Overview
overview
3Static
static
erxczzxEr0...ore.js
windows7_x64
1erxczzxEr0...ore.js
windows10-2004_x64
1erxczzxEr0...rap.js
windows7_x64
1erxczzxEr0...rap.js
windows10-2004_x64
1erxczzxEr0...een.js
windows7_x64
1erxczzxEr0...een.js
windows10-2004_x64
1erxczzxEr0...x.html
windows7_x64
1erxczzxEr0...x.html
windows10-2004_x64
1erxczzxEr0...ght.js
windows7_x64
1erxczzxEr0...ght.js
windows10-2004_x64
1erxczzxEr0...ain.js
windows7_x64
1erxczzxEr0...ain.js
windows10-2004_x64
1erxczzxEr0...zr1.js
windows7_x64
1erxczzxEr0...zr1.js
windows10-2004_x64
1erxczzxEr0...es.jpg
windows7_x64
3erxczzxEr0...es.jpg
windows10-2004_x64
3erxczzxEr0...ore.js
windows7_x64
1erxczzxEr0...ore.js
windows10-2004_x64
1erxczzxEr0...rap.js
windows7_x64
1erxczzxEr0...rap.js
windows10-2004_x64
1erxczzxEr0...een.js
windows7_x64
1erxczzxEr0...een.js
windows10-2004_x64
1erxczzxEr0...x.html
windows7_x64
1erxczzxEr0...x.html
windows10-2004_x64
1erxczzxEr0...ght.js
windows7_x64
1erxczzxEr0...ght.js
windows10-2004_x64
1erxczzxEr0...ain.js
windows7_x64
1erxczzxEr0...ain.js
windows10-2004_x64
1erxczzxEr0...zr1.js
windows7_x64
1erxczzxEr0...zr1.js
windows10-2004_x64
1erxczzxEr0...s1.png
windows7_x64
3erxczzxEr0...s1.png
windows10-2004_x64
3Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
30-06-2022 17:18
Static task
static1
Behavioral task
behavioral1
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/before.js
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/before.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/bootstrap.js
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/bootstrap.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/fullscreen.js
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/fullscreen.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/index.html
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/index.html
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/light.js
Resource
win7-20220414-en
Behavioral task
behavioral10
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/light.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral11
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/main.js
Resource
win7-20220414-en
Behavioral task
behavioral12
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/main.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral13
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/modernizr1.js
Resource
win7-20220414-en
Behavioral task
behavioral14
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/modernizr1.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral15
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/virus-images.jpg
Resource
win7-20220414-en
Behavioral task
behavioral16
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/virus-images.jpg
Resource
win10v2004-20220414-en
Behavioral task
behavioral17
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/before.js
Resource
win7-20220414-en
Behavioral task
behavioral18
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/before.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral19
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/bootstrap.js
Resource
win7-20220414-en
Behavioral task
behavioral20
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/bootstrap.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral21
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/fullscreen.js
Resource
win7-20220414-en
Behavioral task
behavioral22
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/fullscreen.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral23
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/index.html
Resource
win7-20220414-en
Behavioral task
behavioral24
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/index.html
Resource
win10v2004-20220414-en
Behavioral task
behavioral25
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/light.js
Resource
win7-20220414-en
Behavioral task
behavioral26
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/light.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral27
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/main.js
Resource
win7-20220414-en
Behavioral task
behavioral28
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/main.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral29
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/modernizr1.js
Resource
win7-20220414-en
Behavioral task
behavioral30
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/modernizr1.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral31
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/virus-images1.png
Resource
win7-20220414-en
Behavioral task
behavioral32
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/virus-images1.png
Resource
win10v2004-20220414-en
General
-
Target
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/index.html
-
Size
37KB
-
MD5
2cda3d712eda3eaa8b8f1d047186082c
-
SHA1
bcdeb6ceef9b9ab9bbc48681ac84f6ca9c77e888
-
SHA256
cc243cb9d3f75fc87a3c899a99e182279c4b49e7c823f89bc9bdbfaf5ff65d84
-
SHA512
81d144d1587736c8f2994d03eb935352facb0ec221bd36738a159f1c8efd53ca0927a6dd9b407589cb337b4ceababe8dffef2bb6b883d3f3eac6544813614628
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0bb2965b68cd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000962422cf799f2f46a7e75b376cef3c3c000000000200000000001066000000010000200000004e90fe48fbb3f8a7b93bea05c71198fb4d2ab9b5b2c775295580749330f88f20000000000e800000000200002000000043aebe23bb0eb66dab90e42cd8a17b383861e1a54c1e8f1016d6a44e1e78fd38900000003c13d8423985c834cee75a22be696104aaf77e5d2862a4a1611596e65bada353b921a4d341123d3a2324d99cbbd293826b54c3d13c42f9ad19c9cd2d6b4ddd01dcaaad1274e64e0393669815ca61934feac6300e238b326daeb06f6ba3fc5f5bcd5da6d6259c327f7cae34868f8c0ce7794d917133c0c62ee6ecee388f3ae1bcaae930086f8047b6730a186df2077eae40000000a81f1815751a2e58a24e79e8f08fb4a53fbb357466cc7c1364e99d4495d7847681e1ff70096b7e3f29c3b3cfac4c3b6f89c996908117888ceaad0eab556cbeb5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000962422cf799f2f46a7e75b376cef3c3c000000000200000000001066000000010000200000005a44b91bca927d2fc1990dc04f3699da893ab99f7467c51c95d10fce22892db2000000000e8000000002000020000000884de07c1bf790c002ca2273e8bd1aff56674893fd6bce4622ebb02b01ad62c3200000005b96b0d5cfb8cf393f920ed6548d6b3a37f6e1e0e405271e330a14900723c45e40000000a95a33681bb8614a2b42a666c617f0d447f03aedf30de0a3be35a06ec0f59ec975791dd0343fb95d21823c9751da36a2185a916f3b4de33ac1b4e6821bbc9b97 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7DB13651-F8A9-11EC-AC2F-4E0428891AFE} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "363381720" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: 33 1572 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1572 AUDIODG.EXE Token: 33 1572 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1572 AUDIODG.EXE Token: 33 2024 IEXPLORE.EXE Token: SeIncBasePriorityPrivilege 2024 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1380 iexplore.exe 1380 iexplore.exe 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1380 wrote to memory of 2024 1380 iexplore.exe 27 PID 1380 wrote to memory of 2024 1380 iexplore.exe 27 PID 1380 wrote to memory of 2024 1380 iexplore.exe 27 PID 1380 wrote to memory of 2024 1380 iexplore.exe 27
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc\h0el0pIED0Er0\index.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1380 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2024
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x44c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1572
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5589c442fc7a0c70dca927115a700d41e
SHA166a07dace3afbfd1aa07a47e6875beab62c4bb31
SHA2562e5cb72e9eb43baafb6c6bfcc573aac92f49a8064c483f9d378a9e8e781a526a
SHA5121b5fa79e52be495c42cf49618441fb7012e28c02e7a08a91da9213db3ab810f0e83485bc1dd5f625a47d0ba7cfcdd5ea50acc9a8dcebb39f048c40f01e94155b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD56692568915a71cbac2a66ed8a1627749
SHA1e390212ffde5dd317a3d45dba2cc9ceec804b659
SHA256836cc0b937a686ae90ef4f8c8a1042962717f8210598ab1630a6ed02204d9765
SHA512f3fa630b0288c8437c7f7051300f8773cfe8663cbf73d9dbfdf4001683470ae2951456e5499becaf0bfebf201b13d3af63651952e94a7226be65dbc75ef1b16b
-
Filesize
608B
MD54a7eb350d537e0b92ab150853eb2e4a7
SHA1fecd63ff92bddde5c9a22516472cb49a06af0b3a
SHA256877b1112c809816bb4d15aa5cb6efed8d036900610244737e2cdbaf54bd7d16c
SHA51204afbf1041e1936bedd2a5966f7e565af483a08658509056c628c6130ce38daba5c0e099abacc2c8fc96df7ca7642efcc79805ca7bb94bd9919c2b7c93725d4b