Overview
overview
1Static
static
1OEBPS/Text/1.html
windows7-x64
1OEBPS/Text/1.html
windows10-2004-x64
1OEBPS/Text/2.html
windows7-x64
1OEBPS/Text/2.html
windows10-2004-x64
1OEBPS/Text/3.html
windows7-x64
1OEBPS/Text/3.html
windows10-2004-x64
1OEBPS/Text/4.html
windows7-x64
1OEBPS/Text/4.html
windows10-2004-x64
1OEBPS/Text/5.html
windows7-x64
1OEBPS/Text/5.html
windows10-2004-x64
1OEBPS/Text/6-1.html
windows7-x64
1OEBPS/Text/6-1.html
windows10-2004-x64
1OEBPS/Text/6-10.html
windows7-x64
1OEBPS/Text/6-10.html
windows10-2004-x64
1OEBPS/Text/6-11.html
windows7-x64
1OEBPS/Text/6-11.html
windows10-2004-x64
1OEBPS/Text/6-12.html
windows7-x64
1OEBPS/Text/6-12.html
windows10-2004-x64
1OEBPS/Text/6-13.html
windows7-x64
1OEBPS/Text/6-13.html
windows10-2004-x64
1OEBPS/Text/6-14.html
windows7-x64
1OEBPS/Text/6-14.html
windows10-2004-x64
1OEBPS/Text/6-15.html
windows7-x64
1OEBPS/Text/6-15.html
windows10-2004-x64
1OEBPS/Text/6-16.html
windows7-x64
1OEBPS/Text/6-16.html
windows10-2004-x64
1OEBPS/Text/6-17.html
windows7-x64
1OEBPS/Text/6-17.html
windows10-2004-x64
1OEBPS/Text/6-18.html
windows7-x64
1OEBPS/Text/6-18.html
windows10-2004-x64
1OEBPS/Text/6-19.html
windows7-x64
1OEBPS/Text/6-19.html
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
04/11/2023, 19:11
Static task
static1
Behavioral task
behavioral1
Sample
OEBPS/Text/1.html
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
OEBPS/Text/1.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
OEBPS/Text/2.html
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
OEBPS/Text/2.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
OEBPS/Text/3.html
Resource
win7-20231023-en
Behavioral task
behavioral6
Sample
OEBPS/Text/3.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
OEBPS/Text/4.html
Resource
win7-20231023-en
Behavioral task
behavioral8
Sample
OEBPS/Text/4.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
OEBPS/Text/5.html
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
OEBPS/Text/5.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral11
Sample
OEBPS/Text/6-1.html
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
OEBPS/Text/6-1.html
Resource
win10v2004-20231025-en
Behavioral task
behavioral13
Sample
OEBPS/Text/6-10.html
Resource
win7-20231023-en
Behavioral task
behavioral14
Sample
OEBPS/Text/6-10.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral15
Sample
OEBPS/Text/6-11.html
Resource
win7-20231023-en
Behavioral task
behavioral16
Sample
OEBPS/Text/6-11.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral17
Sample
OEBPS/Text/6-12.html
Resource
win7-20231020-en
Behavioral task
behavioral18
Sample
OEBPS/Text/6-12.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral19
Sample
OEBPS/Text/6-13.html
Resource
win7-20231023-en
Behavioral task
behavioral20
Sample
OEBPS/Text/6-13.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
OEBPS/Text/6-14.html
Resource
win7-20231025-en
Behavioral task
behavioral22
Sample
OEBPS/Text/6-14.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral23
Sample
OEBPS/Text/6-15.html
Resource
win7-20231023-en
Behavioral task
behavioral24
Sample
OEBPS/Text/6-15.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral25
Sample
OEBPS/Text/6-16.html
Resource
win7-20231020-en
Behavioral task
behavioral26
Sample
OEBPS/Text/6-16.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral27
Sample
OEBPS/Text/6-17.html
Resource
win7-20231023-en
Behavioral task
behavioral28
Sample
OEBPS/Text/6-17.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral29
Sample
OEBPS/Text/6-18.html
Resource
win7-20231025-en
Behavioral task
behavioral30
Sample
OEBPS/Text/6-18.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral31
Sample
OEBPS/Text/6-19.html
Resource
win7-20231025-en
Behavioral task
behavioral32
Sample
OEBPS/Text/6-19.html
Resource
win10v2004-20231023-en
General
-
Target
OEBPS/Text/1.html
-
Size
910B
-
MD5
ff25e9ef96c9537d5c17afca51a08658
-
SHA1
4e13af518998ffcfda62892d4e0b15f7f835a624
-
SHA256
c0ce6793af051e810496ccf31e9837e6856e76cc43aaf5944291c350f6518807
-
SHA512
e7d847d7cb6fc56fbfe2e9cccaa7bbe62de97ace3cabfd324342fb7d83bc15bc4f91c84d56aa700e276c3eaab3ec5b91e55e7591b8d33cb371d352779f91a76d
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b03658ec520fda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "405287014" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{17A3FBB1-7B46-11EE-AEB6-5E10D214D0C9} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002e1e81ecbc95de49994f369c3e71718400000000020000000000106600000001000020000000732de3ee504708bb90d2db46fa42f07e3ea787d9ccf3a38727d793afb18ad97e000000000e80000000020000200000009e6f98d09f89ac4a8e528c47208a1b1da7b78c377f33616e98b3c18fdf2a7b8020000000d0784a8959471eefc2bde0a8a6a3beb50ee72e494738e8c1495950289362015c400000008c4d276197cfd674604e5356fc60609ad874a89d59db114e762383e7459bcad4cadb7edd3c75a87fcf5252a1df5f7d4ccae4b7b3216fde6e3fe3709174a2bb9d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 800 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 800 iexplore.exe 800 iexplore.exe 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 800 wrote to memory of 2416 800 iexplore.exe 28 PID 800 wrote to memory of 2416 800 iexplore.exe 28 PID 800 wrote to memory of 2416 800 iexplore.exe 28 PID 800 wrote to memory of 2416 800 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\OEBPS\Text\1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:800 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6703c27144d4a2a8d3aaf28d08dae2d
SHA11052efeeaee8f4bc882533597647b1c570bc3771
SHA2564f89e8418cabb336648c937eb1205e9fdfb006b2d4476790c5d89763648bff3f
SHA5128b098efbb9073a205620302676b9d45748696be479c881d18958f2e8267d038edcfc6379e693fedc6420dbba5d4d43a17fb68187a0239f0221ebaccf5b19fe18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0f1bd933902495120a89b8d564eab8d
SHA165ea55b8725c798481f8b4fcd592115baf415af1
SHA2568dea9b560c90d87a70113bc86f2d1a5252c58e6349cb4d598de0e648b6c45dd6
SHA5123341e7b49ae6ef707a01cf7bf027d0692391608ee91ec5994f5c39a5c384dc21de7f882dd378dd67944f70384fc625d7e82b1835f34ca2455231c893bef0b3bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57236292c4505963091e48ee8759b1929
SHA123787c88ec092de36832d73fe93510eaf2e00d71
SHA25682e15460d65b85071da2e76d511d8b17b391216cdbb635d59fd7e51dee5ae6e4
SHA512adab8f3dabfdbca5020fc83a22ffa664403564d632a9561e4520c2d3dcb92e62deed2f7f09e20c4927c76f4944ed0bfa5dd3467ab8a6b5a242e019e8b5e23413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad5f88fd7cf4f22940a0545f5949b847
SHA1cc5ed5ad47fc143f89e7805853cab4e3a5f0ea3a
SHA256efd58d3e725d614b9b1729957403d6e3e959a651d1ed91b22bdd140d987b160f
SHA512fcfe66bb8d0da910fac262fd4c8a1b9beb170d6370a08dfc6a9d2674a4d50f8f7660d227e995e72937d24c3f51deae87247ca50a30ded63df548741ad97c5eba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e3233fe4c4ffd15d4b9aafca5012427
SHA132e411ad5fab56f045b4526aa39d04ddc7d76707
SHA2569f49c137cf639a8fe3784e4d3a81a0f7fd5fc08e72b27afa04f4719badb9be76
SHA512142be4ef7a6a71b3a0ab6731b9f02dafa10621345e0951dd4f36dd9b2880543811deb6b94a84f59274837949ea81d144457809b1b04999bcb1f7e59538d9029c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9347e809ed667f657feef60a38b900d
SHA153720d3bb69537b2f6ded5e54884c09c979e1ee9
SHA25648dcc41a0d748ded1520aa5d95988a6fe3313d8996da5d96a1caa08b895c41a6
SHA512a7d70ef9f0f7d7bb0dd11227b7653988f42a7ad819371057d5d2c58c970605b1d20d51eac3a012e78d0de30f962ba7797e953f1b8c4804e0610e8e32ffe1cd30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb3fc4cb77a225394228abdcf313b689
SHA132e7e4f878f325ed72e09e2ec8db13bd101469f2
SHA256a845a319b4742184bcfaa913158dc69f3112edf8794bbc6561fb53755fbb63eb
SHA512b8fe314d303424e6a0c3cd041ea866776a558f4d7f239c7ee0c72feac2b73410b01174b241a6f4352411b9fe23abe91d0b3470be049f18d9d31a23665306f4ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586360e1f1f535d6b50dd03026f90d626
SHA1b7572605696641d1620766ea72996c927df05b0e
SHA256d6c944919be4c048f61c8c2ae5105abae57dc144aa12afc0f43965ae85eb9eb3
SHA512033e42d369ee30c166f01be8a157c50b1faf2f29badf0fe6359ead75fc4e5fbe49881ca843b930488f57695484bfab07b66696ec79df0c2a38199f1d5c13ca6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569627e46ef30ece45d5405321fcb51ae
SHA17a57134d8cbd1a154bc97924a98b4fd142972fe8
SHA256ab6e11b4481ee77726ad265a034539f4d7d09a23194b3139c08929d95279a145
SHA512813cf3c97dba29e78fd0378c14463c19a8b473c9f193f379274a92cb063cd28a28a6a18c904861b89fba91fccb2ec26e2bdbead1caf339daff495738d96a0ee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac9afdac1c0bdadd9d5214c87b50bc81
SHA1535af923afda7ec7c80ce731620787bb28d92c88
SHA256dffde2a204c1545f940036c2370566be70e911ff25999cc050146bb695a3f871
SHA512e0f1d3bf3d3a88ea56649b4a9fe33269605b3d688664850201cbe012ca6db5cd8c235f743168cfb01e80063176fc4f4b9f7a06322433d0810449a010d7be615a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f7536f55276e54238f46ca7041bcce5
SHA133eb8fc91a182902674cee590630cd42f26826c1
SHA256b1e9ffbcc9eda99cc3181864e4d3f11826bd1ca3e8ebf6c9942de5ab8f570ec5
SHA512fedde21f8fde10f8414ab25ed608179b2c2c3449b389a327454b12e513d8dc52e43a7a16de66fbcba54b1564c8581104f1d879743b201ab861363bacf64a0ffa
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf