Overview
overview
3Static
static
1Microsoft....we.zip
windows7-x64
1Microsoft....we.zip
windows10-2004-x64
1AppxBlockMap.xml
windows7-x64
1AppxBlockMap.xml
windows10-2004-x64
1AppxMetada...st.xml
windows7-x64
1AppxMetada...st.xml
windows10-2004-x64
1AppxSignature.p7x
windows7-x64
3AppxSignature.p7x
windows10-2004-x64
3Microsoft....4.appx
windows7-x64
Microsoft....4.appx
windows10-2004-x64
Microsoft....4.appx
windows7-x64
Microsoft....4.appx
windows10-2004-x64
1Microsoft....6.appx
windows7-x64
Microsoft....6.appx
windows10-2004-x64
1[Content_Types].xml
windows7-x64
1[Content_Types].xml
windows10-2004-x64
1Resubmissions
25-10-2023 13:58
231025-q979cshd42 125-10-2023 13:54
231025-q72c2ahc87 325-10-2023 13:53
231025-q6ywhshc46 1Analysis
-
max time kernel
134s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
25-10-2023 13:54
Static task
static1
Behavioral task
behavioral1
Sample
Microsoft.HEVCVideoExtension_2.0.61931.0_neutral_~_8wekyb3d8bbwe.zip
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
Microsoft.HEVCVideoExtension_2.0.61931.0_neutral_~_8wekyb3d8bbwe.zip
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
AppxBlockMap.xml
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
AppxBlockMap.xml
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
AppxMetadata/AppxBundleManifest.xml
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
AppxMetadata/AppxBundleManifest.xml
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
AppxSignature.p7x
Resource
win7-20231020-en
Behavioral task
behavioral8
Sample
AppxSignature.p7x
Resource
win10v2004-20231020-en
Behavioral task
behavioral9
Sample
Microsoft.HEVCVideoExtension_8wekyb3d8bbwe.arm64.appx
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
Microsoft.HEVCVideoExtension_8wekyb3d8bbwe.arm64.appx
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
Microsoft.HEVCVideoExtension_8wekyb3d8bbwe.x64.appx
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
Microsoft.HEVCVideoExtension_8wekyb3d8bbwe.x64.appx
Resource
win10v2004-20231020-en
Behavioral task
behavioral13
Sample
Microsoft.HEVCVideoExtension_8wekyb3d8bbwe.x86.appx
Resource
win7-20231023-en
Behavioral task
behavioral14
Sample
Microsoft.HEVCVideoExtension_8wekyb3d8bbwe.x86.appx
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
[Content_Types].xml
Resource
win7-20231020-en
Behavioral task
behavioral16
Sample
[Content_Types].xml
Resource
win10v2004-20231023-en
General
-
Target
[Content_Types].xml
-
Size
469B
-
MD5
984220fba7378afbdc64f7222902a625
-
SHA1
3b7b316bed4abcd2a010a8a54c12606d272c4a3d
-
SHA256
8ae94b77a2a3a7c0123a95da7311fff3c947b0df40e003ff5ea69492e7b8eeaa
-
SHA512
41ef03d35d65ad98f1ec1d2eaf80a0e821993d193157800025252352840247dbe06816b9171c41183ffcbf7e8eca4725d5fca4f0badcfd346c6cc241277d625d
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEIEXPLORE.EXEdescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{506DFC81-733E-11EE-AB73-565D0F0BCB21} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "404404066" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009159649b912a9140bf53d83809c5b2ac0000000002000000000010660000000100002000000059dcb6ea42aa1030c52dab04c9074d4347560df2096da4c654831c890f2b1df8000000000e8000000002000020000000b2f6290ff65dca56228b9f254ad18fef6ad8cbf4363b9024f8198d1d900b0bf92000000080e5d01f120cf7ab9f6dc2110d9ba4361b6cbdd9ec6e689cd089e6f1aa94ddb8400000007571f26aa9a85065d8c92cf322f1c5fa064ebeb3c27dcdbfc2f34a0693ee4b7bbd9b7a2f38ee00e1e7959b52b6a2dd759fffae4c897d81605e4ae735ba63c73e IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60fd71254b07da01 IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
IEXPLORE.EXEpid Process 2536 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid Process 2536 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEpid Process 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
MSOXMLED.EXEiexplore.exeIEXPLORE.EXEdescription pid Process procid_target PID 2400 wrote to memory of 1756 2400 MSOXMLED.EXE 28 PID 2400 wrote to memory of 1756 2400 MSOXMLED.EXE 28 PID 2400 wrote to memory of 1756 2400 MSOXMLED.EXE 28 PID 2400 wrote to memory of 1756 2400 MSOXMLED.EXE 28 PID 1756 wrote to memory of 2536 1756 iexplore.exe 29 PID 1756 wrote to memory of 2536 1756 iexplore.exe 29 PID 1756 wrote to memory of 2536 1756 iexplore.exe 29 PID 1756 wrote to memory of 2536 1756 iexplore.exe 29 PID 2536 wrote to memory of 2692 2536 IEXPLORE.EXE 30 PID 2536 wrote to memory of 2692 2536 IEXPLORE.EXE 30 PID 2536 wrote to memory of 2692 2536 IEXPLORE.EXE 30 PID 2536 wrote to memory of 2692 2536 IEXPLORE.EXE 30
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\[Content_Types].xml"1⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2536 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5373c0d9781ed9303075976a0cb8efeed
SHA1bf87437e63fd8b2637dcdb8c866a14fc9b9ac95d
SHA25683c9d86c57faadbc722dcd35e67e9df3c9f7f248ebafd41965cf261400575c0f
SHA5128506bd78177c7f59fb076d92bd5dd68cef0145bf6f793e60969cc47e62683c4ff2fd1a5b51d74d46f7e1bf0fc694bfe8facfc8e9b4abde45520b1a73cf8e14e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507f20f7baa5dd77c0001120ac8d88d0f
SHA1b73edc8bee328c788010250f48b633b489815a97
SHA2568782f6aca5d7bd4d242318981eeafb4c815403dbce199afb1755ae7b34bdc368
SHA5126a143835ded025dadc1ddc47c1171f1a187f1d9b38f9602fcf3f4930c2c6389739473c0df10af793de571940d15290fa6db5e7213b6d0dbb05bdb3b678e08e50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a65e2e6a9b49a9ee1c97615f074aea6
SHA1705b5b52207ce5907220313ef939e412cb81a2c4
SHA2564b072e84f868b17ba543c6234f4269ba5d963b120cae2de8ee1ddb7a4811c446
SHA5127f93d12b4411797d9bce9c553cca759aec41faf27ebd4e73b8b6e893502009549288db93c30443a9afd62822b48406b387a90b82c8523fb6ffa3cac8afdcd090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557e6503c9b1c008527ad33ad852baec1
SHA1469866d0d339c321632692cfc92bd1bfb85c9b03
SHA256bfca2676ce6d860ac8668f276f829b65142800d3d125a5a1b7270b2ea56f5424
SHA5123afdbdbb3f08f25d623614b00b6f54dfd39863bc1e8b60b1d8000ab3a5d2fc41b7be3762173cf1887ba85fc9a34cdac0a78ca8f0794bb060c0e17726774fd532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5432c62478b3067e081694d2e47b25d10
SHA17f873bf36d91db2924ef2b87497c52d2fd6346c6
SHA256bfe41e19ce977b6ebc4273ddec7643e7a8cd6f0a404055b99b16e97f81524128
SHA512c1757cd82b0cf7a39a5736fab2eb651d414d952ec239871a63f73dc75c69474706c9322aa9f65b36432f6d9e5f0317e0ef9c61c39578cfd2c380006fdd821bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52171a36d04296532f84ac4f9895d9fc8
SHA13f84703e35d094e1df3481560b06f68d862829ab
SHA256ee1d8992dc653cafc95665ead7d710718afaade5a8ff482911321dd18a6e0d73
SHA5127d902541003e4313a012cd46e8e9de20dd78595ca5d3f45218eba3163d637d9f5bbfcb89daeb4551dde6272f10999e0e91bfc885a5599d7feb060e5622589a08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588fc6f67872cd7a02af386e88370736b
SHA172bb8cbebb83dda31a0b6990f66d34674f7cef27
SHA25655c2087e4dcb378ae3d718a561292f3746d296eb201f1bdac06d9e146fff1af4
SHA5122ab01ba4e1ab532384c5644bb1b600f3be1d601553aacd0d3c133f9d94cfd3efa6e9486a534b792f3c9e89460fe96b237c8d5a86a2fae3356c8e837cc0bd8309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57959295185259b23d84fd290cab8b5ce
SHA16d3f6eb28f49846e651306cdda3d4cd9abb08f71
SHA256aba5425f557fae18faa1d7933547b84b7dd2a443b28ed7a34cf265feba81d00d
SHA5128b90c4c4e311fb9817bc5f48669b93e52b3384ffdfd5ed0e092bc6f627b7da4382a875d5e0442a146821374652d040f85bda90b570cb4da2e29d0683a2a1356f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e196b79f983b202d69559ef7b55cc6e1
SHA1926f7310afdca011dda73cbc9a6bec1d57ac43df
SHA256bae0ad31ff72f8106632aeb1d20265d8071ef6f52ecbe25d2be874c5f90a1d4b
SHA512412727ba0fd26ff7b089f53bb419a392ebe6fa183597ac6df45af03e786e6fa96b21af713f2e73d17a8385ee7e94387d62911d38cd5bbc209256da6b1f45f8a4
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf