Overview
overview
3Static
static
3BINDInstall.exe
windows7-x64
1BINDInstall.exe
windows10-2004-x64
1Bv9ARM.ch01.html
windows7-x64
1Bv9ARM.ch01.html
windows10-2004-x64
1Bv9ARM.ch02.html
windows7-x64
1Bv9ARM.ch02.html
windows10-2004-x64
1Bv9ARM.ch03.html
windows7-x64
1Bv9ARM.ch03.html
windows10-2004-x64
1Bv9ARM.ch04.html
windows7-x64
1Bv9ARM.ch04.html
windows10-2004-x64
1Bv9ARM.ch05.html
windows7-x64
1Bv9ARM.ch05.html
windows10-2004-x64
1Bv9ARM.ch06.html
windows7-x64
1Bv9ARM.ch06.html
windows10-2004-x64
1Bv9ARM.ch07.html
windows7-x64
1Bv9ARM.ch07.html
windows10-2004-x64
1Bv9ARM.ch08.html
windows7-x64
1Bv9ARM.ch08.html
windows10-2004-x64
1Bv9ARM.ch09.html
windows7-x64
1Bv9ARM.ch09.html
windows10-2004-x64
1Bv9ARM.ch10.html
windows7-x64
1Bv9ARM.ch10.html
windows10-2004-x64
1Bv9ARM.ch11.html
windows7-x64
1Bv9ARM.ch11.html
windows10-2004-x64
1Bv9ARM.ch12.html
windows7-x64
1Bv9ARM.ch12.html
windows10-2004-x64
1Bv9ARM.ch13.html
windows7-x64
1Bv9ARM.ch13.html
windows10-2004-x64
1Bv9ARM.html
windows7-x64
1Bv9ARM.html
windows10-2004-x64
1Bv9ARM.pdf
windows7-x64
1Bv9ARM.pdf
windows10-2004-x64
1Analysis
-
max time kernel
132s -
max time network
198s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
07-11-2023 13:43
Behavioral task
behavioral1
Sample
BINDInstall.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
BINDInstall.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
Bv9ARM.ch01.html
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
Bv9ARM.ch01.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
Bv9ARM.ch02.html
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
Bv9ARM.ch02.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
Bv9ARM.ch03.html
Resource
win7-20231023-en
Behavioral task
behavioral8
Sample
Bv9ARM.ch03.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
Bv9ARM.ch04.html
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
Bv9ARM.ch04.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
Bv9ARM.ch05.html
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
Bv9ARM.ch05.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
Bv9ARM.ch06.html
Resource
win7-20231020-en
Behavioral task
behavioral14
Sample
Bv9ARM.ch06.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral15
Sample
Bv9ARM.ch07.html
Resource
win7-20231020-en
Behavioral task
behavioral16
Sample
Bv9ARM.ch07.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral17
Sample
Bv9ARM.ch08.html
Resource
win7-20231020-en
Behavioral task
behavioral18
Sample
Bv9ARM.ch08.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
Bv9ARM.ch09.html
Resource
win7-20231023-en
Behavioral task
behavioral20
Sample
Bv9ARM.ch09.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
Bv9ARM.ch10.html
Resource
win7-20231020-en
Behavioral task
behavioral22
Sample
Bv9ARM.ch10.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral23
Sample
Bv9ARM.ch11.html
Resource
win7-20231020-en
Behavioral task
behavioral24
Sample
Bv9ARM.ch11.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral25
Sample
Bv9ARM.ch12.html
Resource
win7-20231025-en
Behavioral task
behavioral26
Sample
Bv9ARM.ch12.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral27
Sample
Bv9ARM.ch13.html
Resource
win7-20231023-en
Behavioral task
behavioral28
Sample
Bv9ARM.ch13.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral29
Sample
Bv9ARM.html
Resource
win7-20231025-en
Behavioral task
behavioral30
Sample
Bv9ARM.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral31
Sample
Bv9ARM.pdf
Resource
win7-20231020-en
Behavioral task
behavioral32
Sample
Bv9ARM.pdf
Resource
win10v2004-20231023-en
General
-
Target
Bv9ARM.ch04.html
-
Size
97KB
-
MD5
d2d81a830e0431908473d28e68f2cf68
-
SHA1
6c0f5d957abc3482cb60e007fae21ea6455910c8
-
SHA256
e07fe201dfad931d17d2e18bd561e7b20e0fcad2148aaf4a16aa38368ef0a708
-
SHA512
061fa259e47068070aae50b4fa58d9dbb7c31709e869c34bcf4a975afe335790c88d6192b9b2dfdfd82dc61f23343a647d35b0a33b304d7383693b098083a7f0
-
SSDEEP
1536:n0ODx7m6CcP7s6eYcHJrc3heQO+W3cWmhWBIrBhR:n0y7m6CQe3Rm0Baz
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "405529116" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60a3ff9c8611da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000efee191c820df7499e31472656722fd500000000020000000000106600000001000020000000305149bb4953c783d70ae4f2ec93a387c1fb57bc2c33c9e34d0769d9fa57f15f000000000e800000000200002000000061892e107ec2fcf4115f59f10bddc3918c90a4cd7bd3c3d9cb290934e7f92e75200000008efd39c710749209e63377d2dce5d4830bb928349bb9b0cc8611281cd38fd6824000000055517430384ef123c8a256c8d4ebd9e90af0cfec22227aa3d9a50778d523059b213da15ca9ec9b60e37242f50753d0d49b55ce66810cb7720e670ef391c342fc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C6E53910-7D79-11EE-9AA0-7277A2B39E8A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2772 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2772 iexplore.exe 2772 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2840 2772 iexplore.exe 30 PID 2772 wrote to memory of 2840 2772 iexplore.exe 30 PID 2772 wrote to memory of 2840 2772 iexplore.exe 30 PID 2772 wrote to memory of 2840 2772 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Bv9ARM.ch04.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ee3f33fbc8bebbb9967413a265ca18f
SHA186f88ab776c4f8ece2fcef049793e76174fd55dd
SHA256ae3e7cbf0026020b6ae85c2226b7acd6e7104753ddc803d6b8f3e4a94c833ed6
SHA5129b8dd94ec393638e216193762ba9b9b334cfcf528607c68f21ec429901191c004096076bef7da6a324711cca56ec0d2f9acaeb147040387a588a603a0e2145a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59420e3f49beeb1034eaa552be1501fd1
SHA12ec51de783a950c128d2f9cc16ac5f69fe5386f7
SHA2568ed98367cd917c901b69b2466596c6a89390ed63af0c2bb9d776ffac98072bec
SHA512dc11784b721015a51b69c9f63ece374acfee740fb7dd1dcc0aa2ca2f1299c48f6a9fbbb308c6b42a409d826479908f2e764415e38158bcc27acc1eec6da9ec4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552e274b658b157f4fcba347758226bcf
SHA1dac3a1b53b28f162f3e11abdf5cec9ac4863e3c3
SHA25626cdc890cfcc95aa3996cbe8c77a918951745455aa33bebaae26c28cd01ebcd5
SHA5122bdf71b2bea640eb468cfb5bfe937a95c5996a7fda08e9596c7f13c4efae7e598ae9cdb512a950afdf8bbde12f4c88db17bd64aba8c6c2125197778150a2469d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f4ebef754fbeb5f714f4c19ee753b7a
SHA194753b2cab27eb26b8bc0f3361436c24079af32c
SHA2565eb9a025f5aaa234bb0d04d4e98041e1f040926547075e7e595cbd0e6a9d24cd
SHA5124b6bd84f2a72cabe674b8b019bd10c6bcfacf7720dafce61f9e7b76a27d1c1a0d5d4a462d2995369e5b84c837f1dbb18ba2eef1fb53254cfd1bad138cac06c1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5399c50821019cb9fb66bca5484f198af
SHA11109acd70197f546cddaae9ca7906f5ab9c448d7
SHA2564179db9958d33cd6aa1cad44d12813d1be035377ba7f71ffa60a1383ed834783
SHA512fa23dde7ae2a11e2970b6ef86b65f1cf0808914639607b7497b2dddbaf9ff797677a39a397cdd89db7778f31def48316c7dc766739cbd347494256ebfa20e391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5168ed7cad78a3830a9ccfccddf3f9bd2
SHA1aa0037bd9fe147604f37059dcdc60730d630205a
SHA256b9d9f65513bfb5a2809e4567e46e00cfa7f7ef6e34566fe5cd248d409f6dc000
SHA512b5c996e591e282df19e95b20ff77881b593f2766e04131af5388b413b99120fb666711cd9ce594dfd659172bed253523edcdd638ada3fc326f6dbc02ad03207c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1bb235540fa12c26cbdcb90ee74f442
SHA1225ef29625cc04ab18b08462131534f58bd21e02
SHA256f1445bec09d4eaab16e6f805dae2eaaa67d90958e21565723b817829c9ddadbf
SHA5125ff83fddb2a74d1bf61214b1cd0fddfef0cd02284697077f86609a2309276cec47e06be42abf6169b7f622d4d30c9c94543bbebeb82e570d01b3a8b9c39265cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef8b00e8fa1a2538411c2a17a748a332
SHA19ab903b9226bb47dfa83c106737c398263d12403
SHA256be2c72f3696744ad9a11f2df7965f34f7ff03673b8a71ccb3d502b37c7625740
SHA512d52781a5ab46698aa4dd6a429389c3ee0afe3ccab408160ce22c9fac46907a568d1439e9c53270234f5be19927845696c9fa70463e9d582b07fbb3417ca0e21a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547ed6af6bd1ddd0b97d72016d7984863
SHA19680e1fef2349d754817a9ee4f860e772d19e747
SHA2564f3cf45bf2a08d7a7a1087add7e982f729645c5e536636563260eb7d191ec547
SHA5129c346474c51cb09a00add5159f2e270e3a442b1760c1db672afa07c17d004347a7ad0ebd1f49c93c1007cfdb49f9a6a94b56ab48ed7eeed0d8658524c72dde67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52432543a74aaa8ab24972b1aaf304835
SHA1e0325524f7b7b8fbac47743df2bfeebe03b7e959
SHA256e1ee03009f6f01a889d2d6a0dc4cf9ed2208c077f39a998d36d7ad4203d1aaef
SHA51251143c409eacd753b791159fd0628f3d78dbac390467c665506080cdfdc5b7a266aa5acf27ab06c782adc3b776bc6491fcab0cee3d0abb417a14569c796609b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a67432689bf934c97e5c692049b242e1
SHA184b9eb24c23658a464662717c10d77253cbaf304
SHA256a67a4865fd797dbcfed8100015050e1719c3b9d987e9e4836008c8e605423377
SHA5120ef03688b043e34912261a98c239b5a1c6cfe129bd9f3a65a0c11d277fc43b903341b7061019752dbc41a99077470dbc38678c6ab4173978f2ed5af3b828be78
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf