Overview
overview
10Static
static
10server.exe
windows7-x64
8server.exe
windows10-2004-x64
8server.out
ubuntu-18.04-amd64
7socks32_tor.dll
windows7-x64
8socks32_tor.dll
windows10-2004-x64
8socks_tor.exe
windows7-x64
10socks_tor.exe
windows10-2004-x64
10www/system...ip2.js
windows7-x64
1www/system...ip2.js
windows10-2004-x64
1www/system...x.html
windows7-x64
1www/system...x.html
windows10-2004-x64
1www/system...ord.js
windows7-x64
1www/system...ord.js
windows10-2004-x64
1Analysis
-
max time kernel
100s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09-05-2023 04:53
Behavioral task
behavioral1
Sample
server.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
server.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
server.out
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral4
Sample
socks32_tor.dll
Resource
win7-20230220-en
Behavioral task
behavioral5
Sample
socks32_tor.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
socks_tor.exe
Resource
win7-20230220-en
Behavioral task
behavioral7
Sample
socks_tor.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
www/systembc/geoip/geoip2.js
Resource
win7-20230220-en
Behavioral task
behavioral9
Sample
www/systembc/geoip/geoip2.js
Resource
win10v2004-20230221-en
Behavioral task
behavioral10
Sample
www/systembc/index.html
Resource
win7-20230220-en
Behavioral task
behavioral11
Sample
www/systembc/index.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral12
Sample
www/systembc/password.js
Resource
win7-20230220-en
Behavioral task
behavioral13
Sample
www/systembc/password.js
Resource
win10v2004-20230220-en
General
-
Target
www/systembc/index.html
-
Size
16B
-
MD5
f5a101e1a581bd03a5709b5c36f4c9c5
-
SHA1
86548e7c6168d3d05819da7b4c4c94547bea43b5
-
SHA256
a14b2375d7042a76207b40292ea3b5dec759b9908c566d5701493e1e6b381242
-
SHA512
df6337bd65e4e4a01c256d55eb4cb11576e5b1da2c729c8b251a2f4752fb3128aa91667d58b938aec334651ea30b420a90459214f05cc70b8cda6b6d67564e9a
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007837404bb2ac374381d657b4bfd4f9e200000000020000000000106600000001000020000000339e63f1b72b3b4ba527ba4fa2235e126c7da76dc8d82ea87d673c891bcf74ac000000000e80000000020000200000007cd40685e22b567f234ab206afafaea14f33cd85977049ab86090820ce312db9200000001d249d31ab1504f13718827ba81ccb7ebb56427930e1829a19fe149e6378789340000000657be125e964199f19c1c7e00e3792004acf44ce6ae32be3b7e0878b4bf41649ffcda52224cf4545d945ab6ca9b4292daf9ef17d0acf619b982bc43e4b66ff47 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2F7BCA81-EE36-11ED-AC6A-6E0AA2656971} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "390380177" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c01ccc064382d901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1052 iexplore.exe 1052 iexplore.exe 580 IEXPLORE.EXE 580 IEXPLORE.EXE 580 IEXPLORE.EXE 580 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1052 wrote to memory of 580 1052 iexplore.exe IEXPLORE.EXE PID 1052 wrote to memory of 580 1052 iexplore.exe IEXPLORE.EXE PID 1052 wrote to memory of 580 1052 iexplore.exe IEXPLORE.EXE PID 1052 wrote to memory of 580 1052 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\www\systembc\index.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1052 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:580
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5b5fcc55cffd66f38d548e8b63206c5e6
SHA179db08ababfa33a4f644fa8fe337195b5aba44c7
SHA2567730df1165195dd5bb6b40d6e519b4ce07aceb03601a77bca6535d31698d4ca1
SHA512aaa17175e90dbca04f0fa753084731313e70119fef7d408b41ff4170116ab24eaee0bd05dca2cc43464b1ee920819e5ce6f6e750d97e3c4fc605f01e7ff9c649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6559165bf9b969c745b2e8c93b2b646
SHA1ca6d61e5f67860013269a4f1c70e7cb34792939b
SHA25604da412a5404643552489da8f40d1e05d8174c9a08b4e5926ef1c32992a81429
SHA5127b0793b4fc7ae672a6b5d19926b7cf3d9bdbd6d16ef6fb1fb4a78704696a0faaa27acf13ab47945a42a12f876b2be20549adea2e32187bb6e1a3ea8a36079118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9cf1398640ef25e93271b572a07f6b1
SHA1885ee5ec10186a79c947404dc0c39a9ae3ef87a9
SHA256366007e878fb472ac3398515199b9fb7aba89b70d9fdca69719ef461d0d826b3
SHA512462d638e864c8184e1f4d6075caca38f2e6bc800ccf6926d40c7138907547f07ac2ae8765e6ca7da1845b3843a285d66bddc7d301bc99ceb121ecb9540486569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a12cc2dcf885190d0307c82bcbcc1b71
SHA193315663c98aba0a326b854d7630c3ce9dd4b6f6
SHA256a84250e69b59dbf9614f326adf3b859bade2fadad0642afd47894ed5d2cbe6a1
SHA5124fe0cbce843ef064cac9b7014b2a6b935443e6687c874b2423dc88623c0528d908de5b32f8c26ac69ef912efd1ff52609a0fa1a6fcbdbb1ad3410e3dc8bffa82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2a050b3d73bc1a3d0392260943a8ee9
SHA104668fb19f8a97a90655f1b94840ba43212825c5
SHA256c0e09e0c7136a04a82c5b7c96158c7653b8069ab2f07636ab2cefabcde3c5f18
SHA5124e9dab0215e60040494270120b09a172aaf4912d8cda49c751d0ee1d00f68c558391d0bc65b1199e10c52df868abe844dc620bcfb86cba932b4d86f750820b41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db8a1876aedf17f8a1825c51fcb16b03
SHA1a1723a391e751ecd8585346671d1a83fbbd1a951
SHA25649ac44f9add866091fafc7ff277200bd7614b6f3f1b3823ec5cc3ff0581fbd1e
SHA5122bbe20b1a35fc9e9c5c9390db9ba45e04dced543195a92fdc7044781d758ecdb7c64ee16306806c3959d726421d3313b645813b6755a1abae12bc308d914f4ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d658834103cf1261d5643b9f4a833bf6
SHA18fb3299839dbea6c198aaa034a27d53bcfa6edf2
SHA256844b14d2d6559213849523274c37d838a019d2659781f80920821f1c5d570a32
SHA512b44ce1c049ab29fb5ff642f02a28931c248ea16ccd94a0314f0282008c1706fe126ab82968a63e3e9de9b853bb563c1535b9fdc66c84e114c019b5f8e6ef69be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509fd431fa6e19f16140a41299bc7f566
SHA1f7d8a74c2f30f20f3915d633338c1b479393a8d2
SHA2569859c109bed98a3767230ba02891d43aa16a0e085a2819887dcebcad1878d92b
SHA5122ff42b86d1af01eeb58254e382e1d7f94de0c2b64a82b69575a0c7b9bbc1b47a6f76e0489534f8106fca0cedf820643dbe77449304b9e48dd832215e40fc4b72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56560cd675e55f70f94edfff7ae757c77
SHA110ff157bed0931a2a26156fc0a8c3dceac04245d
SHA2565dec591a47eabd1f37903d7c7f376fdf1a14e4adc4af796cd15f9269b0496004
SHA51276bb416f2e1615cdf0c16ee410ae037cd62b5b3754084bf1344c462473a86e844f5afab3d86863ba2141737bd60b8f05ab2fcffc59fcd418ef3ec4e6867dadce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d3e08538c2694dec4eb7ec8feb7d0a2
SHA1635123cab5c079d56940502d1b6f8dd78b95924a
SHA256a631dd08169e2faa9be80725b8e99f1b0368ad4f02af2c01f01d40be03325c82
SHA512e744b70e39bf4739c4a1d74e6b65d1820cc0c2cd3e4f9c90781fedfcd55c06152ad230e646051d4a664399399c9b57312bb356646976ed273d4be982adcc6124
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UOYUJSME\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
601B
MD5d16c74a8d7fff194f053914daa1f968e
SHA19e2d51c5e0d9f2d59fee14ceef3586ef41a0f226
SHA256a36c421da45e6175af03f2517af65156fb9696692dda513c5706aa0588eed2e2
SHA512d529d8087212f70732b8c5a7549b389fd81faf6fce5c6ab89ac4a93b17dfa4f059df2bb62c2416a629b75505927368f739b69a240d6c2210259012520d6bc997