Overview
overview
1Static
static
1YurunOAuth...th2.js
windows7-x64
1YurunOAuth...th2.js
windows10-2004-x64
1YurunOAuth...t.html
windows7-x64
1YurunOAuth...t.html
windows10-2004-x64
1YurunOAuth...th2.js
windows7-x64
1YurunOAuth...th2.js
windows10-2004-x64
1YurunOAuth...t.html
windows7-x64
1YurunOAuth...t.html
windows10-2004-x64
1YurunOAuth...th2.js
windows7-x64
1YurunOAuth...th2.js
windows10-2004-x64
1YurunOAuth...t.html
windows7-x64
1YurunOAuth...t.html
windows10-2004-x64
1YurunOAuth...th2.js
windows7-x64
1YurunOAuth...th2.js
windows10-2004-x64
1YurunOAuth...t.html
windows7-x64
1YurunOAuth...t.html
windows10-2004-x64
1YurunOAuth...th2.js
windows7-x64
1YurunOAuth...th2.js
windows10-2004-x64
1YurunOAuth...t.html
windows7-x64
1YurunOAuth...t.html
windows10-2004-x64
1YurunOAuth...th2.js
windows7-x64
1YurunOAuth...th2.js
windows10-2004-x64
1YurunOAuth...t.html
windows7-x64
1YurunOAuth...t.html
windows10-2004-x64
1YurunOAuth...th2.js
windows7-x64
1YurunOAuth...th2.js
windows10-2004-x64
1YurunOAuth...t.html
windows7-x64
1YurunOAuth...t.html
windows10-2004-x64
1YurunOAuth...th2.js
windows7-x64
1YurunOAuth...th2.js
windows10-2004-x64
1YurunOAuth...t.html
windows7-x64
1YurunOAuth...t.html
windows10-2004-x64
1Analysis
-
max time kernel
132s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2023, 07:35
Static task
static1
Behavioral task
behavioral1
Sample
YurunOAuthLogin-3.1.0/src/Alipay/OAuth2.js
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
YurunOAuthLogin-3.1.0/src/Alipay/OAuth2.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
YurunOAuthLogin-3.1.0/src/Alipay/loginAgent.html
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
YurunOAuthLogin-3.1.0/src/Alipay/loginAgent.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
YurunOAuthLogin-3.1.0/src/Baidu/OAuth2.js
Resource
win7-20231023-en
Behavioral task
behavioral6
Sample
YurunOAuthLogin-3.1.0/src/Baidu/OAuth2.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
YurunOAuthLogin-3.1.0/src/Baidu/loginAgent.html
Resource
win7-20231020-en
Behavioral task
behavioral8
Sample
YurunOAuthLogin-3.1.0/src/Baidu/loginAgent.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral9
Sample
YurunOAuthLogin-3.1.0/src/CSDN/OAuth2.js
Resource
win7-20231025-en
Behavioral task
behavioral10
Sample
YurunOAuthLogin-3.1.0/src/CSDN/OAuth2.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
YurunOAuthLogin-3.1.0/src/CSDN/loginAgent.html
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
YurunOAuthLogin-3.1.0/src/CSDN/loginAgent.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
YurunOAuthLogin-3.1.0/src/Coding/OAuth2.js
Resource
win7-20231023-en
Behavioral task
behavioral14
Sample
YurunOAuthLogin-3.1.0/src/Coding/OAuth2.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral15
Sample
YurunOAuthLogin-3.1.0/src/Coding/loginAgent.html
Resource
win7-20231020-en
Behavioral task
behavioral16
Sample
YurunOAuthLogin-3.1.0/src/Coding/loginAgent.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral17
Sample
YurunOAuthLogin-3.1.0/src/DingTalk/OAuth2.js
Resource
win7-20231023-en
Behavioral task
behavioral18
Sample
YurunOAuthLogin-3.1.0/src/DingTalk/OAuth2.js
Resource
win10v2004-20231025-en
Behavioral task
behavioral19
Sample
YurunOAuthLogin-3.1.0/src/DingTalk/loginAgent.html
Resource
win7-20231023-en
Behavioral task
behavioral20
Sample
YurunOAuthLogin-3.1.0/src/DingTalk/loginAgent.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
YurunOAuthLogin-3.1.0/src/FeiShu/OAuth2.js
Resource
win7-20231020-en
Behavioral task
behavioral22
Sample
YurunOAuthLogin-3.1.0/src/FeiShu/OAuth2.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral23
Sample
YurunOAuthLogin-3.1.0/src/FeiShu/loginAgent.html
Resource
win7-20231020-en
Behavioral task
behavioral24
Sample
YurunOAuthLogin-3.1.0/src/FeiShu/loginAgent.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral25
Sample
YurunOAuthLogin-3.1.0/src/GitLab/OAuth2.js
Resource
win7-20231023-en
Behavioral task
behavioral26
Sample
YurunOAuthLogin-3.1.0/src/GitLab/OAuth2.js
Resource
win10v2004-20231025-en
Behavioral task
behavioral27
Sample
YurunOAuthLogin-3.1.0/src/GitLab/loginAgent.html
Resource
win7-20231023-en
Behavioral task
behavioral28
Sample
YurunOAuthLogin-3.1.0/src/GitLab/loginAgent.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral29
Sample
YurunOAuthLogin-3.1.0/src/Gitee/OAuth2.js
Resource
win7-20231020-en
Behavioral task
behavioral30
Sample
YurunOAuthLogin-3.1.0/src/Gitee/OAuth2.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral31
Sample
YurunOAuthLogin-3.1.0/src/Gitee/loginAgent.html
Resource
win7-20231020-en
Behavioral task
behavioral32
Sample
YurunOAuthLogin-3.1.0/src/Gitee/loginAgent.html
Resource
win10v2004-20231023-en
General
-
Target
YurunOAuthLogin-3.1.0/src/GitLab/loginAgent.html
-
Size
3KB
-
MD5
8bfeb52a134e213f373462cbd1af490f
-
SHA1
c51dd99a24f9de345eb11113ce858b8850262485
-
SHA256
e486aba09124a145b2ef8deeb955340b81b2f12648fbc0902aa99440e05b85ee
-
SHA512
4fa50b3bd62c29b45c5126b9b04e755d2ea2a8eb44d99fa95b1f08daf4886b62a1f6ade64034ea0c06d16e02aa7d984ec88a93fe3590dab2fd3238bd166b90c3
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{81BE4B8D-7952-11EE-92AA-F6F16E2EEE59} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31067487" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1317637680" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31067487" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e9837fd1e4a67340aada542b866b214e0000000002000000000010660000000100002000000097da4c2867cecb2771df1a285ae182ec828b1bbea672ccf368a7d6acd0f7f1e9000000000e80000000020000200000008d48aecb6ae2a6e0549bc4e00bc60a3c86cd9c87c7441765f2c9a8837a05a36d20000000eb05bc9d63ba3f8709c8c93f1d3aa2198907ac7ac9f4b6c81e67a09b9c6bfa7c40000000ab7b0bbe903c0fafcad33405245b8254ec2c2d555c3fd4e374558658a9a1c348a1b934cd860850407280bd06bf56899bcef13c53d887ff73f9d635947ba278a1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1317637680" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c06f607c5f0dda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9011717c5f0dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e9837fd1e4a67340aada542b866b214e000000000200000000001066000000010000200000003a4504763392f5568c17953aa541ccea8074dd64dbc29eb4fea85a3ba570243b000000000e80000000020000200000008cc77c08a2d57b4482b8356f10a957fdf774d0dd381f694c15e35e3c2c71b78120000000ab1aeb9da357a9ce1e422665f51ae85562950b957d42bd70372dbbcde015d06f40000000d933e716bc1c388f09b77f3a9235f29e50794a12063e9260d23befa11c3b67364e3da6e698fe633d0e90997b9418699681591ef7f2afd8f68fceef066ac3e762 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "405675573" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1548 iexplore.exe 1548 iexplore.exe 1212 IEXPLORE.EXE 1212 IEXPLORE.EXE 1212 IEXPLORE.EXE 1212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1548 wrote to memory of 1212 1548 iexplore.exe 89 PID 1548 wrote to memory of 1212 1548 iexplore.exe 89 PID 1548 wrote to memory of 1212 1548 iexplore.exe 89
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\YurunOAuthLogin-3.1.0\src\GitLab\loginAgent.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1548 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee