Overview
overview
1Static
static
1OEBPS/Text/1.html
windows7-x64
1OEBPS/Text/1.html
windows10-2004-x64
1OEBPS/Text/2.html
windows7-x64
1OEBPS/Text/2.html
windows10-2004-x64
1OEBPS/Text/3.html
windows7-x64
1OEBPS/Text/3.html
windows10-2004-x64
1OEBPS/Text/4.html
windows7-x64
1OEBPS/Text/4.html
windows10-2004-x64
1OEBPS/Text/5.html
windows7-x64
1OEBPS/Text/5.html
windows10-2004-x64
1OEBPS/Text/6-1.html
windows7-x64
1OEBPS/Text/6-1.html
windows10-2004-x64
1OEBPS/Text/6-10.html
windows7-x64
1OEBPS/Text/6-10.html
windows10-2004-x64
1OEBPS/Text/6-11.html
windows7-x64
1OEBPS/Text/6-11.html
windows10-2004-x64
1OEBPS/Text/6-12.html
windows7-x64
1OEBPS/Text/6-12.html
windows10-2004-x64
1OEBPS/Text/6-13.html
windows7-x64
1OEBPS/Text/6-13.html
windows10-2004-x64
1OEBPS/Text/6-14.html
windows7-x64
1OEBPS/Text/6-14.html
windows10-2004-x64
1OEBPS/Text/6-15.html
windows7-x64
1OEBPS/Text/6-15.html
windows10-2004-x64
1OEBPS/Text/6-16.html
windows7-x64
1OEBPS/Text/6-16.html
windows10-2004-x64
1OEBPS/Text/6-17.html
windows7-x64
1OEBPS/Text/6-17.html
windows10-2004-x64
1OEBPS/Text/6-18.html
windows7-x64
1OEBPS/Text/6-18.html
windows10-2004-x64
1OEBPS/Text/6-19.html
windows7-x64
1OEBPS/Text/6-19.html
windows10-2004-x64
1Analysis
-
max time kernel
134s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
04/11/2023, 19:11
Static task
static1
Behavioral task
behavioral1
Sample
OEBPS/Text/1.html
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
OEBPS/Text/1.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
OEBPS/Text/2.html
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
OEBPS/Text/2.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
OEBPS/Text/3.html
Resource
win7-20231023-en
Behavioral task
behavioral6
Sample
OEBPS/Text/3.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
OEBPS/Text/4.html
Resource
win7-20231023-en
Behavioral task
behavioral8
Sample
OEBPS/Text/4.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
OEBPS/Text/5.html
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
OEBPS/Text/5.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral11
Sample
OEBPS/Text/6-1.html
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
OEBPS/Text/6-1.html
Resource
win10v2004-20231025-en
Behavioral task
behavioral13
Sample
OEBPS/Text/6-10.html
Resource
win7-20231023-en
Behavioral task
behavioral14
Sample
OEBPS/Text/6-10.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral15
Sample
OEBPS/Text/6-11.html
Resource
win7-20231023-en
Behavioral task
behavioral16
Sample
OEBPS/Text/6-11.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral17
Sample
OEBPS/Text/6-12.html
Resource
win7-20231020-en
Behavioral task
behavioral18
Sample
OEBPS/Text/6-12.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral19
Sample
OEBPS/Text/6-13.html
Resource
win7-20231023-en
Behavioral task
behavioral20
Sample
OEBPS/Text/6-13.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
OEBPS/Text/6-14.html
Resource
win7-20231025-en
Behavioral task
behavioral22
Sample
OEBPS/Text/6-14.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral23
Sample
OEBPS/Text/6-15.html
Resource
win7-20231023-en
Behavioral task
behavioral24
Sample
OEBPS/Text/6-15.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral25
Sample
OEBPS/Text/6-16.html
Resource
win7-20231020-en
Behavioral task
behavioral26
Sample
OEBPS/Text/6-16.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral27
Sample
OEBPS/Text/6-17.html
Resource
win7-20231023-en
Behavioral task
behavioral28
Sample
OEBPS/Text/6-17.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral29
Sample
OEBPS/Text/6-18.html
Resource
win7-20231025-en
Behavioral task
behavioral30
Sample
OEBPS/Text/6-18.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral31
Sample
OEBPS/Text/6-19.html
Resource
win7-20231025-en
Behavioral task
behavioral32
Sample
OEBPS/Text/6-19.html
Resource
win10v2004-20231023-en
General
-
Target
OEBPS/Text/2.html
-
Size
2KB
-
MD5
8396eb3608b0203fe6146c6bc4bbc6f2
-
SHA1
a1864c1cdf5b3ce42f6a4d69390d33746b47bab0
-
SHA256
c82c57117b93ea85b61f51ded776beb44ef1705a7249165945f345ff3fcb0ed9
-
SHA512
bd4046aff03198602d5c270011cf2534063fd4fadc5609945c087fd2a56ffe255b257092e612b7cc0c9b3358bb5dd6a221755a5c734816b54e50c1ff145c3be5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{10653F31-7B46-11EE-817E-CA8DA7255242} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b03858e5520fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "405287002" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d79072038c960342ab421b8facb933e900000000020000000000106600000001000020000000fe32cd42994b01263d62b25edd979dde760227ca44d547e68407163a67407cc2000000000e80000000020000200000008996ca121891e5c8cc8f55075b2b0722ad52528480c7aa5b0a76ba2d7b68a2dd20000000c9bc7f4d0bdb9f9fe99bed2b8df6fa293cb3466686889a0111b2b040dfc702c940000000f23fdaa495d76c673da069d34134af0a3016d9c9129fde7efd8c05ab701b39ee1c990d77135e91d62f03f4030b8062e6295f491c1db872f1a5043d959caa8fdd iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 1776 IEXPLORE.EXE 1776 IEXPLORE.EXE 1776 IEXPLORE.EXE 1776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1776 2220 iexplore.exe 28 PID 2220 wrote to memory of 1776 2220 iexplore.exe 28 PID 2220 wrote to memory of 1776 2220 iexplore.exe 28 PID 2220 wrote to memory of 1776 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\OEBPS\Text\2.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565bb30a96377eb6a0e567a400234755d
SHA1fd73953c817681f183db91a6e07355fa730ccb6d
SHA25661fd48b70436ceef9759ed1efef5dfdf06b18293331b44f30b693be2ae784fd4
SHA512b09b006a81d50a034e85f87ef74b5ba663eb125d05df83488324a38a469a9adb299cff9bb90be1332fabba291b565d6a1fdc3443be7488d8ed6bc64c6a4586f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549b80bf14dd8ca5bc79425aa2ab9e091
SHA10210890dbd358e0a78fd84a9562df5beef0cd97c
SHA256d810133042a2931d7b543943400077d13e3caf858db2218b113153c3427ba228
SHA512ab668711f4ee05d8e1d4b5171486b4a53dd1b6581bf42d43a499a4c61fb0db3373ad1f33fe1b9f6985517b8c6e0deb69123541dd2f49952ab6ed6a0f75a43baf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5624af0b339c7389269804da45de1eeb6
SHA12c50233785ded6d121807e4040ebece228d33f32
SHA256e752c455376ea576c70af77ccccf36152622b9d9cd01639050f6df3736fdbd16
SHA5128f386e16c60b1d64167be20e782585ee04c5543ad8a328a30d6aaff28badf1e25308cb9e9973b0956faa4915b1240b4a7cb3b1928dbbe88a1fd98ba486857eb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5186fead91e67347a25f64d989c717105
SHA14e6ed40ff807b186b22f3c11c107722503e081ae
SHA2568133f041f6e7863e68020ad44c2ceb7dc649a4288b90c6c32e0fe9964775c7c6
SHA5124254b486e39026c2d3a06950349523dc8a2afc7baf6c760fe05f09dce46040fa69223d7aff540e6449c1aa934a4220c09c21d69a38de2c5eb46204fcc75093d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568f9a0886526dc52780c6cc7bb31907d
SHA1a5cd6f49f9592a0f99a53828b0105b6e7eff9cfd
SHA256bc051cf877c9fd8253fc16c90075672a0b69720fca1cf3f273c85b903fcaa07b
SHA5121a24cd208f6a06f1de6964f263ec57762971769eeb8dadebb2d963a171a5ae887d7307e77682e15ccb29f56a698bee080dddfc042ec235eba0c18c42ec3e82bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b75da963e7bcbf672ab6295f84023f1a
SHA135b566ce761ff646ca8770866c1c53e3598807f6
SHA2568acad5fda419485fa860d927deadc986b49a294f481f3b71950f0ba263828264
SHA5124db8f6867aec39a86985934799dd39cd205fa74dea5b27644ff563717dfe5f402fc9ed65bb37c604304b73b6791293cd7ffc5d28eb67ca17b797adb30027cbf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5219e2f2bdac35ac3a17932897ca1fc99
SHA1bf4aebbe0778cdab7c86a79023ffc452c67d0724
SHA256f52eceefa1742bd388ade462e4797e6597e3252cd67d08d7ce91c26568ef3671
SHA5128f1a94ea46c3c30ef80afc983d2e4b344f17e3c2f1d3e72ae33438132f1b3345303db3192712b99b6cd061270c7e15cc9232acbffbd50da2e7817cbdf48b0c7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bae0efae9b3c05bf8575028de872072
SHA15615c259b03a867f1448399e9d5a4ca12baad1ca
SHA25664f54996719d244afb9d6ea3f5bee77f340ca22002271dc4e76f9b3d7723e57e
SHA51261b78dd7e3052676bc0b137fdee8aae4425a245321acb5d9ce82c3c140b191e3c79ac9745b87953046ef4f3e3ed3c702438895400c5de859809a8514a8c47855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d94449add483864deac2b31dfc206a6
SHA14500b243c1ec7bef64999961cfe7264a5586f995
SHA256d5964de0d6e46da2a5cdec2b117558f2711882a58b5782f73c9681dbb52e57dc
SHA5120fca7dc88a45e749318f887e67297cc368855b936bb61199ffd6c163d625417d716906e37a0a4cacd6aab4ff9962c0b1fd03995858cfec8364300b7ed274038d
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf