Analysis
-
max time kernel
35s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 19:04
Static task
static1
Behavioral task
behavioral1
Sample
_6EHIP7ZNS8q0SZtmQxDjug@geopod-ismtpd-2_.eml
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
_6EHIP7ZNS8q0SZtmQxDjug@geopod-ismtpd-2_.eml
Resource
win10v2004-20240709-en
General
-
Target
_6EHIP7ZNS8q0SZtmQxDjug@geopod-ismtpd-2_.eml
-
Size
40KB
-
MD5
833135ea7ad5da9c410787d0f706e7e3
-
SHA1
118726cc547500481f51019a8630a57bd9db7cb2
-
SHA256
307b5ca0f17435e56b2abf0c55b09905a6a512f8044ed0688b4b3eb83b8dd9b7
-
SHA512
552540ddf13a2a3fb1c2c7d04b574068b786044c5800135bcbb7f1a41e793fe0be7048841ead2ed8136fc85ddb572d22281aa493a88fdb0fd4fdd9d9a49467eb
-
SSDEEP
768:q/1+LX1RJr6SlE9l68fXXpcLn8fXXbE1KXSl6r:q/10HA5zr
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 970fa45f43d2da01 iexplore.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\RepId\PublicId = "{F8F0283C-F6AA-4936-8966-A98C3EC4B5E2}" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DownloadWindowPlacement = 2c0000000000000000000000ffffffffffffffffffffffffffffffff100100003c000000900300001c020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{9664EE4B-4926-11EF-96F8-F2AA40FE1C9B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings iexplore.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\_6EHIP7ZNS8q0SZtmQxDjug@geopod-ismtpd-2_.eml:OECustomProperty cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3784 OpenWith.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 4124 iexplore.exe 4124 iexplore.exe 4124 iexplore.exe 4124 iexplore.exe 4124 iexplore.exe 4124 iexplore.exe 4124 iexplore.exe 4124 iexplore.exe -
Suspicious use of SetWindowsHookEx 33 IoCs
pid Process 3784 OpenWith.exe 3784 OpenWith.exe 3784 OpenWith.exe 3784 OpenWith.exe 3784 OpenWith.exe 3784 OpenWith.exe 3784 OpenWith.exe 3784 OpenWith.exe 3784 OpenWith.exe 3784 OpenWith.exe 3784 OpenWith.exe 3784 OpenWith.exe 3784 OpenWith.exe 3784 OpenWith.exe 3784 OpenWith.exe 3784 OpenWith.exe 3784 OpenWith.exe 4124 iexplore.exe 4124 iexplore.exe 3216 IEXPLORE.EXE 3216 IEXPLORE.EXE 4124 iexplore.exe 4124 iexplore.exe 560 IEXPLORE.EXE 560 IEXPLORE.EXE 4124 iexplore.exe 4124 iexplore.exe 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE 4124 iexplore.exe 4124 iexplore.exe 1100 IEXPLORE.EXE 1100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3784 wrote to memory of 4124 3784 OpenWith.exe 97 PID 3784 wrote to memory of 4124 3784 OpenWith.exe 97 PID 4124 wrote to memory of 3216 4124 iexplore.exe 99 PID 4124 wrote to memory of 3216 4124 iexplore.exe 99 PID 4124 wrote to memory of 3216 4124 iexplore.exe 99 PID 4124 wrote to memory of 1004 4124 iexplore.exe 101 PID 4124 wrote to memory of 1004 4124 iexplore.exe 101 PID 4124 wrote to memory of 560 4124 iexplore.exe 102 PID 4124 wrote to memory of 560 4124 iexplore.exe 102 PID 4124 wrote to memory of 560 4124 iexplore.exe 102 PID 4124 wrote to memory of 5020 4124 iexplore.exe 103 PID 4124 wrote to memory of 5020 4124 iexplore.exe 103 PID 4124 wrote to memory of 1764 4124 iexplore.exe 104 PID 4124 wrote to memory of 1764 4124 iexplore.exe 104 PID 4124 wrote to memory of 1764 4124 iexplore.exe 104 PID 4124 wrote to memory of 4872 4124 iexplore.exe 106 PID 4124 wrote to memory of 4872 4124 iexplore.exe 106 PID 4124 wrote to memory of 1100 4124 iexplore.exe 107 PID 4124 wrote to memory of 1100 4124 iexplore.exe 107 PID 4124 wrote to memory of 1100 4124 iexplore.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\_6EHIP7ZNS8q0SZtmQxDjug@geopod-ismtpd-2_.eml1⤵
- Modifies registry class
- NTFS ADS
PID:440
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\_6EHIP7ZNS8q0SZtmQxDjug@geopod-ismtpd-2_.eml2⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4124 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3216
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\_6EHIP7ZNS8q0SZtmQxDjug@geopod-ismtpd-2_.eml3⤵
- Modifies Internet Explorer settings
PID:1004
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4124 CREDAT:82948 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:560
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\_6EHIP7ZNS8q0SZtmQxDjug@geopod-ismtpd-2_.eml3⤵
- Modifies Internet Explorer settings
PID:5020
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4124 CREDAT:17422 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1764
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\_6EHIP7ZNS8q0SZtmQxDjug@geopod-ismtpd-2_.eml3⤵
- Modifies Internet Explorer settings
PID:4872
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4124 CREDAT:82960 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1100
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5833135ea7ad5da9c410787d0f706e7e3
SHA1118726cc547500481f51019a8630a57bd9db7cb2
SHA256307b5ca0f17435e56b2abf0c55b09905a6a512f8044ed0688b4b3eb83b8dd9b7
SHA512552540ddf13a2a3fb1c2c7d04b574068b786044c5800135bcbb7f1a41e793fe0be7048841ead2ed8136fc85ddb572d22281aa493a88fdb0fd4fdd9d9a49467eb
-
Filesize
16KB
MD5011560a9078131638b735be6e21d3286
SHA1cbc2b7d5b4b4916f4ef49177e7bca1bb1ec7d1a2
SHA256a0ae30204e052985a30384028ebba29618e1bc293b79f7782120e11c4a17cd91
SHA512bc33bbd5a675778d0f4eea1f1e5ef55a5cf6eb6d5dc11d245543a68170641f74a75ffb516f3c0da4f0de83ca1dee8af57470658402e4e8d6b68fddeaf192be11