Overview
overview
4Static
static
4BINDInstall.exe
windows7-x64
1BINDInstall.exe
windows10-2004-x64
1Bv9ARM.ch01.html
windows7-x64
1Bv9ARM.ch01.html
windows10-2004-x64
1Bv9ARM.ch02.html
windows7-x64
1Bv9ARM.ch02.html
windows10-2004-x64
1Bv9ARM.ch03.html
windows7-x64
1Bv9ARM.ch03.html
windows10-2004-x64
1Bv9ARM.ch04.html
windows7-x64
1Bv9ARM.ch04.html
windows10-2004-x64
1Bv9ARM.ch05.html
windows7-x64
1Bv9ARM.ch05.html
windows10-2004-x64
1Bv9ARM.ch06.html
windows7-x64
1Bv9ARM.ch06.html
windows10-2004-x64
1Bv9ARM.ch07.html
windows7-x64
1Bv9ARM.ch07.html
windows10-2004-x64
1Bv9ARM.ch08.html
windows7-x64
1Bv9ARM.ch08.html
windows10-2004-x64
1Bv9ARM.ch09.html
windows7-x64
1Bv9ARM.ch09.html
windows10-2004-x64
1Bv9ARM.ch10.html
windows7-x64
1Bv9ARM.ch10.html
windows10-2004-x64
1Bv9ARM.html
windows7-x64
1Bv9ARM.html
windows10-2004-x64
1Bv9ARM.pdf
windows7-x64
1Bv9ARM.pdf
windows10-2004-x64
1CHANGES.vbs
windows7-x64
1CHANGES.vbs
windows10-2004-x64
1HISTORY.vbs
windows7-x64
1HISTORY.vbs
windows10-2004-x64
1arpaname.exe
windows7-x64
arpaname.exe
windows10-2004-x64
Analysis
-
max time kernel
135s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
07/11/2023, 14:22
Behavioral task
behavioral1
Sample
BINDInstall.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
BINDInstall.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
Bv9ARM.ch01.html
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
Bv9ARM.ch01.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
Bv9ARM.ch02.html
Resource
win7-20231023-en
Behavioral task
behavioral6
Sample
Bv9ARM.ch02.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
Bv9ARM.ch03.html
Resource
win7-20231023-en
Behavioral task
behavioral8
Sample
Bv9ARM.ch03.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
Bv9ARM.ch04.html
Resource
win7-20231023-en
Behavioral task
behavioral10
Sample
Bv9ARM.ch04.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
Bv9ARM.ch05.html
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
Bv9ARM.ch05.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
Bv9ARM.ch06.html
Resource
win7-20231023-en
Behavioral task
behavioral14
Sample
Bv9ARM.ch06.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
Bv9ARM.ch07.html
Resource
win7-20231023-en
Behavioral task
behavioral16
Sample
Bv9ARM.ch07.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral17
Sample
Bv9ARM.ch08.html
Resource
win7-20231020-en
Behavioral task
behavioral18
Sample
Bv9ARM.ch08.html
Resource
win10v2004-20231025-en
Behavioral task
behavioral19
Sample
Bv9ARM.ch09.html
Resource
win7-20231020-en
Behavioral task
behavioral20
Sample
Bv9ARM.ch09.html
Resource
win10v2004-20231025-en
Behavioral task
behavioral21
Sample
Bv9ARM.ch10.html
Resource
win7-20231020-en
Behavioral task
behavioral22
Sample
Bv9ARM.ch10.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral23
Sample
Bv9ARM.html
Resource
win7-20231023-en
Behavioral task
behavioral24
Sample
Bv9ARM.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral25
Sample
Bv9ARM.pdf
Resource
win7-20231023-en
Behavioral task
behavioral26
Sample
Bv9ARM.pdf
Resource
win10v2004-20231020-en
Behavioral task
behavioral27
Sample
CHANGES.vbs
Resource
win7-20231023-en
Behavioral task
behavioral28
Sample
CHANGES.vbs
Resource
win10v2004-20231020-en
Behavioral task
behavioral29
Sample
HISTORY.vbs
Resource
win7-20231023-en
Behavioral task
behavioral30
Sample
HISTORY.vbs
Resource
win10v2004-20231020-en
Behavioral task
behavioral31
Sample
arpaname.exe
Resource
win7-20231023-en
Behavioral task
behavioral32
Sample
arpaname.exe
Resource
win10v2004-20231023-en
General
-
Target
Bv9ARM.html
-
Size
24KB
-
MD5
87a652b81309c31305ec55fd67267f25
-
SHA1
ec891ce3ea645931f67218b73d4baf552600c9d3
-
SHA256
60de09fd68fe8fa2a3d7c6cb546d4d8e3fea821d39a0758718b66417f7c23228
-
SHA512
499f4a39fde52e0461da4586df337e4feecf17489036f355b33874e23e4e8c92ebaa67a47103c7c29ba4bf0f48ca27d98f19b174d91833629566f3bb6df557b8
-
SSDEEP
192:ZyvOHNepNSpKeT4Ip3hkjUBrA59fQoc26keqdb3d9GG7SB40mFo21tDHaHzz0:ZyvOt0Yw24IRhw5+oeqiQDHa0
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36C85411-7E06-11EE-A7AC-F23CF88AF1AF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000099b8a3c6ff97044781f9dc0475faca4100000000020000000000106600000001000020000000e1e399b19ddede277775125e0f59c4c33320629c65d8a87e7197f34d02503a27000000000e8000000002000020000000c477c9abec9a14e64c5d7518a6401dfec5b5b6517576530321864af1afa5f2f19000000008c8a787c7d0045bfaa10fa4aa303987ec827e6639235bbe226783bcc5b5cd08ce58e4e1c92fc4a4293f2a29a2951c5d612ff32b0cd608a5f81310d0d864b676fb6518f5ce824ad5fb3f7f31e806bbf53c4b266ed337484196f12d872d5b7ac9b655b2627ac0f8c6e9901b6b04026b3d8c3211b1ba7c711bf0935698c583bb843f2934ed40ca9a4b985eaa5afcc2a5bb40000000fb09431af5bf6d0d0ff4ff1f49c27287cd6d7f0e383e1dcb81ba355f817723ad6314616be0c3c3723377fd080986272a8887c57c8bcde0322d07321b583c84e6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90d4e30b1312da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000099b8a3c6ff97044781f9dc0475faca41000000000200000000001066000000010000200000004ee57dc2fa1bb5acd2a040d0708143e92da9971b038790e5a38113929453f233000000000e80000000020000200000009aa80bdbc5994a0781c330743e62b2dc27a2ec0ff835616940858170c3f38dee20000000dafdb5cf219ede6a79f453c1ff9a3d4fd8758e7ea513a92d14bdf776f0faefdc400000007e337addb0e4540bfccf152432602881a6eecba4c010de0e61a521afab46917e71f894d00f1221c6e69b849999ad2a4b4e6ef9f7a96cb93a2a67970908977886 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "405589433" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2736 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2736 iexplore.exe 2736 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2704 2736 iexplore.exe 28 PID 2736 wrote to memory of 2704 2736 iexplore.exe 28 PID 2736 wrote to memory of 2704 2736 iexplore.exe 28 PID 2736 wrote to memory of 2704 2736 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Bv9ARM.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e71535f7837a1010cde991216fd8940
SHA115742154fe5d11e0d997e853c751eec4077f93d7
SHA256e10f2677097c930d11e660a559c0058a2021301da6c3169bce01d157999f8bc8
SHA512c6627bf293cc5c80ec1e05f38d290a32d9066d8061c3daa3603a5eebb380b8fb1a99f35b425d5f2127e109db05f22efd05d72012b09d5b8ffc0920eb580f8abe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d720a54b988818bb9282d8587dd8ab4f
SHA120fdc81c0955bcc7b1fe9f976f5c06aff7fbf3b1
SHA2564d52c263deceed6d2e55adda5785c10ca168f26b672ff008f78ed9edf01c5527
SHA5121675ccfa50f78ab6ae77d54b2ec9492412799b1ec321150245c512e4b36252fcf6db9367fde28b4db30d8e9cd0033fcbca8dd7221454d36437e1c61b45e43343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6550500fa168957c980351e37d07652
SHA1854a2609ec28a0fbf819ff4ee298ffe4644d5e48
SHA25693e6b39c8ccab48ce0707ec5fdf7ad015574fa88d992e2f0474d479be4777fff
SHA512b2be569e6a175635dac860d9101f2e29d1ba9b11800c8171e0fbadd1c7b52529828f4eafeeff23e565e5bc5c755312997e507e8a21819510b2e5a5d639778d09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe18dcbfdc9362b05167e7cc208707d4
SHA1ee3c23eee0ca350fba9d24c87727edd050e7912b
SHA256ba906c4869b030034182d4e9ea38509377fe68265cdf4e11890fff9102649386
SHA512172760044b48b6302eedd47bf016127f625715dc78690f10d8111d6c47e913c619b299c76e2effe4c17f319a2dc5d404a76b844fbb0117aaab85eecaf47e2808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563996753670ebe88706e0737efbf1bc8
SHA1881e89416e6f2a4c81f9ad60e293c2e4beb0fad9
SHA256c9cb89a17e973f8e1b4efd163710d6b729f68d2d38f9a7d0a5e71b1cdca604ca
SHA51247f8adca84d02811cd2f909d29c37a661b92a3f777f70eac678060b827b271e8da79b9fe81d4fa53dbeae9c51b8759af926b1d746740acdea6e457c05200ad28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b98f6eab5347a5de02c869d68433150f
SHA1dacae84bdcf5965d0637c42a8771f437e2f4b9dd
SHA2560ae9a76e9a1e804fca1642cd2b26a2cb7167041307f12e05668c647be0eae1fe
SHA512aee6aed0a440d9772e5f3477c4c37d32cf11fd5571f7c8053e4e4f2205f4d43b6acb361562ebf92ea6d1b4d648718b1d750227d1a09339ca82a55f5b51023ef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ef80b83b155d253412fcabaf6a3b2be
SHA13244d946a2248963eb5cf50cf153e76a6fe04bd3
SHA256e87ea61ba50afaac3850b4d0ebf74a77f58bb548a843f67360fd2c7849c9f482
SHA5127fc5398d0e4a622c3838244946c6c8dd5df2754da92cab3191f732df24691acd6abdc9c85bb6d32c04615ec624f43c1b8bf49eb4fc7eaf9b5c1a9e72115f71de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541d9de06bfedf50d4605f47baa12699a
SHA12af20aefad02aaab5acaef5522b3b6fc32745a70
SHA256b4c8643426638469546eb8d31a50fed7d7753e36a0cb5610f8cb1e39f447d6dc
SHA512d3686549b0900bc8a7a63cc8a75b3a7cccc414466b2b87872f36014cdd07eafc8c0e0d155ed40eb660f95668bddade03138457d2af1096282e2a5c955dfebcb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc781228b3f52d35ed405ffaccbf5fca
SHA1683eaab47189b57c75118329a440119b30be89af
SHA2564899e71de6f0291fb62757f510b0b7606e5cf5b3d6cff054a8d24ae88207da4e
SHA51226b409e6a3b89eeb9f3a92ad82f2338defde39b820743d7f16d54d8895dc46015acd61d5f2ff096e3321b4ad4c439909d22e00521c396f565c0ddf877f75bbb6
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf