Overview
overview
4Static
static
4BINDInstall.exe
windows7-x64
1BINDInstall.exe
windows10-2004-x64
1Bv9ARM.ch01.html
windows7-x64
1Bv9ARM.ch01.html
windows10-2004-x64
1Bv9ARM.ch02.html
windows7-x64
1Bv9ARM.ch02.html
windows10-2004-x64
1Bv9ARM.ch03.html
windows7-x64
1Bv9ARM.ch03.html
windows10-2004-x64
1Bv9ARM.ch04.html
windows7-x64
1Bv9ARM.ch04.html
windows10-2004-x64
1Bv9ARM.ch05.html
windows7-x64
1Bv9ARM.ch05.html
windows10-2004-x64
1Bv9ARM.ch06.html
windows7-x64
1Bv9ARM.ch06.html
windows10-2004-x64
1Bv9ARM.ch07.html
windows7-x64
1Bv9ARM.ch07.html
windows10-2004-x64
1Bv9ARM.ch08.html
windows7-x64
1Bv9ARM.ch08.html
windows10-2004-x64
1Bv9ARM.ch09.html
windows7-x64
1Bv9ARM.ch09.html
windows10-2004-x64
1Bv9ARM.ch10.html
windows7-x64
1Bv9ARM.ch10.html
windows10-2004-x64
1Bv9ARM.ch11.html
windows7-x64
1Bv9ARM.ch11.html
windows10-2004-x64
1Bv9ARM.ch12.html
windows7-x64
1Bv9ARM.ch12.html
windows10-2004-x64
1Bv9ARM.ch13.html
windows7-x64
1Bv9ARM.ch13.html
windows10-2004-x64
1Bv9ARM.html
windows7-x64
1Bv9ARM.html
windows10-2004-x64
1Bv9ARM.pdf
windows7-x64
1Bv9ARM.pdf
windows10-2004-x64
1Analysis
-
max time kernel
195s -
max time network
194s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
07/11/2023, 14:43
Behavioral task
behavioral1
Sample
BINDInstall.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
BINDInstall.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral3
Sample
Bv9ARM.ch01.html
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
Bv9ARM.ch01.html
Resource
win10v2004-20231025-en
Behavioral task
behavioral5
Sample
Bv9ARM.ch02.html
Resource
win7-20231023-en
Behavioral task
behavioral6
Sample
Bv9ARM.ch02.html
Resource
win10v2004-20231025-en
Behavioral task
behavioral7
Sample
Bv9ARM.ch03.html
Resource
win7-20231025-en
Behavioral task
behavioral8
Sample
Bv9ARM.ch03.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
Bv9ARM.ch04.html
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
Bv9ARM.ch04.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral11
Sample
Bv9ARM.ch05.html
Resource
win7-20231020-en
Behavioral task
behavioral12
Sample
Bv9ARM.ch05.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral13
Sample
Bv9ARM.ch06.html
Resource
win7-20231023-en
Behavioral task
behavioral14
Sample
Bv9ARM.ch06.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral15
Sample
Bv9ARM.ch07.html
Resource
win7-20231020-en
Behavioral task
behavioral16
Sample
Bv9ARM.ch07.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral17
Sample
Bv9ARM.ch08.html
Resource
win7-20231023-en
Behavioral task
behavioral18
Sample
Bv9ARM.ch08.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
Bv9ARM.ch09.html
Resource
win7-20231020-en
Behavioral task
behavioral20
Sample
Bv9ARM.ch09.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
Bv9ARM.ch10.html
Resource
win7-20231020-en
Behavioral task
behavioral22
Sample
Bv9ARM.ch10.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral23
Sample
Bv9ARM.ch11.html
Resource
win7-20231023-en
Behavioral task
behavioral24
Sample
Bv9ARM.ch11.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral25
Sample
Bv9ARM.ch12.html
Resource
win7-20231023-en
Behavioral task
behavioral26
Sample
Bv9ARM.ch12.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral27
Sample
Bv9ARM.ch13.html
Resource
win7-20231023-en
Behavioral task
behavioral28
Sample
Bv9ARM.ch13.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral29
Sample
Bv9ARM.html
Resource
win7-20231020-en
Behavioral task
behavioral30
Sample
Bv9ARM.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral31
Sample
Bv9ARM.pdf
Resource
win7-20231020-en
Behavioral task
behavioral32
Sample
Bv9ARM.pdf
Resource
win10v2004-20231023-en
General
-
Target
Bv9ARM.ch03.html
-
Size
28KB
-
MD5
f87038b709268a043ca93337fef75700
-
SHA1
d38065c55d297e3272d619a70038174809adbea2
-
SHA256
20bac551162130076b3a8e6a7c5d195058c327d397579befca07c6fd389e5058
-
SHA512
cfef71f1dcdbf32cb3500cf213c1ed96cbd6cde600914740c078c17aaa06c10239f082030b35017f3f8945b0bae5b9f499d66f0a3936e0e1c138237a91619785
-
SSDEEP
384:nyvOtdYSEM/tRfDYxJCIbdjSO7vzpkjLTq7afdbYG7ReERCqha:n0O/tuxzbdjxvijhfdvRCN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002e1e81ecbc95de49994f369c3e71718400000000020000000000106600000001000020000000dbc03d01ae16f050a821cdb67b411e66a137a8710e8aabcf5f8eba336b254248000000000e80000000020000200000006422255f306f353d00c8862c2e04d1b149b58f78a060b2e954d7f7210bc91e1320000000896ff4c4cd02376743f518aead0531071beca7ade193a7afd65c8f8540456f8c40000000ef9b668a3675d830b02fe4f7503d4d6dbeb8fb028c2ad19a4d57304f131a990f9fe530cd9396c3ae95b90cf2877a7679bcf64d588ba835ec6ff9be462a084384 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00f5b2676112da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{882327B1-7E54-11EE-AF87-7A1D39B0C785} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "405623073" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2824 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2824 iexplore.exe 2824 iexplore.exe 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2900 2824 iexplore.exe 30 PID 2824 wrote to memory of 2900 2824 iexplore.exe 30 PID 2824 wrote to memory of 2900 2824 iexplore.exe 30 PID 2824 wrote to memory of 2900 2824 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Bv9ARM.ch03.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2824 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1d43e27162af2bb84cba743c53fb493
SHA147d8d70f5314c2118a1d85d6e1a10b5769faddd7
SHA256dc37f0169d9e8422ee45aabacbfc14328e7bed0ad8d4a209d1c216fd4490ac57
SHA51261ffa3c2a69c4b3eb13e62bd8d52d3732a76f87e8750d1a168cd8dc651e3295a65caa294ea98a880a05a7a5f43909f4ce7ab17a29d7756720829170f83d757bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea69e2bcc4a300a30064d7e3fc144676
SHA164bf31ae8189df9eb87e17389a79eb89bc80cf9c
SHA256d3a94d722b50abd330e5f7fdf525a68a1f2d7e8d69f404a4cba2f48f34d7d8c8
SHA5129940b09bd550175af08491b3f487c8e8e4dd8de2d78c5303c3bf55b473cf73cbde51bc088dfc8bf2f23abd0903381196f198d9214d185414bdc3ad1df811c09a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e148bcfc57a2e9b09d4177809dc2e00
SHA10a654ff133d299558e5da7186f3a985f8213816d
SHA2563916d0037aaf8c7f59f59ec531265ee113f745ba786de6593675f0dd262363d6
SHA5129f02e2a527546a1b3c68146fec73b570048fcb187b8a13e09efb1a3ea902423515fa72f9888d701b9cf93e407371262d8e7866d518815d486141a051910a5465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bb854c8dc992e1121485c56fd86bfd0
SHA172eccb073f9e7cc5621a0f2a1da06fbe66a4009d
SHA256285f13e3684e08e7a226f89568850a480b4eacb3ca001abae0168c226883431f
SHA512bf080e9273af6ff9da3d0460a0db1db1887afe83a5110b3a9698ab83c60492a8d2a2b6e4758d649fea43812c657a0fe51eac213f1f0161dde5f9726fe96b9bf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570f6c97aee4d91b9a3f6182afc553afa
SHA17ad89694113e62c68a65faf4433754e840b364ec
SHA256e087546a393b61b08ee25f719685736b36c9c67ded4440c9aeb24b5d3db61352
SHA512fa7c566ee7e5ee93ae0bc6e5efae4475db11cbecb8f2ff00da98adb2af0571728bfe71ec1f4cdfabdb9689a33cb0a5229d1268e15c32c6632d960c9215d59125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ef2e8874a9be983143d6b7b35178cb1
SHA12bb5379b6c3bf596d079f81830237328223ae103
SHA2562e03e8961a69ee14080c47e598ef513c856bdd81e2070004948e2f36954daba4
SHA512fca592441eb08bd3f5e5f3cc4acf63ceb7ee4c8720a6b48e427e5e7d4660c55955282e5eda3b294d7c0ce7cbf0f91bb389b9534ce868ce11af11c7a5980d2367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df5e056e1cde9cc66054063c1a1a0a58
SHA1137d7e2c6af10be10910cc5ac2ce897c128890b7
SHA25607a32d781bf38f4e9aee0a7052cf8d4a35b1388eaac79e0577f7dc5bc8128af9
SHA5121ccd78598bbffa7033074c0fe5600b6e631d35992088070cde4323d7960f354cd003d5fc6f43a3fc3a8044d34b4b0f1584451a5d43af0c7694fe8a5ee72bdf3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5185bef56e0fd055175b60ccf84b8cab6
SHA1f0e5da421b3761e4dd6d53754ce02a6e46383122
SHA256413749f9a5e2bf37e6ef83c9ceb5e154961d785533a512e9d296b782e1d40f64
SHA51293deb19097157a931658ed542a6ca6f6d6cee5f96026a73bd3c27ff04c718fb99df4b53743761b72452a39d534606c008069ab80c6858268404a4f8d1d3767f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b4f2f3f8516f80a35ea814dc8f4591e
SHA1a1fab133fadf6111ce27185882eca392c5a7e7fa
SHA256cec875633e463a93bc809b138f94d4633410f580d2b5fbaa5bdb2dee6a04f4d6
SHA512d45a5bc21b8ddb6721d2ff9fdd44bd499946a0b9bce6bf80f211bc00d062c4ac8c4a9f8b43d87fb5549dbdd64eef85858f5aade344e8269cdc53f463c4f780f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b029325671242108adf831a10cc19820
SHA13ba1ad218950b07d3a4a54b0a5b0b4c49183e308
SHA25657b9553702b0356ce12bb12e770f9c2fccb87c85cfdde6499bfeff0c625de387
SHA512840874e4b19974c826232b549de1d46e44e2bc9ce983e58ebc165ab5170d4b54a6c43baf8f1d946f8e19261496f62af644c541d7db7ee3cdc6b5fe20deb436cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1cfde9c6eebd1404992c7f83fb2b16e
SHA12d5272579a7afbe1232700f0dc2f2b6f5da71acf
SHA25664bd6bece2dff9293f5ac1b4059f61d31c475cbc214c6b0e012c0e75d960b81b
SHA512b8b4d8f86c2f15022a00cb45db4b9ce0c25fb814c87908b92bf53abf1ffca1647379beb0391d272417bf5075432727032f4ef77a48a677e8a1830ffc95484460
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf