Analysis
-
max time kernel
132s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
15/08/2023, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
d5b61b02bff9d995cd5a55c01b24b3031ff7acfa33fff95de608fe55f49ce3af.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
no_sleep.js
Resource
win7-20230712-en
Behavioral task
behavioral3
Sample
no_sleep.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral4
Sample
t-rex.html
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
t-rex.html
Resource
win10v2004-20230703-en
General
-
Target
t-rex.html
-
Size
80KB
-
MD5
43fb0d560330c4b5d395f7d1b00fff3d
-
SHA1
29cc06448df5855ef4d678bcc325e6a08b48afdc
-
SHA256
f4c69b06f32df0e45fe6c1a12b306fdc7f8d868454fa624c8a17771a17f5414a
-
SHA512
810ccd9d7e3132ac94b52ccadff393d8b0a71f3d7c497c9847d468c1ce70c90b968928e151b41d91f37607bb203b06085b610adfe394225e8b9deab2ba0188e1
-
SSDEEP
1536:V5OdudTTa8udsB7g1BuqHkFT5VgYzMGgbJsMPZ:Vq0y80I7OuikXm3bJsMPZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "398286012" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0d85a95a6cfd901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{917BF0B1-3B99-11EE-AFA5-5E6847EBFE3A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000015e49348610e2a42ac63317e6e4271ae00000000020000000000106600000001000020000000c827ab50a97c4d4c313553e925ac530e788b24d5ae17cf65c20b54362d0433b6000000000e8000000002000020000000839f683d94db6a9794dbeb91aac3114ffcd9086172c6c4d939a8f883250424b820000000bb80bbd7d08f17ee34a5ed38ff321ee60c668190671570b7a00debac8be95e7b40000000abb1456dac8dd64825cc855e83e7d087d5487d597a4124e399b6cdd679f10df762704a4bd8a8b4598b2f8ffbb8afe002df8dca3183e32d9289cd31a65f671a53 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1920 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1920 iexplore.exe 1920 iexplore.exe 1860 IEXPLORE.EXE 1860 IEXPLORE.EXE 1860 IEXPLORE.EXE 1860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1920 wrote to memory of 1860 1920 iexplore.exe 28 PID 1920 wrote to memory of 1860 1920 iexplore.exe 28 PID 1920 wrote to memory of 1860 1920 iexplore.exe 28 PID 1920 wrote to memory of 1860 1920 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\payload.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1920 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a371f2eddd5fdc94a674283fa8ceb83
SHA18786267d3b24f61e15d3005bd02495750dfbe6f6
SHA256b2e19b12b4ad1ba34900425bf6ae9a16ef93d49cd6d62658ff3d19d0dd17a68a
SHA51229dd54ebf939b0f3b8b7b8f0aea00a5848548e5cfa39d6cd7ce660a1a07626f44b359d010f2f23d284a761d520ca37eb95fcc3d4c7404909ec1649f72467d23a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fce2766ed64c748d08be42fb2318439
SHA147d17f6d7201c67bdc5851c6b5a14f9ce5ce0b77
SHA256f4d72d83f3a2370eb1f4eb182e7a5465afcd3979f5291f84f7ecf5e6262fc389
SHA5124771597b35343dca4f78f18e02ed6f98a4a481f041c748fae4ba1f7f941c2c030259d58a6032dc0581714cb4228c207f2a733e1606fd9d68fa02e2dfffc1d05f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5912df22bd7f9575a8d9ea57a9d3f6c2d
SHA130dbbe9d27e7026728a2574a75d792607d83e3ed
SHA256cb0c5d46314e3f4ce5979e79c3945ddc2fed6ae4adef0806e9a08b804eec6de7
SHA5128eab1b648aaf74c297e82b952a330e4f667f6be200dc821a45b64880f7e209d133b56868980109aeb26d8b76ba2ff9434e09a533586ba127eff357c7a7f24239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57008a7333a25d20f85821e8271010987
SHA1f8985f270caaac4a21916ac1f1de9d57d60384e7
SHA256cd70a7c2a2ad1dcb3a015c748854b8d37ca1f6bdd4b9be374a1979c915fcd8c5
SHA512f054437c1d43b83156be13e58dccb8168b4fb973557564651f901b3341b213da7db62dabca849c8a22c22f88864c27b7cd2c63e3713ace6e67f9c4b668e78e3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5897d9106c5f1f65b4db1276741d7b482
SHA1bc1231d74fb2b36b18af5afcb53ea04aef201db8
SHA256346519f0baa353201c25e2dc3db8389a25eaa585b5bd808d631efac1feae49c4
SHA5126070815172d9d54020d598c8106c64a0e5e38b64b33ed567151e0d0444d9b7b27d9a136d1c3f7daf120a111725e7cf7f9f837c944d5abd8d1271344e677faa53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a966508744a81e9d881b61d82504e82
SHA11fd0d0ae26def74e0c661626142f76bf2600368b
SHA2564a4a19c8a029fe059b8340d67b86f91c98fe6475bd64f7c4d662b752efb3b983
SHA512929ef6a96bffc11b50c2e07ce536007002fae6811fe67aed496221c121c3fd5438b0c6684f3406f77613c2ab6ec3f91c720ea6c2b7b21741c393a4be11de9a9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526156124880b16eb0e250799ab0322ab
SHA1396fa7b21124544c74d5dd07879ad6e380c86733
SHA2565e2f8505d8da469d04494adfab1fac6dfe574c704d3b957f26ac8cf60a2e4908
SHA512faa2c34c9e8829690a4626020a1216e5fc83d3e48f813d5ebb12c7ba8128c615fc4fcb58692f947ca9b10cfedd0d62feaaca5db56b82918e643f96c7ee66eca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5449e6d8332c2e4469035a5ad02b549b4
SHA1c52c192cdb8a01b6e357572722516775b0d98d88
SHA2566de99f3b7ad817c1d825d7bcb20b9ef2207e097dd1c321c1e86230ab10ec7c90
SHA5123411ca644c7437e543770943f54045aad4f593035928200f8c31fb1054ccb36b67bb3213cbf9e1d4f1c5976a073231c41375b6e20506dd34b389a74730422545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ba94af4ed75a869c2acd4c256c3b618
SHA115ba965b3d021a77d5263260219676ad52a5f63d
SHA256827051764f0d52e9c3c0de9fcf4fe334e51ef499acf742dd62d80f57d7466545
SHA51282d66459a32a15077963c5cf729ea27630faf1f7f1c9a1bb777f3d01fa09dce1d5359726326d1d42ecf5c89c2928e625847b580cdd7a3289ece762ed6b7f5057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511682e7e5645b61cc582d36c4657651d
SHA1d36ddb06e86b14a68ebaf48efda52bb2c707da8a
SHA2568b7b56d6393e938a719b59b0814e562f203be2088dff09f20d35f8f3fdfbed2c
SHA5127b1dde44d1bb7e4835a791306b76c7e1982ee9ee082dfb8edec1ff2f0edba77e5f4ac04334d0ed8f89949da266b91dc14069ba8bbff650d4c222fc01bf211a48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5091e95b4fb144b92bb6b8d9981ed7b04
SHA1ba51e446f8c1ff5ee65c7e76b2b2291d97cea941
SHA256415b63fa63b4a83b166ee560e7349993a3a7926b8c6eb0cf713eb600f6d46629
SHA5125eb51c1e94897c03374cedb966bf9b4ffedb06613c1e58008d7225b558be45392d766a6d79c1171281164b2d6c8b2d4cc841bccdda6a54ac3b3f2e073aba6980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f72402757441fabf89dd1712e8207df
SHA150f6011913dbf6bb051fa277e1b1b7a61eed1e69
SHA25699126d1d5f5b7747082002c4502d53dc115c0c922dace5403767e31db9c4ef62
SHA5129c4579ca5117e179e7a9e29174d40f861b6f8db91302a4e2dd760d0138c1738ba6771371c73f334cf291e4e9106d256a84ec5c79daba5429dfcad6ce7aa146d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b696d891f995f1f026c3a82ffd933802
SHA14a340c36b326e450106932652ee4293e7c8c7597
SHA25617b6385f7fb7fd33ff0152c7968faac7a654fec3fcb07dcd2c98837eeb39b7dd
SHA512450d1002acf52dacc37464d094fab32f30d7f359aa72acea397ff275279133a8aed7eed276af7b1451b73a756998d80ae316ef80abba6bbc4c356e367048d377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cf068cb70851360d956f44458cfa479
SHA124a93c7bf9cbe1fc6867ec1debe1f16dc603724d
SHA2564556f48c25e866a7711ef242e454d597d9305f67fa2f6718934e6f5df4c562df
SHA512d410ba3ef19d8a78b572b309ea5623fb73bd1ce91335a4b04b4754d5e5e94a7c1f8e84e005ec515f702497001ed7b6cf23b0e038e10754c9b91bb549a61b3804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc1549de1122b1fe26b5cd9eda702963
SHA1bf36154e6a5ac87b884c7b5ea3928a2557bc55ea
SHA2568ec5e646a411c567c731dc74717bcc1b5db428cd211781fae6e114ed9c7371b8
SHA51274fec1964f3be11481896a1aad2da3b5a5fa0aae629fe98b53ff99c2de3e6dbc6c4f4c738eb3edab10f821ceda7b78634d10f78e309f5ef9d31ea05748c5eea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583c73cda3d15a32e8e85632330f517f0
SHA1998a8d9a8be3c9136120c45bc613c41d40a5f0df
SHA256d7e37dac95ea57570d5b2ad74d97592b29daa57c2d94436d09a901c7894d7f0a
SHA512d123f4af13d4405624cdeabd83ac214a0c2f9b6eade60bb7493a97ca5b1ed57917bd433637e8c87b01712674786524460e1b702bfd756a2be7eeb1f3afd1aa44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5638f743c71d4c8a773b7d178a9140486
SHA13e7931360359da40a48372c43f319f73ae3cbc67
SHA2569fcebac3f782e329cdcf2638902f20d6317b287cac256ed9f8ef0a86a19215fa
SHA512968806a3504ed11de66cd8e9e9112d4cd957b1633e56b5693d08a29fb3d714affb9e7cbef0b1b410d094237533566e29ee34d7b9a78b6079efc2ac3f7e146784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f117f236fd50911f58b362a61e4b9ed
SHA1158ef11481742f6180c022e16cb83d724af7bb29
SHA25661023fa4b03b6dd31d9c97382b632209060a00a3c5c9b8bc394a8593ddcbcc6b
SHA5127b9ac2bf329ece6dcd71f387af97c078381d90b1df0e0a797776aa7d6779f028cc03819ef06a2f076779622942566b63c9ff95fc3db15eb52e8f4f9a07e1acbc
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27