Overview
overview
3Static
static
1bg/background.html
windows7-x64
1bg/background.html
windows10-2004-x64
1bg/background.js
windows7-x64
1bg/background.js
windows10-2004-x64
1config.js
windows7-x64
1config.js
windows10-2004-x64
1content_sc...ack.js
windows7-x64
1content_sc...ack.js
windows10-2004-x64
1frame/frame.html
windows7-x64
1frame/frame.html
windows10-2004-x64
1frame/frame.js
windows7-x64
1frame/frame.js
windows10-2004-x64
1helpers/alert.js
windows7-x64
1helpers/alert.js
windows10-2004-x64
1helpers/sa...ing.js
windows7-x64
1helpers/sa...ing.js
windows10-2004-x64
1helpers/utils.js
windows7-x64
1helpers/utils.js
windows10-2004-x64
1img/logo.xml
windows7-x64
1img/logo.xml
windows10-2004-x64
1img/safe-b...on.xml
windows7-x64
1img/safe-b...on.xml
windows10-2004-x64
1jquery/jqu...min.js
windows7-x64
1jquery/jqu...min.js
windows10-2004-x64
1manifest.json
windows7-x64
3manifest.json
windows10-2004-x64
3popup/popup.html
windows7-x64
1popup/popup.html
windows10-2004-x64
1popup/popup.js
windows7-x64
1popup/popup.js
windows10-2004-x64
1unsafeDomains.json
windows7-x64
3unsafeDomains.json
windows10-2004-x64
3Analysis
-
max time kernel
100s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
09-07-2023 14:29
Static task
static1
Behavioral task
behavioral1
Sample
bg/background.html
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
bg/background.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
bg/background.js
Resource
win7-20230703-en
Behavioral task
behavioral4
Sample
bg/background.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
config.js
Resource
win7-20230703-en
Behavioral task
behavioral6
Sample
config.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
content_script/onInstallCallback.js
Resource
win7-20230703-en
Behavioral task
behavioral8
Sample
content_script/onInstallCallback.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
frame/frame.html
Resource
win7-20230703-en
Behavioral task
behavioral10
Sample
frame/frame.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
frame/frame.js
Resource
win7-20230703-en
Behavioral task
behavioral12
Sample
frame/frame.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
helpers/alert.js
Resource
win7-20230703-en
Behavioral task
behavioral14
Sample
helpers/alert.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral15
Sample
helpers/safeBrowsing.js
Resource
win7-20230703-en
Behavioral task
behavioral16
Sample
helpers/safeBrowsing.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral17
Sample
helpers/utils.js
Resource
win7-20230703-en
Behavioral task
behavioral18
Sample
helpers/utils.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral19
Sample
img/logo.xml
Resource
win7-20230703-en
Behavioral task
behavioral20
Sample
img/logo.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral21
Sample
img/safe-browsing-icon.xml
Resource
win7-20230703-en
Behavioral task
behavioral22
Sample
img/safe-browsing-icon.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral23
Sample
jquery/jquery-3.6.0.min.js
Resource
win7-20230703-en
Behavioral task
behavioral24
Sample
jquery/jquery-3.6.0.min.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral25
Sample
manifest.json
Resource
win7-20230703-en
Behavioral task
behavioral26
Sample
manifest.json
Resource
win10v2004-20230703-en
Behavioral task
behavioral27
Sample
popup/popup.html
Resource
win7-20230703-en
Behavioral task
behavioral28
Sample
popup/popup.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral29
Sample
popup/popup.js
Resource
win7-20230703-en
Behavioral task
behavioral30
Sample
popup/popup.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral31
Sample
unsafeDomains.json
Resource
win7-20230703-en
Behavioral task
behavioral32
Sample
unsafeDomains.json
Resource
win10v2004-20230703-en
General
-
Target
frame/frame.html
-
Size
2KB
-
MD5
2c8a3cf06fb229986e73afe47f3f0ed4
-
SHA1
a0e9c1d60784fd52ae33881079525bdf32c37216
-
SHA256
9279a57f438c41816be6515ca740f03dc3d5a3d01cb36405fea95bf5b1ac6612
-
SHA512
8cceff055ad794e331d400365abfdca26e17fe79c7386dd6c52d746ca18c503a29efcb1bdacc78c7093ff08cfdfbe4cdffac12ddd623798e6c5ac4a214584050
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "395677984" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006c29dc726ce5b94c89351546d5dd24d400000000020000000000106600000001000020000000a7f8e916812f486d66b793a85d08b4a0764ca602e35fef5c98011d04ae0593ee000000000e8000000002000020000000d300127c1a965b5ce66bd185961ab32ebb9465904194522a3f5ba13588089b74200000004adfddb4de5bf5adc9b1506453fa75f1a326a8053644a30a4ba86cab14836580400000008d37c5f9089417803720ae68274386672a0b7ca66ef163a84673e7fbce798348f5a1843b7b8deea0e0f7501f53dded65ef06f6f75a034018f0170e158f7dd251 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B77CBB1-1E65-11EE-A5D5-725E84185631} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20e984f471b2d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2088 iexplore.exe 2088 iexplore.exe 620 IEXPLORE.EXE 620 IEXPLORE.EXE 620 IEXPLORE.EXE 620 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2088 wrote to memory of 620 2088 iexplore.exe IEXPLORE.EXE PID 2088 wrote to memory of 620 2088 iexplore.exe IEXPLORE.EXE PID 2088 wrote to memory of 620 2088 iexplore.exe IEXPLORE.EXE PID 2088 wrote to memory of 620 2088 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\frame\frame.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:620
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575208b1ad17da61eb36473484d994b0c
SHA1ffe2eefd0d0eba47f5a08eef3f73ad288cd2304b
SHA2564188d43829d1e8be4c2f1d5357a89fb2787eceb6d7447efb979bd8b3e7a8f1cf
SHA51222fc3c4f6d8f247578989ae519daf3d1739c572a57551e078f621fb0c35e41d49fdc5bf1ca3ccc854bd1be8baac562ac8ab0744525fc53b0833a988dc20c0615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51efab810191f4124f3b7e6e8c0ebe625
SHA1dd67836695e1e618d23a31683f084872b35a803a
SHA256b10cdfadf1780b16585bbd22132e356ce41ac29c29a5a12bf17033a6f40bd2bc
SHA51276e947c78abe7532c23c6a95097a291566fe358f114c43eee154df10d31e05472661992217c3345e64dfe09bf5ee3310555cbda7f51d53ba1f064d5e5ea38b6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a5dc9dccefa5d06f8ae86afb0abca40
SHA1e49f49e0cc1716f123c3be16a609d79a2c4264ec
SHA25684bda32abb1bd96fbcf0c7fa98e0a1536134c1be411e0ea3f8a2aaddbdfbd249
SHA5126bf4e0d7fb37de0c6d9ae8089cceb456c4517a420cd9dd01e2d453d7eac6097b06b071bcd96483047342b8b460f96ad54c03c89fb01ff871886ae087a7131213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aed7bcb8901fe51a663a58c9be69d93a
SHA1d2eb40fcd42f3ac474e08c2e1221217bdfd8bcbc
SHA256007aca16b5a2d907446c3275a5c6869f836ba3948be208432a2b6f83e3df0c91
SHA5121d81011d5220e08f68915824e0a1fb8fc4c9c649ace009b41be3b385aee452585f58a8b135ba330214dadfae2e75bbe2e7ab50ab3084a427b9d91146cd25aaa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acb421cacc7a9f66132e58142bcf7bfc
SHA15233c997f1dca831ef7e9a8996835f81cb0bb2d2
SHA2563ee656ee0fb3a816bc6dd18ace18c1b99bad5582795fb06113e19465e9dd41d6
SHA5120dc008e93b2357eccd25b7128b0ab86632a3015414532de7a24f68af29745487042c0102a283866663df4619e3f4f74c1f3cfce163251c54c0e43d7d3ebcda58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bed776d96d0df37ab5a55f84c877f467
SHA1a8130dd416c2ee96dd4352522814eecdd97c163f
SHA256918df35b004263eebc194852d828553bb57ff32f5e540f6ec75741bb80d3ded9
SHA51282ddc3a4f1792fb6458e549d140c6397dc32e7c1edf7add9586caca4272027f2eedcf176cf8629c40f5273c7c37194382aee3ac18f1e298b508b66adfd614fd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd8298231016b54d58945935d426043f
SHA122c739aae2ecb6b8ec5b70ff32957745510e6911
SHA256f83f832a8df2fc0e3f80e062d851aa155f4e095d22e96fe8e1ad9a6e43547a6b
SHA512e3d852296a91f0453116ba2c5832d4b522dc8fcddb9b683683a66d9df05f8d05f068168b28b630dba7327e61557b75f1a844463ccc35c512628eea90b614d8de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c22323deef5d194c26a8492bead6a198
SHA1edebc4af4c5d38f36d3cfe34049e985fa554004a
SHA2564168ed6afa3f5ad45ecf47a31fd152dd43d311e21b4bc38eb95a61caa1e17017
SHA512f38d11e650ef88a42dae72af2156353d289e2dea92753ea2f297fe5c0f40b11faf34b2be5414e8f57ab23f162243c6b3f7bf8eb385074ea6937f7a2e1076c962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ad36ad0256308b620cece7493fc39a9
SHA1a080f6dad8eb8699dc48810ab1c286c4cb9948df
SHA256ab7ea3660a301194e73519b34acb3d11a0ebf2c56c322d05ba44f54931ceab84
SHA512282b926c9cd6d1666fd7392f06f096ae03d3eda85d51c7eb3f7964f02e3c110fd14e7c8290036c3abbceb3f525e0e4ced2507c6c65359ae238ce5eddc9cbf618
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\00ANKNIC\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
596B
MD5997805300f30984a1b8bb3c08d71562e
SHA1fbd0aa4fb24dcbffbc70f551830ccba7dfe4a604
SHA2568f7c253a8e2da88a20e27f3d3ca47a6bfec98cdf2d6e0406afb5902e57c29131
SHA5127d7f1caa120de00f6b437f1d0eeff59b427ea698ab5e2f1235fcaf40100f7c75a7af5af974b54ac2799a90976aa648746d1a8fb8c9d843f2e9bc97f8f9ff6479