Overview
overview
1Static
static
data/constants.js
windows7-x64
1data/constants.js
windows10-2004-x64
1data/defau...ngs.js
windows7-x64
1data/defau...ngs.js
windows10-2004-x64
1data/exper...out.js
windows7-x64
1data/exper...out.js
windows10-2004-x64
1html/background.html
windows7-x64
1html/background.html
windows10-2004-x64
1html/feedback.html
windows7-x64
1html/feedback.html
windows10-2004-x64
1html/options.html
windows7-x64
1html/options.html
windows10-2004-x64
1html/popup.html
windows7-x64
1html/popup.html
windows10-2004-x64
1img/FacebookLike.xml
windows7-x64
1img/FacebookLike.xml
windows10-2004-x64
1img/FacebookShare.xml
windows7-x64
1img/FacebookShare.xml
windows10-2004-x64
1img/Twitter.xml
windows7-x64
1img/Twitter.xml
windows10-2004-x64
1img/broken...le.xml
windows7-x64
1img/broken...le.xml
windows10-2004-x64
1public/js/...und.js
windows7-x64
1public/js/...und.js
windows10-2004-x64
1public/js/base.js
windows7-x64
1public/js/base.js
windows10-2004-x64
1public/js/...ner.js
windows7-x64
1public/js/...ner.js
windows10-2004-x64
1public/js/...ipt.js
windows7-x64
1public/js/...ipt.js
windows10-2004-x64
1public/js/...ing.js
windows7-x64
1public/js/...ing.js
windows10-2004-x64
1Analysis
-
max time kernel
240s -
max time network
254s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 10:22
Static task
static1
Behavioral task
behavioral1
Sample
data/constants.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
data/constants.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
data/defaultSettings.js
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
data/defaultSettings.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
data/experiments-out.js
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
data/experiments-out.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
html/background.html
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
html/background.html
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
html/feedback.html
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
html/feedback.html
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
html/options.html
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
html/options.html
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
html/popup.html
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
html/popup.html
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
img/FacebookLike.xml
Resource
win7-20220901-en
Behavioral task
behavioral16
Sample
img/FacebookLike.xml
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
img/FacebookShare.xml
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
img/FacebookShare.xml
Resource
win10v2004-20221111-en
Behavioral task
behavioral19
Sample
img/Twitter.xml
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
img/Twitter.xml
Resource
win10v2004-20221111-en
Behavioral task
behavioral21
Sample
img/broken-bicycle.xml
Resource
win7-20221111-en
Behavioral task
behavioral22
Sample
img/broken-bicycle.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
public/js/background.js
Resource
win7-20221111-en
Behavioral task
behavioral24
Sample
public/js/background.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
public/js/base.js
Resource
win7-20220901-en
Behavioral task
behavioral26
Sample
public/js/base.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral27
Sample
public/js/content-scripts/banner.js
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
public/js/content-scripts/banner.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral29
Sample
public/js/content-scripts/content-script.js
Resource
win7-20220901-en
Behavioral task
behavioral30
Sample
public/js/content-scripts/content-script.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
public/js/content-scripts/element-hiding.js
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
public/js/content-scripts/element-hiding.js
Resource
win10v2004-20220812-en
General
-
Target
img/broken-bicycle.xml
-
Size
19KB
-
MD5
aab8b48d58c4e0f7f6845f963e1e9506
-
SHA1
6a50ea51a4e4348035bbdc0d035ec40c985e3b3b
-
SHA256
79f8e1cf48d5fdedf05b851f054a65236785caf126f81afedd675a20bf31f654
-
SHA512
ee8f58d202f75a1f054ad16b6d00a0ae31728db8dc806e0cb4748b512f1264bbf6dab682334b7598dae2d6db5afdb4e7ef2c707e9133d97d0d5b787514344f94
-
SSDEEP
384:dyPJouYqrD56FyXcFHijWjEVZaPExf0RiVB6RSSWYVKdgq:0xoM56FyXcFpjEbaAf0RiVB6RSSWYVK/
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000256ed27e8919d04f83812f84ee5c95da00000000020000000000106600000001000020000000274b4e2892e29020878075ad701301d48f3fc2df0cd0adf8c67408c6cf7aff5c000000000e800000000200002000000054ff173366513ee8aa18b97e35befc4fb96212ddf1759bf6cf8bd4fb86c76447200000004e36c93e39d212d46791b4ab03169b3e1f925ec33777b116033b2bdc470339ad400000008b17fcff4beb67ebd5ea653e44cd7137f06f6bf191e4c403f95cc784cc0062e3674314d445f7652d15c4e59157723e74ef717a147d1a453f07a09873b9fb4bfc IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0a3a53fa20ad901 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377226931" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{55F62201-7695-11ED-A005-4ED4A804E0FC} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000256ed27e8919d04f83812f84ee5c95da00000000020000000000106600000001000020000000f7e71d7d4713e5af708bf8f6e50a3733e013c1d706b750e3fde50a9e4dd8821a000000000e80000000020000200000004cf569ddccf2936d45d9834e458d659fd852ec74c140d8788b0a0c829df4f98c90000000cacdfe8b31df4f21d75dd29e25b724c4a007fd43ebce0fac119e207ccef51b1d2bf9069d2fe69fb0b855bff03a2727cd71a07f080ca599c625e3e1d72c68b2957a8b0c3ff9aa11028758b30df6ee1eac681f88a895b9ec49b2f9373743854f4d1083bbab3d9dc86b30553f542293767088114f0adb9fce1172946464927265a3fca34cfe018c375ecabac80409821c2540000000ed61e1f9ed41eaa602184eeb764f5bb528afe36a20ce747652c5dc0200431a51d17cbd3bf6cef25388836f5bd0dd05e77e42c14771de86dad55551edf1cf2125 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 672 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 672 IEXPLORE.EXE 672 IEXPLORE.EXE 296 IEXPLORE.EXE 296 IEXPLORE.EXE 296 IEXPLORE.EXE 296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 660 wrote to memory of 1884 660 MSOXMLED.EXE 29 PID 660 wrote to memory of 1884 660 MSOXMLED.EXE 29 PID 660 wrote to memory of 1884 660 MSOXMLED.EXE 29 PID 660 wrote to memory of 1884 660 MSOXMLED.EXE 29 PID 1884 wrote to memory of 672 1884 iexplore.exe 30 PID 1884 wrote to memory of 672 1884 iexplore.exe 30 PID 1884 wrote to memory of 672 1884 iexplore.exe 30 PID 1884 wrote to memory of 672 1884 iexplore.exe 30 PID 672 wrote to memory of 296 672 IEXPLORE.EXE 31 PID 672 wrote to memory of 296 672 IEXPLORE.EXE 31 PID 672 wrote to memory of 296 672 IEXPLORE.EXE 31 PID 672 wrote to memory of 296 672 IEXPLORE.EXE 31
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\img\broken-bicycle.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:672 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:296
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD50449e0444714561c9c4f4ac68e5769c1
SHA1cd0e9e376c38ab0e220df7f7abcfa29d462e999e
SHA256f67712261293e0683ae3f3fb46c4e0d7e009939485d4997f7a690dd99ceda714
SHA51244a0a74ddfc650a4b8911c292ecc5dbf7dffaaf0f9e01a6ad6328247d35ace02948faa7d68ba6bd1da1514bbd17cfdece681ff30c87749a0c5d784d23e5993eb