Analysis
-
max time kernel
1563s -
max time network
1563s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30-06-2024 05:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://jjsplot
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
http://jjsplot
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
http://jjsplot
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
http://jjsplot
Resource
win11-20240508-en
General
-
Target
http://jjsplot
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000002490bbd3f9644e723d80815e3e891c3973298f13c263e3b1e0d558c9ae86a493000000000e8000000002000020000000877ea218f00b0fa3da951aefea430c5484c966e5f9019efb6125a073c2132b9820000000c3deb60bd43553044013bb521f83d8698381ca0d73d758180b266eb0c9f590ad40000000d313c72d0adf760d1c109b51d64d4eb5c894cf627045bd99118f5de25bc1720b424c4f02f19ae8686978b96c1ff1b95d6e6fe9ba934edb67eacf250aaad7ef4e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425885521" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA2E7961-369D-11EF-B290-C2931B856BB4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3050e291aacada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2432 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2432 iexplore.exe 2432 iexplore.exe 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2432 wrote to memory of 2116 2432 iexplore.exe IEXPLORE.EXE PID 2432 wrote to memory of 2116 2432 iexplore.exe IEXPLORE.EXE PID 2432 wrote to memory of 2116 2432 iexplore.exe IEXPLORE.EXE PID 2432 wrote to memory of 2116 2432 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://jjsplot1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD55b38568f59897e48cd261de8a64be925
SHA19b8d7fc1b5997c4dbe862d7cd2ea250cb05080f6
SHA25678bcdb60cb80bb5a3ff228df6a055f1175a0bfefe6fd89685d8694c42079339c
SHA5127d0b1324b83b91b0c3c3104a82fa4ad3538a71294afa6a23fbba8e6a35470e53ee5e4ecc401b758c360bd7ec29eec7576e1c269d69ba9ccb45270ea2d3cccac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5550cb89c2eca4a9180175226193ee985
SHA19e2c953cb7d957aa8ebae41f3abda9694fde938f
SHA256ccb4f6652a759f0f473cacc79a2daa0e3bfbf71f90c2244e2f78de11c7f533bc
SHA512d1d10a519c8772af54bcaa41aedc6e429774c57c9d5d0c02d351c29c2ef334ebec094795c89418f20bbf11347d4621d00ede4cc1dfeaa16880329e812318d947
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5ecb38d752c5ca33d30b2615f28fc7a7f
SHA1a60f2953705cae08b448cb09b9a2cc31f44f1efa
SHA2562ed8ea3d14871c57d43595be2db7bd05ab4dc2d670c1b2d377f3f778376ccfe1
SHA512afd02081fb36665ad1e5a5d689d972fc19506c20e7641bde7989fb3ab64bda8bc6ed4717a7c9d9172779bf2139b3ee9ec1a83aadabc7bcfd6d5d053841b8a50f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5fb61909725dead95fd4bfe8d3d7e160e
SHA153672c9abe0d43b4286f813a21a448f1bec65563
SHA256a41ef584c0ce2d4c68d4ae9cf4664e189806a91285e148d49fdd0035f99b6cf7
SHA512568de54d6ef889b6c09a898c315ca6728452ae33fad3e89247d2148ce16f0e16797f02c578d1f3e5d8ffeab81544301fd970b09bccbf5d2f6cad89ce751a6a5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5681fcf2c9d33c6da4d2ec8a0135e442e
SHA16e8b8b2ec0029d21e4f26c5ffbfbc0f4cf0ff010
SHA25604db9c8ae2310f019975fa2fa2ad842bf367cc93da8528ea1f8acfb6aaadaca1
SHA5124c308208a815e56b11d7a207cc6502e748368fe3032a0161e4e22979265c0195ae50727a32fb97ad052b20f79339aebc3ab0d74660450382a7d0320947aaf943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5beb439fa505f7293027dd3d5606b2480
SHA1990ecd208df3e9483ffdf95eb93163d85b715db3
SHA256341a36540676b51f0032d0d7c7798b9bc60b12588b0b37a66b7c45d05c1fc5c8
SHA512497ef3a70d5a28e97aca312ce570a0567a42ea58bfbb752f2f70920cc899578aa1f085aa21a3604a2848cadaec40e7d7d3d1bfb8dc9e034d4890a0671ac03731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5d3476f055201610cec72967139805843
SHA1a331e87633414c202eae49d979908a01a98d1fa1
SHA2568957971ef62860551e5977ce4293194b36730217696f39be4ae917acbccd1dd2
SHA51216709648190f89042de0634c49294ce94e21cf9d6282872340bf00e11e834a45e62071b434ec1ebf2c0c6323d5aa3890751f5c3e9390bc46da3d69c52238eadf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD54ed38d4546513fe32c4494cdd5e8497b
SHA1d24a10311cd14ed8d16eb77782bc003c7e4fffcf
SHA2567ef5a9adac79287a41bdda09868049fdfb6a616a016b7cad982183e344a0f1a7
SHA5128a2c3386ec56788c66e242555947189700b945c2f7e830f0f42fb060b618e1f16dd23ccf4ee69fbc8c0db77391b34602222128504ac37e82eb30eddc679adbc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD55b034a1595418971b0afe4903fca2a78
SHA1d2ca2733f61aa2add2d5743f343e30ba8570b957
SHA256a22593222edc57e6196312358df6e571f84b79db9aa455d240dfdb4e2efca97f
SHA512764355d6a7d0d143411e927354df7c03357aca7af2b1ed245f853359d8ab6318995264aadd34aa45dfbf67d3db0c0349dafd8bf3ead96cdb143b20b8281c7808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5c27e98c4d6c60001da92092b31595821
SHA1950ca7999135956755805296bf2272e30bac056b
SHA256344414df4b717f59d468a03b12d7bdc6e089755dd97905fa651d1f105708d597
SHA51289fca70204fa16e6c8b24f640aa89f3ed9ce8d476b2aaf3c8299d6ee9c43afd76dfd84af9867a0d15f74c8563c38d7160d4d0f283caae5e4584d1b67d5342222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5d6cd632954e9bea889471c9f45fd4bf9
SHA144b929e0f7bf91ceee54686de8d6078af69d33f6
SHA2563621f1b2f8838d785c1ef299aed9e0826f70c0c55e64330273ced161c7821bde
SHA512f793c84674d2183bb51cd6ce12596356bca5ccbeafa8d7a9bd2f1167436606af4b79ca5418ce8b8ae399c93869014e03d37924f9b312c94f12534a4b0b9abf2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD50b638fff6c99a66b056ff1b96c8d6187
SHA1659334974343f26187e21397e77996973ce27e63
SHA256f058658fa730df9c61d7e820a68620d60fe323e6e273d4c184ec72411c1ebb4a
SHA51260b5e424f5da6f70f870b0e4bdb2ba61a704dcdb85b97dcda7ea237eefb14602bc31f7cdafa8fd64c11d272913a5fe7738c5cdc16f96da64a7970925f64816a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD538b1e372db357acc9e6666005ce4c145
SHA139a3405c77ce2860eeee50f29acc5e36919af31e
SHA256ec1b38a485e0448e53f3d1c5f0f0faa6d97aa628eec31898895fd38a44501030
SHA512b675fdfbb8323e83dde6157c09ac1ed71fdab7dfe55d2aa28c1272a539d9ffec3f57800e63c2d8f818e3a8a71e5358fb5d1b53a27b762fab08e5442c4a43ae3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5a549384e971a0c2334925996006c1811
SHA15e94d2f1425395afd493b6dd3bd49172d62902eb
SHA2565e63e7a046bcecdea2ed8f5cd09c3dc73fcbb61957677f3c7dd005ea0669a91d
SHA5120bfca42938fb21af4df32d642a87461c76d89255aaa3ca0a213641a5a383e9c8f83073cb9b1d2aac4b979d061f96bdb51887aaf5a8053af495aa80299ef4f249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD575e48e18b1f96b1eee990a6384b221d4
SHA1ee000693b5ef952457aebf6754b96dfa2ae00ea4
SHA2567677d932580f249afcded40dcbe4d8a6bb8386b4965ec792f9eecee0dad6fec4
SHA512f98a5725215fbfd40066a306c4353718d94f0263d667e24cd5c5c3c945c55aa9f459a917cab1fa1afc1d191ffd73f39ab0d6cfedb8ac86832eba1878ebe71401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5ef30f2c1dbde54002c6ee193fce256a3
SHA19b862029b0377d0160b568c11c3d4b27c692d2ec
SHA256de124e3d7b21f3520389a9e9ea0a9a1c65295957be3368e72a4d7b4397f16893
SHA5120035f0520f414263194fb3deab79c26f3b4b62990f12f51cd010a27d05a43c00a65c2c6a56cb1d1d2cef901a07b0cc2c5f450d881c8f2ae4a05337ddbd27a4b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD57d6596c9bc69ef8a4420a47cbb5ecb5a
SHA1805dc8717d46497be6bca5475926e238ca9741ea
SHA2564889fc49edc3a8082aa2c6c3fc59f282bb336567bb27500c7455d0a5653dc515
SHA51276039a1a888d1e991feceebbca86d72a656da9429ca0b78d398ca98138740577d6f15aeab6d515cd800fe6d45345efe18b172778f8e39f76cfad8f78875620d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD56a46396bc8bad3d974b51ce50c721028
SHA15614e92a05cdc6e9880fd267a83e594c59a91608
SHA25699444079b8f612be6af1e2929fb8d11cba440409888f0b45436943be8c79a798
SHA51229fba17f614819b4b59adaef14d4118c18ca1a9c979d21a690c9505369ac021621eb0f1a8c754972f64a8dc6e9b83195268ec138f839c1befcc1ca23f65bcf7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5029c314156cccbf39df44e4cf3772982
SHA14d81b75c259330e800cd855d616c10472e213ef8
SHA2569381bc8d8e1081040a8b510384e3f6fabcae66cb4d247d492f0fea43b3f797e4
SHA5125b3f7df68353be5efd57921397b22ddaefcfd547da2494466253029f2eecec3e2d8118a8b05094170e6ce1e567f42a398c18fc937a6fd32310e327e0da3f2cf1
-
C:\Users\Admin\AppData\Local\Temp\Cab4D0A.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar4DAD.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b