Overview
overview
1Static
static
data/constants.js
windows7-x64
1data/constants.js
windows10-2004-x64
1data/defau...ngs.js
windows7-x64
1data/defau...ngs.js
windows10-2004-x64
1data/exper...out.js
windows7-x64
1data/exper...out.js
windows10-2004-x64
1html/background.html
windows7-x64
1html/background.html
windows10-2004-x64
1html/feedback.html
windows7-x64
1html/feedback.html
windows10-2004-x64
1html/options.html
windows7-x64
1html/options.html
windows10-2004-x64
1html/popup.html
windows7-x64
1html/popup.html
windows10-2004-x64
1img/FacebookLike.xml
windows7-x64
1img/FacebookLike.xml
windows10-2004-x64
1img/FacebookShare.xml
windows7-x64
1img/FacebookShare.xml
windows10-2004-x64
1img/Twitter.xml
windows7-x64
1img/Twitter.xml
windows10-2004-x64
1img/broken...le.xml
windows7-x64
1img/broken...le.xml
windows10-2004-x64
1public/js/...und.js
windows7-x64
1public/js/...und.js
windows10-2004-x64
1public/js/base.js
windows7-x64
1public/js/base.js
windows10-2004-x64
1public/js/...ner.js
windows7-x64
1public/js/...ner.js
windows10-2004-x64
1public/js/...ipt.js
windows7-x64
1public/js/...ipt.js
windows10-2004-x64
1public/js/...ing.js
windows7-x64
1public/js/...ing.js
windows10-2004-x64
1Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 10:22
Static task
static1
Behavioral task
behavioral1
Sample
data/constants.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
data/constants.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
data/defaultSettings.js
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
data/defaultSettings.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
data/experiments-out.js
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
data/experiments-out.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
html/background.html
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
html/background.html
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
html/feedback.html
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
html/feedback.html
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
html/options.html
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
html/options.html
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
html/popup.html
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
html/popup.html
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
img/FacebookLike.xml
Resource
win7-20220901-en
Behavioral task
behavioral16
Sample
img/FacebookLike.xml
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
img/FacebookShare.xml
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
img/FacebookShare.xml
Resource
win10v2004-20221111-en
Behavioral task
behavioral19
Sample
img/Twitter.xml
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
img/Twitter.xml
Resource
win10v2004-20221111-en
Behavioral task
behavioral21
Sample
img/broken-bicycle.xml
Resource
win7-20221111-en
Behavioral task
behavioral22
Sample
img/broken-bicycle.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
public/js/background.js
Resource
win7-20221111-en
Behavioral task
behavioral24
Sample
public/js/background.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
public/js/base.js
Resource
win7-20220901-en
Behavioral task
behavioral26
Sample
public/js/base.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral27
Sample
public/js/content-scripts/banner.js
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
public/js/content-scripts/banner.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral29
Sample
public/js/content-scripts/content-script.js
Resource
win7-20220901-en
Behavioral task
behavioral30
Sample
public/js/content-scripts/content-script.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
public/js/content-scripts/element-hiding.js
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
public/js/content-scripts/element-hiding.js
Resource
win10v2004-20220812-en
General
-
Target
img/Twitter.xml
-
Size
20KB
-
MD5
bef487f0d21048dd3cebb38cb7e5e347
-
SHA1
9e5dc5871ac9347b017a0800822c78ced91659ad
-
SHA256
5930ac428fbe704f3b697937b1f78d5392be2f6ecbb398e5257a0c065179cc47
-
SHA512
824ffca3afa1f6283377c93f8ff41a6eb118daeb305b412efb1387010ac3fe05cdd43d18887112525177eb9dc5583c83ddee93ff2e29a9fb5c2c2996b5692c74
-
SSDEEP
384:s2ket0N3PaY8ncMbQFagp7vw6CCtQeT27WWGFReQh7lXmIz:sjet0ZaPUFtvie27QRBplz
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ad5ce1a10ad901 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b84b71525aa5f84b9189cfa25dbedc5d00000000020000000000106600000001000020000000a11439450617bfef2473dddcc311dea23f7e216af8f0de5d042fa5190e18af2c000000000e800000000200002000000025764e29ba8d6a9ff89428ef4efa4a248a208cd870659f69225a643c1b366eff200000003f194cf119c49ef20439d2836df793c5508d310f8bd02bc9143566cd9928f0564000000063be28713d2203e2f81b16783682ba3d8171f1f102cb1e1a38c330fb023b6d0bd6da98ef74ad1ff6d72d321edd0f1a257ce18571c8e4ced14ed16cbcc4546fae IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377226804" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{02A3A871-7695-11ED-8B0A-7A3897842414} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1108 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1108 IEXPLORE.EXE 1108 IEXPLORE.EXE 944 IEXPLORE.EXE 944 IEXPLORE.EXE 944 IEXPLORE.EXE 944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1116 1720 MSOXMLED.EXE 27 PID 1720 wrote to memory of 1116 1720 MSOXMLED.EXE 27 PID 1720 wrote to memory of 1116 1720 MSOXMLED.EXE 27 PID 1720 wrote to memory of 1116 1720 MSOXMLED.EXE 27 PID 1116 wrote to memory of 1108 1116 iexplore.exe 28 PID 1116 wrote to memory of 1108 1116 iexplore.exe 28 PID 1116 wrote to memory of 1108 1116 iexplore.exe 28 PID 1116 wrote to memory of 1108 1116 iexplore.exe 28 PID 1108 wrote to memory of 944 1108 IEXPLORE.EXE 29 PID 1108 wrote to memory of 944 1108 IEXPLORE.EXE 29 PID 1108 wrote to memory of 944 1108 IEXPLORE.EXE 29 PID 1108 wrote to memory of 944 1108 IEXPLORE.EXE 29
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\img\Twitter.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1108 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:944
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
595B
MD58f86f6bf8f2dd5f4651f6353b1c9864a
SHA152f5edba050aac1a1c7cd0f89c53e098db42cc1b
SHA256e36abd4b9448ebe0f4129877227de5a924f6c5a9b3ece2477c65e4637a7a9aa4
SHA5121835306c8c6212b1932b222ea014473c5903b5882f008a06cedaab3a4aa1f0aab85364d9813315328360037c5991744fab12bc682b2231f847abf1168dd82150