Overview
overview
4Static
static
4BINDInstall.exe
windows7-x64
1BINDInstall.exe
windows10-2004-x64
1Bv9ARM.ch01.html
windows7-x64
1Bv9ARM.ch01.html
windows10-2004-x64
1Bv9ARM.ch02.html
windows7-x64
1Bv9ARM.ch02.html
windows10-2004-x64
1Bv9ARM.ch03.html
windows7-x64
1Bv9ARM.ch03.html
windows10-2004-x64
1Bv9ARM.ch04.html
windows7-x64
1Bv9ARM.ch04.html
windows10-2004-x64
1Bv9ARM.ch05.html
windows7-x64
1Bv9ARM.ch05.html
windows10-2004-x64
1Bv9ARM.ch06.html
windows7-x64
1Bv9ARM.ch06.html
windows10-2004-x64
1Bv9ARM.ch07.html
windows7-x64
1Bv9ARM.ch07.html
windows10-2004-x64
1Bv9ARM.ch08.html
windows7-x64
1Bv9ARM.ch08.html
windows10-2004-x64
1Bv9ARM.ch09.html
windows7-x64
1Bv9ARM.ch09.html
windows10-2004-x64
1Bv9ARM.ch10.html
windows7-x64
1Bv9ARM.ch10.html
windows10-2004-x64
1Bv9ARM.html
windows7-x64
1Bv9ARM.html
windows10-2004-x64
1Bv9ARM.pdf
windows7-x64
1Bv9ARM.pdf
windows10-2004-x64
1README.vbs
windows7-x64
1README.vbs
windows10-2004-x64
1bindevt.dll
windows7-x64
1bindevt.dll
windows10-2004-x64
1dig.exe
windows7-x64
1dig.exe
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
07/11/2023, 14:43
Behavioral task
behavioral1
Sample
BINDInstall.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
BINDInstall.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
Bv9ARM.ch01.html
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
Bv9ARM.ch01.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
Bv9ARM.ch02.html
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
Bv9ARM.ch02.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
Bv9ARM.ch03.html
Resource
win7-20231020-en
Behavioral task
behavioral8
Sample
Bv9ARM.ch03.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
Bv9ARM.ch04.html
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
Bv9ARM.ch04.html
Resource
win10v2004-20231025-en
Behavioral task
behavioral11
Sample
Bv9ARM.ch05.html
Resource
win7-20231025-en
Behavioral task
behavioral12
Sample
Bv9ARM.ch05.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
Bv9ARM.ch06.html
Resource
win7-20231020-en
Behavioral task
behavioral14
Sample
Bv9ARM.ch06.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
Bv9ARM.ch07.html
Resource
win7-20231023-en
Behavioral task
behavioral16
Sample
Bv9ARM.ch07.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral17
Sample
Bv9ARM.ch08.html
Resource
win7-20231023-en
Behavioral task
behavioral18
Sample
Bv9ARM.ch08.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
Bv9ARM.ch09.html
Resource
win7-20231020-en
Behavioral task
behavioral20
Sample
Bv9ARM.ch09.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
Bv9ARM.ch10.html
Resource
win7-20231020-en
Behavioral task
behavioral22
Sample
Bv9ARM.ch10.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral23
Sample
Bv9ARM.html
Resource
win7-20231020-en
Behavioral task
behavioral24
Sample
Bv9ARM.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral25
Sample
Bv9ARM.pdf
Resource
win7-20231020-en
Behavioral task
behavioral26
Sample
Bv9ARM.pdf
Resource
win10v2004-20231023-en
Behavioral task
behavioral27
Sample
README.vbs
Resource
win7-20231025-en
Behavioral task
behavioral28
Sample
README.vbs
Resource
win10v2004-20231025-en
Behavioral task
behavioral29
Sample
bindevt.dll
Resource
win7-20231023-en
Behavioral task
behavioral30
Sample
bindevt.dll
Resource
win10v2004-20231025-en
Behavioral task
behavioral31
Sample
dig.exe
Resource
win7-20231023-en
Behavioral task
behavioral32
Sample
dig.exe
Resource
win10v2004-20231020-en
General
-
Target
Bv9ARM.ch08.html
-
Size
6KB
-
MD5
67984d05d21b9aeb85f4a7d8ed628903
-
SHA1
ae45791c87dcf625449e648acea8cd5797767ddb
-
SHA256
f4a95e689541b48df42ef6bb3e71fdad0ec8a13b26b6c022b096372e79e850be
-
SHA512
e38bc4f61edebd46fe7c9b4ae8e89a750cd0172a0460769a9c580123b6e6a79e5fc0cb0eb223408ab066c5fabbb81a2b1b5a883bbead9d0db42ef25cc16c67ae
-
SSDEEP
96:yBAvOHe5aE4P0VVoIJNaLga+AK3fmeeXgF72T6egejtem3NedL3n2Ae8gonFPmnE:yyvOHF0DJNSigZbN+XFmyGivN80
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0121c046012da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2F428511-7E53-11EE-A9B8-FA85F66A7F24} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d79072038c960342ab421b8facb933e9000000000200000000001066000000010000200000001377d9a5af114d90f2483f9ed4007bda5c9ae30780199f4fdbe4579997a32424000000000e800000000200002000000091bde07f28fa2ed50d3ba54693b5c786fe1ceb72e71bfe4efd10e86b4982be91200000002a2b2906c0b2aa4f8d7b6a92dddd72df8c3db3fc3812e557cb224217a7d92e2e400000001e111f1ec52ffe2c790e3f68abc86079ef6aea8f12b18542f3386446530ef677f41ef0ad49bf11aa4148e6d5c311a41fd7652c4b21b097cf0536e1ce363a56e3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "405622492" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2704 3028 iexplore.exe 28 PID 3028 wrote to memory of 2704 3028 iexplore.exe 28 PID 3028 wrote to memory of 2704 3028 iexplore.exe 28 PID 3028 wrote to memory of 2704 3028 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Bv9ARM.ch08.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5168c4db86a1d583ef2a99e47f99f17db
SHA14a40b1edeb31bb26134c028780fbfbde007dcca9
SHA25661ddd7136bf8fdf9a8b8da2d17901b79c94f337324433153129ea41f8733bcdb
SHA5122293de31447c3b76b42db9a7e9e702d978f7876383b604ce594383563dce9ca771c5e91dadea27cf80da25ab1ee369d06eb6d9d49a571664172b9c3f5ffb16f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d9948032c4e1c03af2f404f094ddfef
SHA137c8ebe89bdd112cf3c91ec435567d9a207bdf71
SHA256ff61b63a6c938836304078bab47781be3ecb92bd8c7ea3c8caee15f45f2c7e96
SHA51298d23c631b80779b0692753f07b35f327da280ce3dd57908f9a6fafda7c1db8f191326a02c376df7c9440b5773d047d1ca0011106f9db7b7476fd35111bb2afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5011725d087406e39a93aaec17e2785ea
SHA106b0b159fc2fb0233c107eda52afdd983a05cfe2
SHA256c309c3c8e4ce6f0387ba338ff474471d5368bd64e9ac4be326e583edabcfb4ce
SHA5121a2ce8a2c17767c353c76bce53b9e1afc8d2c8594dc7ed9009a9f99274f5d74fd75a345388e1b93def684f6228505b4d8a01f006d365e877f71b58882c7fa7aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d41b6e18de0d9644fb759240b4447785
SHA1fcc775430fdf83e56953b0a91f3977d3171b2bf8
SHA256b108cdb5f6f92d60f577274e92fa73ad1b9bc0685a0809fc20364cd80daf0b7e
SHA512a084ee0a23421041bbddf8635619c219af4b0510bf184316647e79f198eba00fa68485772a1de1419598f4b3a6d7bc017178dae9a02b0488513f60a366384606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d0d5723d6b3831c57dd3b660822204a
SHA1438c6d58d70a8d1179b4c81728deacd1f4b3b09f
SHA2561e876dbf391004df636971a725f2d042c26928293a999265b5df1263e0286961
SHA512cf608fd46a4fd336d237b13aa430a99fad3dbfd72ac6c282d4801d03a9b2922b05614d3253361116cf279d361a17c1bd335a0f2b5d3e120cec9df08c350c3501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5298a7863f7e58cfe4901dd9230a5721f
SHA13c2353cfad3fd5af21ac8489a181db282bf89c05
SHA256bfe9124d2af36b9323e61a4209c4d9cd39d6e0b5ad0dda88313077ab0020533b
SHA5122013a4e6bc0cc0759ae0979a4e07ba1cf1bf1e5f9006de88447d3c8aa42af1295827536bbc3514b08040a9e905c9d5e412ff2f7dfbb877e86bada9f5b351e037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed92c98987ab84fc0a140bf8e82395be
SHA1a664be33d179cadcc4fd27098d6a5d0d7d170e33
SHA256003f97886bf83e113a469f81c19490aad9ef1ce40466bb84273062352d120768
SHA51297083f7357d343df07383ff18fb895f102d92d3333fb691a8b854e77387d03a7b76b9d73157d956cc6277611fc2bdf8eb4250117c9318d5b97f48a2405c0c5c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572592b38053c5c6428e310b309dc0527
SHA1279a05350dfbef3f7fde6dc0e9398324d0a13691
SHA2561f5d8a84494b995f69cf57d2a2318910b765693db05b55e603e074030f09dc1e
SHA512cdabe58bd4549be7edda0123742d833b2361d00095a26b7bf8a71b09e5f7708f26f5a4d05a5bd068526f5f804727a3c9c501e89cba19622d92df16494f88f3c8
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf