Analysis
-
max time kernel
66s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20/04/2023, 19:44
Static task
static1
Behavioral task
behavioral1
Sample
3GB-onlyvioletwood-videos-and-images.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3GB-onlyvioletwood-videos-and-images.html
Resource
win10v2004-20230220-en
General
-
Target
3GB-onlyvioletwood-videos-and-images.html
-
Size
93KB
-
MD5
2811f69c7ea89070527a5e6640db995a
-
SHA1
577cdee587a264c1a5928d169161b9868b573dce
-
SHA256
24008af62f4c0f4f7a399ff5d6e3dadd9d2ba3a8e9f7970fc41d310c7ee5a112
-
SHA512
575ce8091587e2528466273f50a01d632d6c9dc8f17d7970c18193216bfcabe67236c9b2be06c69a6895cc36bcb4d94623d725b749dca9721eb88727b68a406c
-
SSDEEP
1536:qBIsv7xv9WlEh3YHqL7YancG8gLGz2RNG2+zxO5pw31bfexh68XYeS7LyNX2I3mU:qWK4IpKgtF2EqO+u8HyVM/ZS8Ud
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{97D5F901-DFC4-11ED-9047-D2C9D0B8F522} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0947972d173d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "388792072" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fba6cfbdd4578d48a4e75475bed73c6a000000000200000000001066000000010000200000008da185cebf8bb8b3beeaafb749d07496d9e3b6c8d9fc433d81fe949fb204de19000000000e8000000002000020000000cfdd251a89d937516025a858359958f7a6da86437c61b4f1c1088feb8aafd2d720000000016f6b068a3ce357af86e58be72d74c6c58cc325c01d11d163a210b7bad228e140000000053cf97d6434c98d9c07a560f60558f4d936bef3d18a4386edd5feeae8cb008a3acd8bb2b3c82e2ea0a8edbf9c1be985c4126d5fb835c43ed2fe39f056efd219 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 872 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 872 AUDIODG.EXE Token: 33 872 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 872 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1424 iexplore.exe 1424 iexplore.exe 1168 IEXPLORE.EXE 1168 IEXPLORE.EXE 1168 IEXPLORE.EXE 1168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1424 wrote to memory of 1168 1424 iexplore.exe 29 PID 1424 wrote to memory of 1168 1424 iexplore.exe 29 PID 1424 wrote to memory of 1168 1424 iexplore.exe 29 PID 1424 wrote to memory of 1168 1424 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3GB-onlyvioletwood-videos-and-images.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1168
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:936
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5101⤵
- Suspicious use of AdjustPrivilegeToken
PID:872
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d832d083624513c0d7732cec354e875
SHA18d17474609687c37e0ccbbd97c6118ac0343d1eb
SHA25627523b68e7f03b0cb2c7afcd6f2a3192fc01aa7a243e3ab987ca8eb1538233f5
SHA5127743a5af988bd38e0cb7d1828e95b8f42e5d0d8e34a292217cc96d95e3ca4fcf2cd0e9dc9de40a6aa09369d7520fcaea71ec095bc96a41791e7488a138af5854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad4ada5da5ae1f5ffd957777a4550482
SHA12a4091d9f4046dec4d6a3ea3df66f3684b0eca39
SHA256c35adfb86abfcdc90a288ecfc89e334b79987b6bc935bb12746430bb1e5d0383
SHA512b1cd91e54682143235f667bdaf855c9678ba578291958088150f9000d63137f1681783651f133a1db0e82352423feb30d8e1fc78ef1494a3d28e464266591e40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c510e09a40cd7c0b24ba5d67329ba605
SHA128feee8e1de45bdc20302b93b83abb3355df8c3f
SHA25601708667d35bbe276586a27f23e805e37d2d95303303315845149dc9243c8dd3
SHA51258fd7daa983ac6f7243c2251884f04dc8aa3f58c9722993ad2b9e852b1e15cdcb82d4f86a09a4145a7e24f27fcf0ee865e0eea8b5f323c710379f1e45e8a3fa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0131ad50c1d74c92d02de682dcf2593
SHA1ad371982047cbf130a7bd88a26d7bfff042aad91
SHA256f9cc9c9d12698b1f293c27e1f3f09014818985fe24d33013f3d5dbddc8947995
SHA5125ef02c06381c8177537e8e2cf23f7da5f5a246154ba7f806ae845a02e10cab5014981428dcd4fe5d131aeb5ebe17470d3a4a3faded8227a844407a9760aadef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5130e7aad342b0a23289c960b3faea81f
SHA170205b8a759a689f8c2b1db5f215df58fb1ab0ac
SHA256bbc66c52133638e05f77847f036db983cfa3545c6fa2341ca2169dd385a6bbdf
SHA51215ddc596fbf64d7ae11ba9be6afe5f3743e3be1a559dc0ef82322f3dfc611bb33ac6387c4c3dbcda45ee5ac6d4d8f59f268fdb80919927727e05be40b1b09cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb5b266141da524a98343b1babeb4762
SHA1e966d06203ea46d9924217249d1d1d78ff6e197c
SHA256a226163c5171b4145f53e21d96bf35957987a6d0a442728bf4434fa0a5a670e7
SHA5124083ecccef1a9b0b8ce0062d143125010e434de9becde7290a891ecb99127e897beb9b71e293eaec55dc887153e279128967ad59c651e0522b86b2c3928acf7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582c425255b2fedaee080ea7256f5fc97
SHA1b0c7a52ec970733ee6bffe6bfbd040a180bb284a
SHA256dc676d01654f7ec99f90d6f07935790e607ee82282cd96194cbd39d5bb421c10
SHA512454c3598604974df7f2fce96ed483b275087d7b57868d725a8c8f689f695650724f42680c6e3512b7e3e7d0988fa96f48b66904ee2f34ebf4d628716ba4c9a46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57920fed24fcb256cb780f04a085554ed
SHA18974bc0ad187db724f447bb57f4d33ecdd48689f
SHA25650c82e459a3059c33e1ddb3147eba2c0ac10c9c1c9ece6acb632dd8aae00838d
SHA5121860596550ef676d9e0e85769500de87a0c85280fe5bd603902cce0dbbb093165efb30159ca0ce5475bdaa61f53e3305abc834bbab51a73f5a7e071cd1d8d167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edef0219553e4f0abca1e9a7a4234331
SHA11dca2c06a05d632ff1cdd7a588d3167c2ab5f0d3
SHA256177be79076321fa7dfae1bb074b409be875f0d38741691777d466cae40216d15
SHA5120f73215a9e313a9b90b87d256b43cc413f0f79f05f3539e89865a4f45eaaa815aa415e3f55387aab5af6a433dee1854227a5908bd678c92acc05737d36152986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c1b1aa7b455761da4d9ea1ed8f0ed1d
SHA1d672eeb8ac15d7717e73974f705f5f83d8ff1a97
SHA256a182f9b66e38675e36935930890330384acf6b98340baead69d4072c8fae5d9b
SHA5127b5c3c38391e58595b24d12a18fbedfd7b1ab40e6954f4ca4a5b06319fd87703b97dd42cccf774f3f50699e51f8225317a2b3247888bb9672dbb1d4336e13bf2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KIMPJA9E\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD573b4b714b42fc9a6aaefd0ae59adb009
SHA1efdaffd5b0ad21913d22001d91bf6c19ecb4ac41
SHA256c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd
SHA51273af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
600B
MD5c707dfc4153bef35cac4f8d12dd1b201
SHA1643caf8a33fe73d88a0b7120bcca472202467694
SHA256d9c3b7c4d81d1b130f8902bc8f9d07fd454594a34d6ef92c39e8028706b1ee24
SHA512385151bd07ee59bac625f2a6d07452627b553ad3f3bfaca9509672ac4f7d2f7d210795b42f959928e9ece6b9510c7eebd05ca19a1e2ab9279dcb168d85c12a26