Overview
overview
7Static
static
7DefaultWsd...tor.js
windows7-x64
1DefaultWsd...tor.js
windows10-2004-x64
1fyb_iframe...l.html
windows7-x64
1fyb_iframe...l.html
windows10-2004-x64
1fyb_static...l.html
windows7-x64
1fyb_static...l.html
windows10-2004-x64
1machine.xml
windows7-x64
1machine.xml
windows10-2004-x64
1sdk_core.min.js
windows7-x64
1sdk_core.min.js
windows10-2004-x64
1settings.xml
windows7-x64
1settings.xml
windows10-2004-x64
1vpaid_html...e.html
windows7-x64
1vpaid_html...e.html
windows10-2004-x64
1web.xml
windows7-x64
1web.xml
windows10-2004-x64
1Analysis
-
max time kernel
100s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20230220-es -
resource tags
arch:x64arch:x86image:win7-20230220-eslocale:es-esos:windows7-x64systemwindows -
submitted
13-06-2023 05:08
Static task
static1
Behavioral task
behavioral1
Sample
DefaultWsdlHelpGenerator.js
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
DefaultWsdlHelpGenerator.js
Resource
win10v2004-20230220-es
Behavioral task
behavioral3
Sample
fyb_iframe_endcard_tmpl.html
Resource
win7-20230220-es
Behavioral task
behavioral4
Sample
fyb_iframe_endcard_tmpl.html
Resource
win10v2004-20230221-es
Behavioral task
behavioral5
Sample
fyb_static_endcard_tmpl.html
Resource
win7-20230220-es
Behavioral task
behavioral6
Sample
fyb_static_endcard_tmpl.html
Resource
win10v2004-20230220-es
Behavioral task
behavioral7
Sample
machine.xml
Resource
win7-20230220-es
Behavioral task
behavioral8
Sample
machine.xml
Resource
win10v2004-20230220-es
Behavioral task
behavioral9
Sample
sdk_core.min.js
Resource
win7-20230220-es
Behavioral task
behavioral10
Sample
sdk_core.min.js
Resource
win10v2004-20230221-es
Behavioral task
behavioral11
Sample
settings.xml
Resource
win7-20230220-es
Behavioral task
behavioral12
Sample
settings.xml
Resource
win10v2004-20230220-es
Behavioral task
behavioral13
Sample
vpaid_html_template.html
Resource
win7-20230220-es
Behavioral task
behavioral14
Sample
vpaid_html_template.html
Resource
win10v2004-20230220-es
Behavioral task
behavioral15
Sample
web.xml
Resource
win7-20230220-es
Behavioral task
behavioral16
Sample
web.xml
Resource
win10v2004-20230220-es
General
-
Target
fyb_iframe_endcard_tmpl.html
-
Size
520B
-
MD5
7844cba73b7b4b439b587dd501e92d82
-
SHA1
25a452bc6886d0e05d4a73da785021fd4c477a04
-
SHA256
e042e304cecd19bb6816de0150d3895e2717e66dda91f7e189610687c049dae6
-
SHA512
f54c2d7c0b265aa7c6feb18b8fb6740e01c9e3aeb19bf420d39832737fa59eed8fb959c8aa8a99c0efc87ca3399a244a918f0b4e90b0ee831a87e8afefdf2711
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000040515c1bb91e1442a68d1488536a0d500000000002000000000010660000000100002000000083bbad493cd9fdfb5f118ccb3ff8cc09e464ff2356bb767683995d55e230b5d7000000000e800000000200002000000045055a191315a6e4b47e3d492c81ed92ed4bfb0beec5e7b58326e5d5f4e27f2c20000000c9b7f3b6c384d4d5d8508edc9be1757dce085f20dd02ce943bf178caa4b64286400000002a872d52f2778e5bcec068f91b65f267c298978adf1ff31a63ad5dced101c58ce7bd2ef151c16aa899f9a6385e3cf952478ae29da5966e605227c2dd8aa9a728 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "393397951" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\es-ES = "es-ES.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7CF63511-09A8-11EE-9EE1-EA414CA8A2BA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80c30556b59dd901 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1208 iexplore.exe 1208 iexplore.exe 1000 IEXPLORE.EXE 1000 IEXPLORE.EXE 1000 IEXPLORE.EXE 1000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1208 wrote to memory of 1000 1208 iexplore.exe 29 PID 1208 wrote to memory of 1000 1208 iexplore.exe 29 PID 1208 wrote to memory of 1000 1208 iexplore.exe 29 PID 1208 wrote to memory of 1000 1208 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fyb_iframe_endcard_tmpl.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1000
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5629eaa330863fe0f7495e0979c6ec21a
SHA141278db3d58862136ba1963ad2461f6fe2bee6f9
SHA2569097bac860351e81cc226e2c9a7ffd088dce726b6278a014ead4ef6d6edc1a10
SHA512c80a74aa9af6acc9c2c1b0d949eecd8727320893437cd166fac7d6f5766b2ed16b240c9b63c7a380cfbc70dd4ea28b74242605e76ad4146d81b8a220d000c4a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5ab7c0199f9ee9fbf70cdd37424fc49
SHA103bd4160b06e9e92b6ef281150581e971b5f1321
SHA25664bd827e997e94b1e9d6f913f35dfb6bd1487faa576ad0da8ca68add7f4b4937
SHA512c7a734eefcf479e4efd0b7318600eea5a54c6092de974892a3fab6c3e67966880bd811cf4817d776c1b7f62e9ae58547285d012adabcb3fbb8f64d8e84dc130d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58387f9259a508dbc05df78417c630348
SHA18a98bea8019cfa8c4a9db70ea9c9553c8615a91c
SHA256b7ed928195298be6b9cb203ae9239a3b362213b4afb4ac0a23a689c8b9df63f8
SHA5128d14402e31ec03e645da8ee822854df10b53781ffb296179d16dda19a3da5cfc6d091999536cfb74e9e6af80fbf86ca817a1d47a5efec1d2f669839460df2bf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec2537acf08aa9159281d4729c9da9b6
SHA19b9451851dc61a1e60b408293b8f08bf60077356
SHA256e620bc2412a4439efde2b3adbdd79042431303ae49dcfa7d39b6e84655d791cd
SHA5123c1e5313d21639c105739cf03b4e57ca1257e9ae7e1b0200988454a832a1b09ad6c585a3889c05302638305a9ddb5d3ee3533a36f1d247d0aea02c57f4d6ceec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed4c01b6841ca4e1c0b3b0237aaeb247
SHA19e5568a2d903787e407741430033e0f8db683eac
SHA256825451fdf51ebd7d2298d1971ab12d7ca92c111268502ba63abd7529601be6fc
SHA51273b07829523c5ff90d717ecd3108fc1667bb7322506366401ffffeaf9c440daff9b25f071dfae2123862b47b953a26f38b07a516ed8af2f0ff69f8d85a458ded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c75e044b7bcdf891277591e30b1b38e4
SHA10f5cc0cbc0e088817d49adfa04de03b51cca071d
SHA256670882ac780196f5404b45e4d776b9c8191fdcf69158bd9bf21fcf0ad9518a27
SHA512c6c81f48d4d1465553428177e89aa9ff1bddc3259b2110e3519598a49c94cf6159d9c80964f0eae541ee51083b8747b4771b38ff1f31663df084a7a90854774b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5624085eb840e2d4fba748189c84805fe
SHA1db145d8806414160aaa91c9a2d8499179577a6d8
SHA256f2701c046a6f827b915d6fda035113b0cff81ec89cc2895d673374b08a236cfb
SHA512ea6d83c68e976cd4abb96d6d2a27aebb6ba44918362bf3463a1706aff92854b6211da4235ffad5113f66cff0566b61eea10afe5d966927ba6a1983341ed68d90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536895e42b1c4bf62fef337fda3337c1e
SHA1bbba12b519f9f6579d7cf667f4221405ee564c19
SHA256881c20054f4926b721bd4c258b88612ff2b09e122e962257027d020a1e51e025
SHA5120cf35751968480e344cbe57e7aef2dcc09552fec0cfe53b567d80064136823c322907070c60c06a46de35abf08b994e0a76e1e7438a82a09036cb4199859077a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5982f9b8a59bb549cb47efe64bc133028
SHA19b707c3952e7164d3d00526c760b28d9495c3cc9
SHA2569d22ad7a8c16c67a683c996a11c76cc4b2ebfa23335ff188fb64987627a13f7b
SHA51288ed5607043adc64df4118323ffa2ccd5a7167ccfcaeebadb6f2740a9272f56f4c03ef5a51c0838449f4a811a64b6abad147c49364cacd5e9018d46d6360a771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0c3bdcd164b783b9f6225ff7a86b6cf
SHA194f46bf6017880e889a595be6584d27dd3c77e72
SHA256cceddcb465501e48f99d4a94c54c95e04bfac41a9fc0a38fa5bae1974321529c
SHA512c047a737eddddac19cd81cbd30190f078c60e8d51b154477a95e56f7bb4ea1087e937280f1f63805bc2b76a91327000029f668a79301448b6fa89d6fbb8ea77c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UOYUJSME\suggestions[1].es-ES
Filesize18KB
MD5e2749896090665aeb9b29bce1a591a75
SHA159e05283e04c6c0252d2b75d5141ba62d73e9df9
SHA256d428ea8ca335c7cccf1e1564554d81b52fb5a1f20617aa99136cacf73354e0b7
SHA512c750e9ccb30c45e2c4844df384ee9b02b81aa4c8e576197c0811910a63376a7d60e68f964dad858ff0e46a8fd0952ddaf19c8f79f3fd05cefd7dbf2c043d52c5
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
606B
MD5e4f0f946c154b9a7eef3bcd39b607473
SHA1541ccdf9a9786fb7043c405a515b536c9f2c6266
SHA25636aa9a06a5f092fb5c40a33590f53179646763b82cefb30c84080495eeb771e7
SHA5120ee43ce354344722329af742a8dfee4909dca42272a15d0ad9751f59f1fd87a9e6b6e339bfb7cc535481e16f237f9ebb47b6f63ab07bfde15d12f41bd06261bf