8504a8f3eda42eb3efbd9539eecee5ea70b98e7761961740eeaf82bd8e6307c1a97aad09fe iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2504 1952 iexplore.exe 28 PID 1952 wrote to memory of 2504 1952 iexplore.exe 28 PID 1952 wrote to memory of 2504 1952 iexplore.exe 28 PID 1952 wrote to memory of 2504 1952 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http:///Users/mkasuya/Documents/Research/_malware/shared/todaysample/samples/17233746244/e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd7571⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8b0c2afc470f7f4c65b1532a96cab47
SHA199792abfe7b3311cbf040ca3e7632a801d8da4f3
SHA256aab97371c32596a284b6037ed7c7eac1a294fba60048e982991e880e2d95ccae
SHA5123506392d92d716068ef9bd2583eb64851c120b0c25e05313f11be7c01478a1bab03c92b3045ee195f71aaa80b542615fc1c0c7d39f843f2d0e4170258c73728e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bd05b67a5a7bce2984265522d5119d1
SHA1eb1fd078875cc30d7cb8dd1583d1c9f370556767
SHA25685f34dd8a79378612a6c30bec7422ffdca4e0bc3c7f8cd3daf41b60df9a81be7
SHA512fd81ddc928e8a8f5754ccee45b756684391026085cf3501dd71038341e03b5b72549cd8385072e7e0b9ccad462de239e758c094507f372cc7ce47074c969d2c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cafadc14ef217a76b8ed1c66036ea13
SHA15eaafd0f32f6422994cc934268052ad7bc411653
SHA2567467a38a32ac6e93194dd146ab332f1489dec182d7c470043f54aaface9d9251
SHA512f72474c37f8d9639f063d10a1c9705d656b2bd13e67a4fc98390756cc955f873fc420e3aeede8e637ed70244c48d675b078b015e67572cf58d7eaf33122ea8b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557638dfe2d0c2b3d49e41dda4f201ee9
SHA1d1f3d01dc3455d54d09d3430010e84f757bdf40e
SHA2564d37ecf362b0deb14de8fe9918d10f7a27f640896b59d5400810ddc86a8fbbcb
SHA51225ac9e9a13b214ccc5e4deee63ce39891617311fbcdf340e34d1d6c9103f7fe520e930e428ab3a4bb5bfcff1956e0d7440299eb61c0ac997157cecdb0f477084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581170f388f0ea02233e838b6d30ae280
SHA1400fd6c516c1b19150eb1c1c2a88d7362b21660f
SHA2564a7d5df63fa0022f4456cba7a39b672ac6df5e9ff74b64363e29939621c1868b
SHA512ae34d39735ded4f1124e3aa42d539a452ed6bc59df7cd3c188bdce210a3fb6e9fc295b1cb13e4e6140e2df2b718ee76d2c1cc25a5b5c4a80c03a6eea02ba5443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b361b67c1a480c31b3ed5aa7bfc4f16d
SHA1cf72b8b2836141d7a9b0488d7e9fc0d77cd32ce4
SHA2569b305c529ad738111a1e7716b22a65dac3ec796c6718275116d845820e74badf
SHA512cb39639f7579a9d30956f3b1c26f5fa3e14c1befdac6c580f781dc0569c5bb425fd8bbc4ccf579f5889218b1aef4ff116bef2724dfbe3c41458b1c3502666bc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59005e1955edc2b30326da174306e1c3f
SHA1c9432656c9c4f7d1b215212bb9d9840413409d30
SHA2562bbe87c003deeafc7b030c4b98f473b40719ed1fca164cae04f3cfb2ee667f1d
SHA5129c2baaebe626101cffff739179e49427e84a9fd3a3102af213fd5fa6300da332288b10a904b8a65f28cd419b4d43ce7f4af81beeaaac959dbe0a32f5a3a3347b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2b9e7d37e9aad312c076945bf5ff5f1
SHA1feda073a60fdce5063ccd975704b4428cd1109b2
SHA256f711312a328aaf1178a3687ae433709e252da66154e88da4baf3d75fc11e2ce1
SHA512d8e5da6fc3edc302b2fd8d0eb8f45458ef878c92d36c787d43ff259101ccdb823837c29599eb880db3db6460b23ed9260ddb1c7f53bb1d0eb11ad99baa164370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf5fdfb9ff93850d657202081ba428cd
SHA1521a264d43e10ec4bd400e8c7933fd6be16efd94
SHA2562058d41b04a3c2c531356126d536bfd471beca10c1655543b013e7b01f33c030
SHA51254f92dfd2c30c5a71ca999954c726377c97cdc3fc83b4a08545041472550fa51282fc5bfd813240434c35d384f0efc4f8d083502968d33b0c948b368f8801daf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecf5f0d1c41190c96f253bfd8c2eac70
SHA1eae880c443e788f302e5d0d2801a197f72222d51
SHA256c1fc9fea6a5fe4c3ba42f5a5df95f33acba1579cfbcb4aa809db6962b50cc3b3
SHA51255b48bf16d8ac308ff9c8501961c01f69de3901fc451925d7ae7577c5586325b741b721dd3d98d03d9d0e60e6d8176713a2f49fc2e532fd542d56cb32d53ff26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5948ede9076e003f09aa942a897e5c0ac
SHA1419cf08a9f5a340a83f01f296e5614beee9eaae1
SHA256c0c86f2485dd07ac29584a0d451f9069d6b1a92305325ab87b96dcd21f39c38f
SHA5126b8f85a17c5dd5f96fe9e4fb2b6421d70245071bcb299b9dc562f4760b06b404eabb944bb6a5e05b266f728cbd6b717124b6e508691a9166e32874758ef1e156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568153d6eb5a9f2e424265b62eea317b9
SHA175bc2635cf98110b0589b16bf3ad8e5b7f306feb
SHA2561b965534087459f260a1c750fc0fde68529a3a8e54b3022cc94afb36c8b5267b
SHA51254c05d68024f778f171f8f081c47ef16176f0bf7974828aad2ec6f76d3da8808697ec25d245808dea95e9c73b8715227f00c16a2a69d7d45160cc794dad2480b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab2ff039f11d791b8081578d1cf803d6
SHA15ba01fffb5604695b731b00cc0ddfd42ffa13118
SHA256b6ea2ffa3f54684f3dcd5d85e440f1d04b133aae6d943bec25bcaa0873c9ff30
SHA5124411db26fd408daa60bf7c844686ea9b65a20bac2f518e59e06daee60a707f4812e654ea3d25a70843c1752607463aaababbd780e5fc066e5cee86cd60b766f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b3f3392d7c25da5422212b57b3f42b4
SHA1bac79e21de8c3b07bcdef2ba084282a1b41608fd
SHA256eeabe19ce84ded6a84058a61723e0cd7ae68833fb8e7a8152bd760493f1baa6e
SHA51222e58aa13a7b4e5528052839ded8714541adc37354793c440b0a176af96a57d8d786bf7241de1ad334ffcde25cf65e47672f1e20ec8480ce115fe0def15ed67a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52027474a108aab99733faee5d13b4bdd
SHA1b13e4daedb3f764b1d5920b65ba8de74a462a30a
SHA25628c76dab7b1365239d3b91cfe597c8f1b9efe37345198bafa4148ace09c91e30
SHA5123daaacc63a8df8c57d617b12a949f2baf284bbd3b675772c7cb3958b0fe004acb8dd19afb0a5d002a5bc9906b564528a7d7a81e23cc521f969ef323ef1a7a724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cfbe98dc03c11c89aeb0c08d469627f
SHA1dcb8be1fe9a28b79bcc99b99d2daf83afa318aec
SHA256925a9db8e848c829ea0962529dee4ef9cd089d55a67fc559b79de40d4044c24a
SHA512d96fb0b57dac8ec577b3608ef6f1806d8fed04f741cd5cafce1abd4842315f9d3f7f8aeda05be9f4072b5d1b302278faefaeb54797b53eb97e979e59402535b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568166fa157ffac257bac6b950c32076c
SHA1105bfaece44f6df0cff202861f997193053d3c96
SHA2565e2ded99ea8b8056e659222bcae20586d66cb2b66059e78003f2271d9db5655a
SHA51264676a2c417b5a657561bc9ef6bd47d8e501e05f162d03b3a0a6b784f4391c6d65e327cea56e9faa31e766d33d25ed2c771fa26950548ef5d447dad05a236c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d32ab228d93eee1b3cbf35bdfb8740c
SHA1888b189b8733087d0a38ad6a845af14d95fa9b55
SHA2568c5c392fb55e76537e0e383eae126d93f47a94051979526a4a580a7f125ea0ec
SHA512cb9357d43b9bb5fba581b578826b139514320806c3ba627def14d80bb78be02bc048a1185ba65a311fbcf2adaa97f2b9e74659f29e65ee9cfff697574d7390e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfff830b9f8ec33eb82f1259b4c39416
SHA1a2ed4022de7619f5adc6be36a0f079dcf0bc1b07
SHA256a83dbca3ecba417047a1e46582b6ddda461a3bc62b3f424a2848b5f18b6c9f23
SHA51204a84e3e7fbacb55db0495f3bf913f95b0b98b6c9dba14285e02cfc60eacc6a4c9bef01e0bc76a9c691ff0313888f16406195a5ee7ab21c7438f4faa42102932
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a