Overview
overview
9Static
static
9ReasonLabs.rar
windows7-x64
3ReasonLabs.rar
windows10-2004-x64
3ReasonLabs...m.html
windows7-x64
1ReasonLabs...m.html
windows10-2004-x64
1ReasonLabs...47.dll
windows7-x64
3ReasonLabs...47.dll
windows10-2004-x64
1ReasonLabs...eg.dll
windows7-x64
1ReasonLabs...eg.dll
windows10-2004-x64
1ReasonLabs...GL.dll
windows7-x64
1ReasonLabs...GL.dll
windows10-2004-x64
1ReasonLabs...v2.dll
windows7-x64
1ReasonLabs...v2.dll
windows10-2004-x64
3ReasonLabs...app.js
windows7-x64
1ReasonLabs...app.js
windows10-2004-x64
1ReasonLabs...UI.exe
windows7-x64
1ReasonLabs...UI.exe
windows10-2004-x64
1ReasonLabs...er.dll
windows7-x64
3ReasonLabs...er.dll
windows10-2004-x64
3ReasonLabs...alllog
windows7-x64
3ReasonLabs...alllog
windows10-2004-x64
3ReasonLabs...lstate
windows7-x64
3ReasonLabs...lstate
windows10-2004-x64
3ReasonLabs...wf.cat
windows7-x64
8ReasonLabs...wf.cat
windows10-2004-x64
1ReasonLabs...wf.inf
windows7-x64
1ReasonLabs...wf.inf
windows10-2004-x64
1ReasonLabs...config
windows7-x64
3ReasonLabs...config
windows10-2004-x64
3ReasonLabs...p.asar
windows7-x64
3ReasonLabs...p.asar
windows10-2004-x64
3ReasonLabs...ar.sig
windows7-x64
3ReasonLabs...ar.sig
windows10-2004-x64
3Analysis
-
max time kernel
115s -
max time network
279s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
15-03-2023 23:08
Behavioral task
behavioral1
Sample
ReasonLabs.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ReasonLabs.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
ReasonLabs/Common/Client/v1.0.7/LICENSES.chromium.html
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
ReasonLabs/Common/Client/v1.0.7/LICENSES.chromium.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
ReasonLabs/Common/Client/v1.0.7/d3dcompiler_47.dll
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
ReasonLabs/Common/Client/v1.0.7/d3dcompiler_47.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
ReasonLabs/Common/Client/v1.0.7/ffmpeg.dll
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
ReasonLabs/Common/Client/v1.0.7/ffmpeg.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
ReasonLabs/Common/Client/v1.0.7/libEGL.dll
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
ReasonLabs/Common/Client/v1.0.7/libEGL.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
ReasonLabs/Common/Client/v1.0.7/libGLESv2.dll
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
ReasonLabs/Common/Client/v1.0.7/libGLESv2.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
ReasonLabs/Common/Client/v1.0.7/resources/app.js
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
ReasonLabs/Common/Client/v1.0.7/resources/app.js
Resource
win10v2004-20230221-en
Behavioral task
behavioral15
Sample
ReasonLabs/Common/Client/v1.0.7/rsAppUI.exe
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
ReasonLabs/Common/Client/v1.0.7/rsAppUI.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
ReasonLabs/Common/Client/v1.0.7/vk_swiftshader.dll
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
ReasonLabs/Common/Client/v1.0.7/vk_swiftshader.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
ReasonLabs/DNS/rsDNSSvc.installlog
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
ReasonLabs/DNS/rsDNSSvc.installlog
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
ReasonLabs/DNS/rsDNSSvc.installstate
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
ReasonLabs/DNS/rsDNSSvc.installstate
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
ReasonLabs/DNS/rsDwf.cat
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
ReasonLabs/DNS/rsDwf.cat
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
ReasonLabs/DNS/rsDwf.inf
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
ReasonLabs/DNS/rsDwf.inf
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
ReasonLabs/DNS/rsEngine.config
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
ReasonLabs/DNS/rsEngine.config
Resource
win10v2004-20230220-en
Behavioral task
behavioral29
Sample
ReasonLabs/DNS/ui/app.asar
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
ReasonLabs/DNS/ui/app.asar
Resource
win10v2004-20230221-en
Behavioral task
behavioral31
Sample
ReasonLabs/DNS/ui/app.asar.sig
Resource
win7-20230220-en
Behavioral task
behavioral32
Sample
ReasonLabs/DNS/ui/app.asar.sig
Resource
win10v2004-20230220-en
General
-
Target
ReasonLabs/Common/Client/v1.0.7/LICENSES.chromium.html
-
Size
5.0MB
-
MD5
5201488d4139cb6976431b6bc6026e49
-
SHA1
566969157f998749e3c6b4ab6ac35097ea3a9df8
-
SHA256
5933e91a3978bac616a0cc85e67833a17cd44b7e4702c074fe2a641e0baa638c
-
SHA512
5e70a1056fbe49eb3766baefe0329f86f2c0870216d9e51dcb7849e3a0a8fa1e3e13bd66a4ea776e652e0e80bd540d700c9e219cb29b10c38146c67c31b7abb0
-
SSDEEP
12288:FetnJnVncnJnkncnpWQtnwn7n9nJnCnZnGn3eQSnqnBnununFn/nwnJnqnvnOnqi:nPDt5WXWSNkbfwVR8mfJvwH92EdpV
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c8a3886e844ee04ca528537b5bc458990000000002000000000010660000000100002000000039126831b9f40b3740d8e7d2ee2db6d5b6503fb4def1cf7c584b5388ff9f6762000000000e80000000020000200000008a5ec4c57b3362a3d68705d8df0dd486c1a18a8b34503915e129e80874954c7920000000f99ba72a3d912542b33e47b12c62865c515d340cbe1e9a094641fc9a7cab16604000000004a219af510ce3007c4eae71f080fb3bb05936e49d4628962b5ae26a6ee26448dfd469cc0f7338ca386df8ca45645b61157dd9b065608520afd0571be0b837c7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{15E639F1-C390-11ED-BA12-D2C9D0B8F522} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00888bf49c57d901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "385690889" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 876 iexplore.exe 876 iexplore.exe 276 IEXPLORE.EXE 276 IEXPLORE.EXE 276 IEXPLORE.EXE 276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 876 wrote to memory of 276 876 iexplore.exe IEXPLORE.EXE PID 876 wrote to memory of 276 876 iexplore.exe IEXPLORE.EXE PID 876 wrote to memory of 276 876 iexplore.exe IEXPLORE.EXE PID 876 wrote to memory of 276 876 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ReasonLabs\Common\Client\v1.0.7\LICENSES.chromium.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:876 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5ea6f0a1ba7f9f4cfe850b4e5c32fcc7e
SHA17ef5d4126da5a93c917ebb0b90c73b1b259df26b
SHA25620a653bba8d843e4fbe6364b9e9f28ca4a406de06b4ffdf76656bd6d66d72a06
SHA512e55ca3d9ec2459d056b70ab8f2d896002b22dcf73f60babc983467696436c4a5228cb366aca95175de8f21c3c7c5604f75990d2753592800bd50d72591498d06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD514476bdee3701de1dec6a4d670650607
SHA1e1b107ea51a2fd77bffe50e650c7b0d8f1b85a10
SHA2560afb1b7d57b7b002b2a9c830fdbec5c2a4a957b241feb79196ad3aeb22505c56
SHA512b07e1902ab56e751205ac3488579f6558d71335b9099398f37aa8c6c405be4a112654d20cb6a69ede67c276b742f3b44374ecaf67d2de4ca1baafb714deef70e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD53c6739163dd488d789dfb8effeeb0e51
SHA1accefa9990252de3b7952b928da51d9b868bdcd8
SHA256116a841c9f2fad440a1661e30353bcdb8c525eaf6ede12cc1265570fd7f5884c
SHA5121ff44ecfd09dee72b18b292fd3a12d8c66a3bfc85e95b002ee949b54793923385645d039ebdb8ee0c9211f45b24e34e7455ce939bdec9d6d1c3b4f3d72ca95da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD58108daa772b421c1652361fc72ac3937
SHA1b452fc11672dfcdcd9ca4f395cb103f385c2e105
SHA25689f6f90e5cf1b33c934ffa0297f92627da74b7e6961eeba8892d4dfc0011234e
SHA5122e2864c34e39c680618226f36339cb6b7490f93270221e1325b088b8f27a8cda1284c3244b1d5c5fc582fcb7883157140d03e3d08625987d5eca4f0efa29f7ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5d4560cc0e3165fe7387d6ca000b27cfc
SHA1c2ed0ca5a2f735f4cad48484307dacced6336f07
SHA256ef880f4f909d1bf99fe4a2efdc9c690076db834bfdb700da65c50e0eff0e678a
SHA512b2c04fe2eebb1f03fdad1c980e56181d25da22a376552810a871d1937e4f9e0a9aa8f60911677182ce67161a3211995b7dbc2fbfdc808bc9c7664e02c3cc66b2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TOS3MI7U\suggestions[1].en-USFilesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Temp\Cab7B4B.tmpFilesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\Local\Temp\Tar7D36.tmpFilesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\6Z7Y2QOH.txtFilesize
592B
MD5be2019b2bc4715c097e1d55d1085dad3
SHA194b48fb460cf9d95465e4f2400f265234d2cbe12
SHA256fc0246f35e411e070da2083e7875a2f27cf2c82a8154e3b2b9c80a1b0f0dae59
SHA51297a4f02987af863854831bdda39c671e363a55650b5c7eb7261d10867da72037fb3e83ec82e0d851e80338f204170bb8a1021517cd10863f85ef75548aab87d7