Overview
overview
4Static
static
4BINDInstall.exe
windows7-x64
1BINDInstall.exe
windows10-2004-x64
1Bv9ARM.ch01.html
windows7-x64
1Bv9ARM.ch01.html
windows10-2004-x64
1Bv9ARM.ch02.html
windows7-x64
1Bv9ARM.ch02.html
windows10-2004-x64
1Bv9ARM.ch03.html
windows7-x64
1Bv9ARM.ch03.html
windows10-2004-x64
1Bv9ARM.ch04.html
windows7-x64
1Bv9ARM.ch04.html
windows10-2004-x64
1Bv9ARM.ch05.html
windows7-x64
1Bv9ARM.ch05.html
windows10-2004-x64
1Bv9ARM.ch06.html
windows7-x64
1Bv9ARM.ch06.html
windows10-2004-x64
1Bv9ARM.ch07.html
windows7-x64
1Bv9ARM.ch07.html
windows10-2004-x64
1Bv9ARM.ch08.html
windows7-x64
1Bv9ARM.ch08.html
windows10-2004-x64
1Bv9ARM.ch09.html
windows7-x64
1Bv9ARM.ch09.html
windows10-2004-x64
1Bv9ARM.ch10.html
windows7-x64
1Bv9ARM.ch10.html
windows10-2004-x64
1Bv9ARM.html
windows7-x64
1Bv9ARM.html
windows10-2004-x64
1Bv9ARM.pdf
windows7-x64
1Bv9ARM.pdf
windows10-2004-x64
1HISTORY.vbs
windows7-x64
1HISTORY.vbs
windows10-2004-x64
1arpaname.exe
windows7-x64
arpaname.exe
windows10-2004-x64
1bindevt.dll
windows7-x64
1bindevt.dll
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
179s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
07-11-2023 13:59
Behavioral task
behavioral1
Sample
BINDInstall.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
BINDInstall.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
Bv9ARM.ch01.html
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
Bv9ARM.ch01.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
Bv9ARM.ch02.html
Resource
win7-20231025-en
Behavioral task
behavioral6
Sample
Bv9ARM.ch02.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
Bv9ARM.ch03.html
Resource
win7-20231025-en
Behavioral task
behavioral8
Sample
Bv9ARM.ch03.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
Bv9ARM.ch04.html
Resource
win7-20231025-en
Behavioral task
behavioral10
Sample
Bv9ARM.ch04.html
Resource
win10v2004-20231025-en
Behavioral task
behavioral11
Sample
Bv9ARM.ch05.html
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
Bv9ARM.ch05.html
Resource
win10v2004-20231025-en
Behavioral task
behavioral13
Sample
Bv9ARM.ch06.html
Resource
win7-20231020-en
Behavioral task
behavioral14
Sample
Bv9ARM.ch06.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral15
Sample
Bv9ARM.ch07.html
Resource
win7-20231020-en
Behavioral task
behavioral16
Sample
Bv9ARM.ch07.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral17
Sample
Bv9ARM.ch08.html
Resource
win7-20231023-en
Behavioral task
behavioral18
Sample
Bv9ARM.ch08.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral19
Sample
Bv9ARM.ch09.html
Resource
win7-20231023-en
Behavioral task
behavioral20
Sample
Bv9ARM.ch09.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
Bv9ARM.ch10.html
Resource
win7-20231020-en
Behavioral task
behavioral22
Sample
Bv9ARM.ch10.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral23
Sample
Bv9ARM.html
Resource
win7-20231020-en
Behavioral task
behavioral24
Sample
Bv9ARM.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral25
Sample
Bv9ARM.pdf
Resource
win7-20231023-en
Behavioral task
behavioral26
Sample
Bv9ARM.pdf
Resource
win10v2004-20231023-en
Behavioral task
behavioral27
Sample
HISTORY.vbs
Resource
win7-20231020-en
Behavioral task
behavioral28
Sample
HISTORY.vbs
Resource
win10v2004-20231020-en
Behavioral task
behavioral29
Sample
arpaname.exe
Resource
win7-20231025-en
Behavioral task
behavioral30
Sample
arpaname.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral31
Sample
bindevt.dll
Resource
win7-20231020-en
Behavioral task
behavioral32
Sample
bindevt.dll
Resource
win10v2004-20231025-en
General
-
Target
Bv9ARM.ch03.html
-
Size
52KB
-
MD5
b206bb0876cacbdb4d0d447236ec03df
-
SHA1
1be5953d49f2f9ea250a2167aaf4de3866f7a087
-
SHA256
d6dea2814f1dcad9261d6d63a8cdd7864797a03b26c75a8bd17a042de4bfdf55
-
SHA512
21f82a65d61d2b4c3e34a7380b01f3d312e837875cc1ab133746b542579104cc303b8432cefeedfce475b61459831860a5c3179598284f3580a1e8b610cf00ad
-
SSDEEP
768:Z0O+3tOxtbdjxvijhf8Ge0ENAaK/gZu3WDRCw:Z0O+9Oxtbdjxqjhf8Ge0EI/gMM
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002e1e81ecbc95de49994f369c3e717184000000000200000000001066000000010000200000006939d6c0c46fce32e26cae7e87532ff0372bf0154d7b3dadeadf5e6cefbfd570000000000e80000000020000200000003f299da1f2c98f04da71e9f2c2b7b483e794d52fc0ca404b27aa2ec4ea0ffee8200000000ad37494b66876ea53850bae2e3fa926a96347dcef5c2b2aa979cced88c4372d40000000bff0f4d1fea14f2e79093ddfdd889fbf66134392f92b39e02eb6cc0c62055d645b16cf707421c1373d8d260b4e0668bbecb997a677fc0e6552f3a3b9681d4445 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "405554701" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54F33691-7DB5-11EE-A815-7A33B3E4ED19} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002e1e81ecbc95de49994f369c3e71718400000000020000000000106600000001000020000000d67d7ed6db80800f008d6d94118ea0efb5046e5eb0834baaffa9c08ed9e285b3000000000e8000000002000020000000f24122d791a39202f7aaaf6c278644b6feb4b5b236e0eacd2df78fbc1036867990000000fbafab447739018d2bba0c2698acdf39872bedb90a4737bfc677aac3b3fad525dd73ef1f4168f8f08b539f9e75043ead181cf6bf217ca31031f2e3f65a0f52d5de4a801da17540cb4d3b00667f6c32d676df40960aff0f054e6badac96e10bf69d626313cb59c2801cd6595837925675e184bc778f41eef02e97015b60ff77a98768b09911ff4c9b06926ade2ef585fd400000008363f4dc1c0e26fb0845d23030cbaf1d8872d30c40df9f4f95437f2fec6ccf0e51c9270ad27ae3a567780c3f07c24cbd90d77851c6582ebe09bc0f9080b5d52e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07ab929c211da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2520 2368 iexplore.exe 30 PID 2368 wrote to memory of 2520 2368 iexplore.exe 30 PID 2368 wrote to memory of 2520 2368 iexplore.exe 30 PID 2368 wrote to memory of 2520 2368 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Bv9ARM.ch03.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd67f15f2f51cede44ecfdbb0255edf4
SHA1473289fa101b1c18678c0f0489cae8fa5b8a4eee
SHA2560bd0f587cab197a2ade24c454efcfdd27c75d8b89d18c3ef8d683ca5b2c43569
SHA512f7b01c463ed7c3b42b62b95d02b9f99d57caf9927edc485b3a3e59a8be0d5a9201ef71d720441538fb02d57718f86a1bc878fb7752dbeeef481da66e824c2a50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9e06e54e7d4609d1c8390001eae53d8
SHA1a63ee9ad785bc870a4f0b1638bd45f3bf6650303
SHA2561935c90fb47ae29d916a3ddfa768ce6b42f4021047555b5bdcbaec22814e7b6d
SHA512791e2460848da11d174c8d2fa4a7d0623ebbb8300a50fa323c5aaed1762ec2ce460ce3ce0d5e3e2d6376264da7b1a2f6f0182fd95f3f903b946bb1cc4a6e8431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516c084b9c7524bc2381d6f84e7af2efc
SHA1ccc959187d9995e5c2f322434a3ac6fb0bd80e23
SHA256153aa15e1de275d1a3ae322589e0043b15d6806c68408fb9ade24748fae70080
SHA51241300be1c18b23257e5be5cb12b5b617448c0e10b1bf39b134c8cc1c2e241966a044fc1211919bdc799a000c8c71fe6ddea6b5344b4d39bb06e19ec1476d1afc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570e88ba3f65eb10e391bb054468e069e
SHA116cdb94585ae7d07fc752be2d184c3ef23f9f2d7
SHA2566583448d72d9d3f267167b3b6b42e6727dd302745390203c4bb45c544853f06a
SHA51287da0de3a5e3956a9e9af3993c0cdd29c17bab4a537a3bfbf82ed65bb52ae850fba77fba13081586270b3398e86f8deb4db2e3f13ce7a1763cc3fd2f78159cd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6b3394c0cb60b3c1fb8da14dfca483e
SHA1fedc0d21afb93ed66f466b475a92623ff7ca5d66
SHA256553218a413ae4f63976880f933e727bd012e4c48c50783a8769371422a0f66d9
SHA512bb10db7527630d20767296569ae0fabe7d065cf2e28dbe09843251a6841b2e136c33956d595761d3fb9863e45799967b7d32bba48f5a319907d43b7277cbc578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e59d3a9d2a38f4dfead00b3f75a02cea
SHA1624fa1f2e2ffe12e3b8c4bbe1d596752db715611
SHA256a0589160d79ce90e6ee2b6fbfaae085bfd70cc5e581329d8b92bc3c445d19629
SHA512e03060f951e703bb3312425118398935ae662d56a260d9d885b778910494cbb54c1e88619b7acfdfb4fa959aebaa3131d825660af39ff037677ef961fdeed531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f515dc3d2f0d994e51813340a06aa91b
SHA1fe0b73a92546496831c9b7cb9809c3fa29faa609
SHA256e566b51d2952a60de0e4fd01aa43f24294a1f9ecc9ebbb574cc4d82bd9528ecb
SHA512431478886db8f4b9323c5615bfcfa1da9eb9e7163cad6608356bfd08644f4c166ebd74cdeef1bf3978dc71daa05b9539bf1bec382ce4409871106a107b33fbff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f18aa6bc825ee6a1859e0a03ed42a2d4
SHA170158cbb371c7ab70c0b1a7938b85cafbafc8157
SHA256e585ed0666187844b6625e4d214e09b73031c3ec61950601761d701ac299a110
SHA512f26fb78b4e0e73f13cc75710d4a7b18aa0b07bdd3bb92e7ddc1b5851f6bb0602807c744759752741619a27eba9b0e622710cf6ea0518616c20812a4c7a554b27
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf