Overview
overview
1Static
static
&iNE.t.html
windows7_x64
1&iNE.t.html
windows10-2004_x64
1files/adsbytenmax.js
windows7_x64
1files/adsbytenmax.js
windows10-2004_x64
1files/app.js
windows7_x64
1files/app.js
windows10-2004_x64
1files/boot...min.js
windows7_x64
1files/boot...min.js
windows10-2004_x64
1files/bottom.html
windows7_x64
1files/bottom.html
windows10-2004_x64
1files/f(4).js
windows7_x64
1files/f(4).js
windows10-2004_x64
1files/f.js
windows7_x64
1files/f.js
windows10-2004_x64
1files/index.js
windows7_x64
1files/index.js
windows10-2004_x64
1files/jque...min.js
windows7_x64
1files/jque...min.js
windows10-2004_x64
1files/jque...ion.js
windows7_x64
1files/jque...ion.js
windows10-2004_x64
1files/jque...min.js
windows7_x64
1files/jque...min.js
windows10-2004_x64
1files/jquery.min.js
windows7_x64
1files/jquery.min.js
windows10-2004_x64
1files/login.js
windows7_x64
1files/login.js
windows10-2004_x64
1files/notify.html
windows7_x64
1files/notify.html
windows10-2004_x64
1files/replace_ad.js
windows7_x64
1files/replace_ad.js
windows10-2004_x64
1files/request.html
windows7_x64
1files/request.html
windows10-2004_x64
1Analysis
-
max time kernel
109s -
max time network
171s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
15-06-2022 00:07
Static task
static1
Behavioral task
behavioral1
Sample
&iNE.t.html
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
&iNE.t.html
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
files/adsbytenmax.js
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
files/adsbytenmax.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
files/app.js
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
files/app.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
files/bootstrap.min.js
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
files/bootstrap.min.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
files/bottom.html
Resource
win7-20220414-en
Behavioral task
behavioral10
Sample
files/bottom.html
Resource
win10v2004-20220414-en
Behavioral task
behavioral11
Sample
files/f(4).js
Resource
win7-20220414-en
Behavioral task
behavioral12
Sample
files/f(4).js
Resource
win10v2004-20220414-en
Behavioral task
behavioral13
Sample
files/f.js
Resource
win7-20220414-en
Behavioral task
behavioral14
Sample
files/f.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral15
Sample
files/index.js
Resource
win7-20220414-en
Behavioral task
behavioral16
Sample
files/index.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral17
Sample
files/jquery-1.9.1.min.js
Resource
win7-20220414-en
Behavioral task
behavioral18
Sample
files/jquery-1.9.1.min.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral19
Sample
files/jquery-fieldselection.js
Resource
win7-20220414-en
Behavioral task
behavioral20
Sample
files/jquery-fieldselection.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral21
Sample
files/jquery-ui-1.10.3.custom.min.js
Resource
win7-20220414-en
Behavioral task
behavioral22
Sample
files/jquery-ui-1.10.3.custom.min.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral23
Sample
files/jquery.min.js
Resource
win7-20220414-en
Behavioral task
behavioral24
Sample
files/jquery.min.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral25
Sample
files/login.js
Resource
win7-20220414-en
Behavioral task
behavioral26
Sample
files/login.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral27
Sample
files/notify.html
Resource
win7-20220414-en
Behavioral task
behavioral28
Sample
files/notify.html
Resource
win10v2004-20220414-en
Behavioral task
behavioral29
Sample
files/replace_ad.js
Resource
win7-20220414-en
Behavioral task
behavioral30
Sample
files/replace_ad.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral31
Sample
files/request.html
Resource
win7-20220414-en
Behavioral task
behavioral32
Sample
files/request.html
Resource
win10v2004-20220414-en
General
-
Target
&iNE.t.html
-
Size
20KB
-
MD5
ba3348ede1d4a67f677e5b2714bf5250
-
SHA1
080914baea7618f64d3960d087ed6f49798ecaf8
-
SHA256
5b00f37170e39bc837d2f4ffaa887ba49110ba50290691c09f19a3cd5c3b1363
-
SHA512
b6a8d27be1ae4609b5a54482a06464bf75e984b0080a59b1cf4971b925c9bc27e15469282f1c98a6e1463eb7fe1981d34d08908b51de60a7d24320240698cc2e
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B68B0B21-EC71-11EC-A40D-5EFF8A6DE4BC} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000358f16e0538341458b70f68dad1eafd400000000020000000000106600000001000020000000d2b49425a1340f7ec14a349c19a33b9144185a075cdfdebcd6de3590b88f7f68000000000e80000000020000200000005ec526b093015c8daa57b003b578648e282dcb7525daea0753809ad4cacc0ddd200000004bfc55c373252c03a68e2bad56bdf48c0c6c7152511b9570b12ddfa08dfb1cb04000000069bee28fc6b64cbb379e3b1eef7ba65c80e78ba252b89077793186299f5bbdecb8719d427c94c64823b2dc0c661e1669361eaa70ab1d71a442d096b494c1ec94 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20580ba87e80d801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "362038360" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1892 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1892 iexplore.exe 1892 iexplore.exe 1060 IEXPLORE.EXE 1060 IEXPLORE.EXE 1060 IEXPLORE.EXE 1060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1892 wrote to memory of 1060 1892 iexplore.exe IEXPLORE.EXE PID 1892 wrote to memory of 1060 1892 iexplore.exe IEXPLORE.EXE PID 1892 wrote to memory of 1060 1892 iexplore.exe IEXPLORE.EXE PID 1892 wrote to memory of 1060 1892 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\&iNE.t.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1892 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1060
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595da5acdf815d8266e73c482b8491165
SHA1eb120ed0b5aafe89d7e71974b5c78469b77a633a
SHA256ba6af58778e7225c2ff7c317177087a913172e1490625a5a1e5f47ec9b9067e8
SHA5127e00b2ffdbe44ca6c53a583f53661c827ce04f8d8037d9eac2fbcbbf454dfef552561d590c140828ef07a94857f65e194ad6c3c96bbd317a72f7400344a4c0ba
-
Filesize
603B
MD5fb7c7084d1ca870f37d022667c570d4d
SHA17dd8c6c64b754287a3170ee59324f621284dbe56
SHA2567f49f17caa64b7c3c6657906e87ece87320b28346dd14871a7adfc43ac479adf
SHA5127b025f6801db1ef9d71be24b37ba04137826640817918dd4f9b709812f20f25d2aa8d720159328cde9feb071e7fdee5cdb58051d618889bcffbec40371a676bd