Overview
overview
10Static
static
snxdx/????.url
windows7_x64
6snxdx/????.url
windows10-2004_x64
6snxdx/?????.exe
windows7_x64
1snxdx/?????.exe
windows10-2004_x64
1snxdx/??????.url
windows7_x64
6snxdx/??????.url
windows10-2004_x64
6snxdx/Crac...PI.dll
windows7_x64
10snxdx/Crac...PI.dll
windows10-2004_x64
10snxdx/UUWi...er.dll
windows7_x64
1snxdx/UUWi...er.dll
windows10-2004_x64
3snxdx/dc.dll
windows7_x64
8snxdx/dc.dll
windows10-2004_x64
8snxdx/msvcr120.dll
windows7_x64
3snxdx/msvcr120.dll
windows10-2004_x64
3Analysis
-
max time kernel
147s -
max time network
167s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 04:06
Static task
static1
Behavioral task
behavioral1
Sample
snxdx/????.url
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
snxdx/????.url
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
snxdx/?????.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
snxdx/?????.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
snxdx/??????.url
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
snxdx/??????.url
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
snxdx/CrackCaptchaAPI.dll
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
snxdx/CrackCaptchaAPI.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
snxdx/UUWiseHelper.dll
Resource
win7-20220414-en
Behavioral task
behavioral10
Sample
snxdx/UUWiseHelper.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral11
Sample
snxdx/dc.dll
Resource
win7-20220414-en
Behavioral task
behavioral12
Sample
snxdx/dc.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral13
Sample
snxdx/msvcr120.dll
Resource
win7-20220414-en
Behavioral task
behavioral14
Sample
snxdx/msvcr120.dll
Resource
win10v2004-20220414-en
General
-
Target
snxdx/????.url
-
Size
125B
-
MD5
379cd9bc5f7937f7414191c65d8a4979
-
SHA1
e0fb340fe107b422f33439512016e68eca29b03d
-
SHA256
42c63721e8fad25c6454683e82365a3ceb55a4e520b7b15fe8ec022b3db3fc2b
-
SHA512
f0ce028625e6791c1ca729cf9966516f6c67bfcc40eff50f7c804c5da88a13aac4a55541d47e5adaad3672f8702288ef1b592fb47c335da5be401cc8c6a13d00
Malware Config
Signatures
-
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F248E0F1-D804-11EC-8BAB-C6DEEDF3EE1E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DOMStorage\greenxf.com\Total = "63" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DOMStorage\greenxf.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a05d85f2116cd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DOMStorage\greenxf.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.greenxf.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.greenxf.com\ = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000358f16e0538341458b70f68dad1eafd400000000020000000000106600000001000020000000271902c718cfb261095e37de26f00bd226cc32ecb3d769fae359a9b5ef7d51f0000000000e8000000002000020000000a77892be54b71fc38fbb186e3cb21922f9f1f6ab9249c2e23496f2826ad1fbd42000000005129fd2b3c66b1dd89829a9e684d7603c6474614ddcf1a2ab05f8dd2cf76caa40000000ff18b33e9437d23f2d93ebfcdf4a3e22899d7420790fe37217eaf11a0ceab50e7bae104d0adc5db4242eb161bc1d2ff4ec484f16ce0c2061113a73520dfac579 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "359792608" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1724 iexplore.exe 1724 iexplore.exe 844 IEXPLORE.EXE 844 IEXPLORE.EXE 844 IEXPLORE.EXE 844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1724 wrote to memory of 844 1724 iexplore.exe IEXPLORE.EXE PID 1724 wrote to memory of 844 1724 iexplore.exe IEXPLORE.EXE PID 1724 wrote to memory of 844 1724 iexplore.exe IEXPLORE.EXE PID 1724 wrote to memory of 844 1724 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\snxdx\____.url1⤵
- Checks whether UAC is enabled
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
60KB
MD5b9f21d8db36e88831e5352bb82c438b3
SHA14a3c330954f9f65a2f5fd7e55800e46ce228a3e2
SHA256998e0209690a48ed33b79af30fc13851e3e3416bed97e3679b6030c10cab361e
SHA512d4a2ac7c14227fbaf8b532398fb69053f0a0d913273f6917027c8cadbba80113fdbec20c2a7eb31b7bb57c99f9fdeccf8576be5f39346d8b564fc72fb1699476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54d19504fde2f6fb57d093d98e3a908e9
SHA1927aa76497e6fe532f0bdbb498bf6b18d4c74210
SHA2566c1bef8bf3699473c00ef6f2c992d19113e056aa4decd220ecd9c388975400d1
SHA5127806a5b1c40733e75db11a2066225148afa94bcafb26f9a3b4039cb3d99ffd921c243c7ceb58b5c924ebea08eb575cad5b03e933d8f160adbff18b710dbe11ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
242B
MD576f5e7c5526e5a7b16a6a1b51661bc52
SHA186b9804d95ba956bdd563ff9e89eec588de5a8b4
SHA25685f43a48e76b99e7ffac955e114feb8d29d2ed5cf5aed43c8181a2b78e66c929
SHA512498c48ba1d2a16f1fb323016d83fa884d5c308729752f87747cd906e2e8b73d288f0d13c6c2ab0371c883556c38c1c2307ac4242b3259394416e251fd3ec9f6f
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\k007hrg\imagestore.datFilesize
5KB
MD5e2026561c2f734f62836520321d7ee28
SHA1d062429bd2e6971d7cc8fb72020ebaeee911f381
SHA25620e3e2b0bcee8bf9c0a6fc0e93bbf5585942636e99dc5c2e0b8504b0ecefaa38
SHA512b98500a4d9ccb02f63bbc33024d3947740a19bb8cd21dc1d4dcef85e6b93eeb015a54073df69b0c20916890ec31ba02678ceb12af3cdf5b3557d3cf21945e272
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\KZVQ02XR.txtFilesize
604B
MD58f69d3d6480ed7cac236ca26d78b4937
SHA1a56eff2cfe0753e18922f45f309685447b13c355
SHA25606d3a024f16f4a4abcf3bd8941433afe06a24428e3a28eb3f51ce0c0f36ba239
SHA512f3141f67549c57f5b8dc71871bcb4c44ac67d546f02bba26a7e046d639f70435cd9924216dfcce7b0bbfa4bd0d59003bec0d1b3a0cf9379726a4306792650844
-
memory/1944-54-0x000007FEFC2E1000-0x000007FEFC2E3000-memory.dmpFilesize
8KB
-
memory/1944-55-0x00000000003C0000-0x00000000003D0000-memory.dmpFilesize
64KB