Overview
overview
3Static
static
3Act I - Ve...da.exe
windows7-x64
1Act I - Ve...da.exe
windows10-2004-x64
1Act I - Ve...m.html
windows7-x64
1Act I - Ve...m.html
windows10-2004-x64
1Act I - Ve...47.dll
windows7-x64
3Act I - Ve...47.dll
windows10-2004-x64
1Act I - Ve...eg.dll
windows7-x64
1Act I - Ve...eg.dll
windows10-2004-x64
1Act I - Ve...GL.dll
windows7-x64
1Act I - Ve...GL.dll
windows10-2004-x64
1Act I - Ve...v2.dll
windows7-x64
3Act I - Ve...v2.dll
windows10-2004-x64
3Act I - Ve...lob.js
windows7-x64
1Act I - Ve...lob.js
windows10-2004-x64
1Act I - Ve...ron.js
windows7-x64
1Act I - Ve...ron.js
windows10-2004-x64
1Act I - Ve...GL.dll
windows7-x64
1Act I - Ve...GL.dll
windows10-2004-x64
1Act I - Ve...v2.dll
windows7-x64
1Act I - Ve...v2.dll
windows10-2004-x64
1Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
21-07-2023 06:54
Static task
static1
Behavioral task
behavioral1
Sample
Act I - Veda/Act I - Veda.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Act I - Veda/Act I - Veda.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
Act I - Veda/LICENSES.chromium.html
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
Act I - Veda/LICENSES.chromium.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
Act I - Veda/d3dcompiler_47.dll
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
Act I - Veda/d3dcompiler_47.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
Act I - Veda/ffmpeg.dll
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
Act I - Veda/ffmpeg.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
Act I - Veda/libEGL.dll
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
Act I - Veda/libEGL.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
Act I - Veda/libGLESv2.dll
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
Act I - Veda/libGLESv2.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
Act I - Veda/natives_blob.js
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
Act I - Veda/natives_blob.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral15
Sample
Act I - Veda/resources/electron.js
Resource
win7-20230712-en
Behavioral task
behavioral16
Sample
Act I - Veda/resources/electron.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral17
Sample
Act I - Veda/swiftshader/libEGL.dll
Resource
win7-20230712-en
Behavioral task
behavioral18
Sample
Act I - Veda/swiftshader/libEGL.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral19
Sample
Act I - Veda/swiftshader/libGLESv2.dll
Resource
win7-20230712-en
Behavioral task
behavioral20
Sample
Act I - Veda/swiftshader/libGLESv2.dll
Resource
win10v2004-20230703-en
General
-
Target
Act I - Veda/LICENSES.chromium.html
-
Size
2.0MB
-
MD5
2c3a756b58bf9b9d235fc48ed41bf6d6
-
SHA1
14e7d34e1f372de62a9047620c056085c570f1e0
-
SHA256
c82c4f6f822bd059e5b0dc98fdafc53de9394bac81766bbd27fc22af88f488c5
-
SHA512
b8fdeb41c6dae90d1bfe81813f77d754593664562d682bc375d3a61ba98261557d724fc2d32fedcb829af2c52f920c05e2e80fdbe30a727de4cd3b29ce0aab37
-
SSDEEP
24576:TKwBmmnLiLCkjrmr9KPocjjkUSuw6/Q0ku0:mImmLATnUs9j+04
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A69BC431-2793-11EE-A66B-6A17F358A96E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "396687535" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1020f37ca0bbd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002a91d4b999c9854dbdd04be1b9b2202d000000000200000000001066000000010000200000008059ef8805a28c0958ee57dc574e813d82e7bc1aaef20e09acb5ffa42c976399000000000e8000000002000020000000e9ac2a2d42fbd3e29ab611d10896276dbc843ea6d93aef9340aa48e14dd7b76e20000000af0310e46a6a1f314571f27c67bbf79eb21ed4c19610b453be06333c5b4582ad400000007e3f6138fbc461f2901b72fa0203da9f5c8828d4c33be2c1624bee150e0e75a9ad0432675bb819879d7bcd4c2cec425657ce6e53582e04df74b7c174f3babd6c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2332 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2332 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2332 iexplore.exe 2332 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2940 2332 iexplore.exe 28 PID 2332 wrote to memory of 2940 2332 iexplore.exe 28 PID 2332 wrote to memory of 2940 2332 iexplore.exe 28 PID 2332 wrote to memory of 2940 2332 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Act I - Veda\LICENSES.chromium.html"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2332 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f581d6b0e5a2fa39d5c758694e43827d
SHA190e8bc2a79bb02a9bc036448d21a64ffad61ab0a
SHA2561166e78fe4a71bb482ef62f85117464b85a64215f380bce90cf1a95ab0eae8a1
SHA5120609ad9c22aa17d1855aa27beae3d7a36cb78677ccc851b1242a74dda429a5c137d66322043d5e0a572242073619d516b21400b8b5200361139d84b96c32af70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a195defc2e44e934cc7e9e804a64468
SHA13fcd207f82d38a4631dbe7142bf483933e7aa2ee
SHA25652105f5b3b9cf3512be9d53b2ceefd98f574f8265b266ecd613317d1a0803b78
SHA51298ffbd9e1f5ff197b2146f7eac19d40a6bb558a2e92e1d19c549b09142e55ead95aa8773cee10effa98ea8e310566bf3ce0c0bf2b6e793bbff933d8988af0550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a0283510b3e9563d830d02df7448ffb
SHA1295a1434d0dfdb136da8228c3700b08d3417058f
SHA2568fcd8dad808ffbf9d80986a1371853ac686d442c0f2afdf6d572c8816c4dddaf
SHA5127de6dd1becd644fdfc7ca09b0cf468d5538587937f9b579b43dc52ada92604dd4645fd4ec4f8a274aa98a59ba1e44d03409f3d8f93cd426b1357191e4ccdfaea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529bda22b12375c115274200fdc2edde1
SHA1637a4ba9eb2a2da804da24943cb4a4b89016dd42
SHA256c8b632f431e8f6dde85d2ffe82bd0b4d2bac22ac38ff407847ba82959449e588
SHA512ca9e698ff71de7e428be60b406369bca5402bd9ffd50de11bf2506d8aa1a39c8ccbd70fcba0eacad6c28526bca0596194271bd6b2e1a229fc797d6c9c4ca9fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf4178b84bd90f9546225c7466cea8c9
SHA168ee8c3c135ac942ee3600b4b888068a92c41103
SHA256b80eadff114681a23b143a1d4e43976477bb1825cbef8e7be6b8d7ed45d93df1
SHA5120c3afee84cb77ec8ba4514092e50974ce6c7e066fb6d5eda7950836099075daff5cd10fd69990be9482dc6e95dc64d433962bead352fc724e913982db8e93938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5900f81480d2b85c191ee99b37571dc68
SHA1fb8066c1adc3c958385a0601ff241f45d59d1a75
SHA256ef4e03b49c949f817641ceeadc1cffa182b56a7ededb6cf2402f62202aaf370c
SHA512fccdd80b5801d327a501d141eb7d0ed2eb5b34f1f721714f73352242bc9ce23f0ae8a0aa5e7e12cad83e8d4d3adb372aa4ceeaee803f66f0433755c4e2fef571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a9c5754f67d2f4cee3ee832ab5e3221
SHA17a52839fc7754e3335cab03fd823764ca9191d73
SHA256689ae4ee5361359d740bff786f16ecf2568f81f1a02023cbb4f5638d73abe75d
SHA512e5f9e1f0aac53707fa0f8853730347a3638bc70bec708eee445e2cd117b9711e879876d81847eac86a5d2fa627a4856c9c5f55c24d6432a4122a2fcae2122857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57499d223e333632d910768435fcc8712
SHA132b8bd7454bbf5d7cb3008641c5132b956c4896c
SHA2566a99fb31c294eb849b3de957d97684444d01a0aec5cf62dc06ee614f2ea7057c
SHA512db5468be16e2512666df6bcf6d611f32c4ffb6be83bc19654214b4768ce8a4ff7b6432a30608738a44216865c152a72b13cc2e6f814f86edca93c15113b52802
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\64WRFCMO\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
601B
MD5b055259a75f5805d2510b81a46a554f1
SHA16def85ac02fe6c5b996ae7f2d4cbf50778f6f87e
SHA25690d77d4794d6d1cf8c6a3de02bf6bf3a7a9fbd10af340f7198f70ef6af7eba83
SHA51228809966584474170828ec917bb71990649461977462efd553600dcec1d2825bf24c314f7231ea25e4eb9a3e945d17892e6e09f5801c93ecd6f7d40b18a1aeae