Overview
overview
6Static
static
OpenHardwa...ls.dll
windows7-x64
1OpenHardwa...ls.dll
windows10-2004-x64
1OpenHardwa...e.html
windows7-x64
1OpenHardwa...e.html
windows10-2004-x64
1OpenHardwa...or.exe
windows7-x64
6OpenHardwa...or.exe
windows10-2004-x64
6OpenHardwa...ib.dll
windows7-x64
1OpenHardwa...ib.dll
windows10-2004-x64
1OpenHardwa...ms.dll
windows7-x64
1OpenHardwa...ms.dll
windows10-2004-x64
1OpenHardwa...ot.dll
windows7-x64
1OpenHardwa...ot.dll
windows10-2004-x64
1Analysis
-
max time kernel
97s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30/12/2022, 05:21
Static task
static1
Behavioral task
behavioral1
Sample
OpenHardwareMonitor/Aga.Controls.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
OpenHardwareMonitor/Aga.Controls.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
OpenHardwareMonitor/License.html
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
OpenHardwareMonitor/License.html
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
OpenHardwareMonitor/OpenHardwareMonitor.exe
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
OpenHardwareMonitor/OpenHardwareMonitor.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
OpenHardwareMonitor/OpenHardwareMonitorLib.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
OpenHardwareMonitor/OpenHardwareMonitorLib.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
OpenHardwareMonitor/OxyPlot.WindowsForms.dll
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
OpenHardwareMonitor/OxyPlot.WindowsForms.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
OpenHardwareMonitor/OxyPlot.dll
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
OpenHardwareMonitor/OxyPlot.dll
Resource
win10v2004-20221111-en
General
-
Target
OpenHardwareMonitor/License.html
-
Size
27KB
-
MD5
56e35fd2e011977c42260637515e7e6a
-
SHA1
1285f30ff9048f56e0bf0cb57c81f561bdc8520f
-
SHA256
b14e66270c828c445662328127f68042a1d6b17e7382e150e542a2045b1a9075
-
SHA512
a9e4886710311960367318e4b731f4401e7540b9485f38fd9a0d9abc91e154f06b2a33c7ae125aaa4272c893193cb452c75abb80d6faf6f776a85ac84d02a0d1
-
SSDEEP
768:pr/DB7dhGuEGjR9xCzYO2J4Sv85ZzAVgsq2sUh6pLkbXfrEAbzOU:ps+Ots5sDpLYXfrEA2U
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fbec07815684004d899a318f710de6af0000000002000000000010660000000100002000000066c557347b1f306947d7b1ee9ede7626f6e67ad69b68defc58b2ff8828efeda0000000000e80000000020000200000000e375360402f589a52fd0bad18ebe66602495da38b1eb472dd88079400af5a42200000006b7c2d0114d9b0655268450cac4914a7ba34fe772b731fd5b435e0ad7ff4bc5a4000000019fd77e62e20dfd90168d571ffce1fdd92c9d87a5940e02b17a70bf481f1a9688635cc6f6582ac8408123c879c9ed94c463dc0857dfd51ba2dbabc86b65bd03f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "379146304" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{49A0D141-880A-11ED-87F1-C6AD45B766F5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 206b471f171cd901 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1576 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1576 iexplore.exe 1576 iexplore.exe 268 IEXPLORE.EXE 268 IEXPLORE.EXE 268 IEXPLORE.EXE 268 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1576 wrote to memory of 268 1576 iexplore.exe 29 PID 1576 wrote to memory of 268 1576 iexplore.exe 29 PID 1576 wrote to memory of 268 1576 iexplore.exe 29 PID 1576 wrote to memory of 268 1576 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\OpenHardwareMonitor\License.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1576 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:268
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
601B
MD59d3392932984252d501faecb03337039
SHA1432752d02fbc2490814ceb640beef2e4d94b12d5
SHA256e46de54e681caacba21528a73c2a4e0979b636a8d9d7dcbc583e2deb7d85687c
SHA512cdbf39a9e5415e0d640a57e89523b5dd1b46281b94942855eb2ec646bf4eae068ca1dd1bafec221a45d1ef2403363942b236e7b926b60e444b69b84855e1b653