Overview
overview
10Static
static
10server.exe
windows7-x64
8server.exe
windows10-2004-x64
8server.out
ubuntu-18.04-amd64
7socks.out
ubuntu-18.04-amd64
7www/system...ip2.js
windows7-x64
1www/system...ip2.js
windows10-2004-x64
1www/system...x.html
windows7-x64
1www/system...x.html
windows10-2004-x64
1www/system...ord.js
windows7-x64
1www/system...ord.js
windows10-2004-x64
1Analysis
-
max time kernel
98s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09-05-2023 04:53
Behavioral task
behavioral1
Sample
server.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
server.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
server.out
Resource
ubuntu1804-amd64-20221125-en
Behavioral task
behavioral4
Sample
socks.out
Resource
ubuntu1804-amd64-20221111-en
Behavioral task
behavioral5
Sample
www/systembc/geoip/geoip2.js
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
www/systembc/geoip/geoip2.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
www/systembc/index.html
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
www/systembc/index.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
www/systembc/password.js
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
www/systembc/password.js
Resource
win10v2004-20230220-en
General
-
Target
www/systembc/index.html
-
Size
16B
-
MD5
f5a101e1a581bd03a5709b5c36f4c9c5
-
SHA1
86548e7c6168d3d05819da7b4c4c94547bea43b5
-
SHA256
a14b2375d7042a76207b40292ea3b5dec759b9908c566d5701493e1e6b381242
-
SHA512
df6337bd65e4e4a01c256d55eb4cb11576e5b1da2c729c8b251a2f4752fb3128aa91667d58b938aec334651ea30b420a90459214f05cc70b8cda6b6d67564e9a
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a02b03423282d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6A2D55B1-EE25-11ED-BA98-CED2106B5FC8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "390372974" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006e8f12fa8cd8fd499ff2c01df6bc8a3c00000000020000000000106600000001000020000000e36a262090cd9433d759a9a8fcc70990b1f5eb4a8ab9e6c55ef587ea37960704000000000e8000000002000020000000be92e460f2345e01e00c808fc684df5d58664529290ee3050ea804bba9b6640820000000b8b4d38bf5b4b1a3492e7a712eee74a6a500fa747448b2a275a2cdc3d3382a1d400000003cb911e857be40bcd2b40a7d1375427ba11dc2dfde1742833cc3e7c2110dea7258ccb7a22cd874ade60fa4c3a2d12629f26a1c80feb31e3ac604f04915aa7a5e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1704 iexplore.exe 1704 iexplore.exe 1696 IEXPLORE.EXE 1696 IEXPLORE.EXE 1696 IEXPLORE.EXE 1696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1704 wrote to memory of 1696 1704 iexplore.exe IEXPLORE.EXE PID 1704 wrote to memory of 1696 1704 iexplore.exe IEXPLORE.EXE PID 1704 wrote to memory of 1696 1704 iexplore.exe IEXPLORE.EXE PID 1704 wrote to memory of 1696 1704 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\www\systembc\index.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1696
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab065a5ec48109d9c2e53a78cb32f659
SHA1dfac7acefef81f648b986995f96d99e85e6669d5
SHA2564c5176dc5af5979aa75921aa29a62f353ea7d0bb12650de444893dec13dc96d6
SHA5127bd7dce0693262095609310279811e61092ef9809c729d72d55116bf6f1e7d85cc29fd113e078bf49a8794280348acacd6e2f33dbb1c52d3be7cbf951af89183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51af0d0f36ad8028ae02e5e2a9d3803c8
SHA18b793f2b18f73b7edc8329d466bdb30bb664687d
SHA25652a7d834bb872115067b2149be809f2388f7817f681fb32bce2dd5160d1596a1
SHA512fbe616cb74f86fec378f8020e9b8b4dd7d25b90f70af420638a75d0daf15c0f5901c6218bc32bf821a421b32ce137b72cb50c822554cb3584f63ed496fb46a99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9605146a2e96db2dfdb680ee448aaf9
SHA1136500cb7255e944ea144f668482f7fe87a1dd45
SHA256a8312b6e25b6cbb98fbbab65c4f78d8b0ec63417ae7a12dcc0683e38e860577c
SHA5127a7331e508c8e360eb05c6aac704b38ce97af1fb2fe46d26928897a417bc7ac679e148e7926fbc5a3860549a11831bc45610e8d7a275a1581899a8263fdfef23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b596768ff66175b2dcca1a0ad7a248f
SHA124ac5385415d2e0f92f2e6004e0bd6b3691ffb79
SHA2563f5c043ea2319a0689e3ba257b01b0e23c97ca85eeeb6ac38d9b0df8a0057eca
SHA51290906e26b1b9364b5381d09c2b15183bc7054fdc63a6f3c4efe66136ba48b8f9cd0169da2872437c0f45ec5b6b815c3ebc07f7a2ced501cc90e8752255789f51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544e1928c07e462fba3dec065eef61a6d
SHA10a4aacaf11e0c918abe1af3289476581d5e2b5d4
SHA25636a7e3bab9ce1a157fc136b4ce9a4b8f2bb4aa65a7fdbe5fff6b33f15966defa
SHA512f32f927d58172f0b6e553f23f5dfc434edbd9fbcabefd195efa40b4c23c670c00fdaca7e7b03812afbb15b41ada71cb0d21b1f29a3965449bc5664206988a57f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54033a083806a4ad84481f0bc111e70a7
SHA1908e29bd32a0394cc9a139d0332f56d23e223653
SHA256f55a28e8a036af493e5d28409def5ca5fcda1c0c30806e0732df9a04ab8def70
SHA512846872388f480f8f91cb8e594b9cecbb71b140a4196540b9697e9836e45de7fad926885ab99aa4ff7f654483e747df381f25edc538528043f9febee1c08c30d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e49800dab04243d6966922c60b82742
SHA1f39f59f4e1db5ad61366f7369f693db05b8731fc
SHA2566e38e0bb720e51883d8da0d0d0a2947f786bf3ea1f3799614f713ef4b16e33be
SHA51222f05cc293dcd68bf70e5baf1ccdc093772cab2475d60983bf7afd77c0d5ffe2336f65ddea334a395f8c8ac4a4f6dedf1e08cdac931093e740aba0ef7ca46b18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a43111b24680442df4937354b14803d3
SHA17f6744b397803739de02131da2310c528b8ab5ce
SHA25692df9ad7a894f6b57d297e5d3d67fd06ecfe6fb7e28bb49f81236cd78f61ee23
SHA5120f42e54ead073718fb52c9f8eab4fe259b424f6faf57c4fe3b5c926db6f786db83a6755e110783aff6f8e634b61ee99cc83bf15f3d7ac2f00ea9b5300204e62a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f925c7bc9ebea29afbd058a5965756aa
SHA195910cb7db5268d51520d0e847c51ed22c25fa75
SHA2566426098e70a380830da0f0cbd43cd959d1c17b5ba398d4ee92d7305d22e0c80c
SHA512cfa64123e92ee6485ba9ea5536836fbf7b6e2f775ee6f33bcb8a362ffe120619d1c07af7a3ec8b3894e5ef876d2c6b356c0d286d7e8b39441cc2d7e2722269e9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VQ77JNZF\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
608B
MD527b643568d774da26f9245b50bd82f7e
SHA1791b78038e9b2e1f937548e5542a76af71e92a2a
SHA256d8c0dcff91cd1f6027e29b96d0d4c2c5d4f6723227a8a9496fadfadcd196a176
SHA51208be9e01e0a21f7f765ce249ad9a49a3df691577e10a20debb8126f4ddf1210994efb8d207694421e9ddc0902a2beadaedaa0c345cfd1efa6a5249cc0b23a689