Overview
overview
3Static
static
3app/admin/...jax.js
windows7-x64
1app/admin/...jax.js
windows10-2004-x64
1app/admin/...tem.js
windows7-x64
1app/admin/...tem.js
windows10-2004-x64
1app/admin/...t.html
windows7-x64
1app/admin/...t.html
windows10-2004-x64
1app/admin/...t.html
windows7-x64
1app/admin/...t.html
windows10-2004-x64
1app/admin/...s.html
windows7-x64
1app/admin/...s.html
windows10-2004-x64
1app/admin/...s.html
windows7-x64
1app/admin/...s.html
windows10-2004-x64
1app/admin/...s.html
windows7-x64
1app/admin/...s.html
windows10-2004-x64
1app/admin/...s.html
windows7-x64
1app/admin/...s.html
windows10-2004-x64
1app/admin/...s.html
windows7-x64
1app/admin/...s.html
windows10-2004-x64
1app/admin/...s.html
windows7-x64
1app/admin/...s.html
windows10-2004-x64
1app/admin/...d.html
windows7-x64
1app/admin/...d.html
windows10-2004-x64
1app/admin/...x.html
windows7-x64
1app/admin/...x.html
windows10-2004-x64
1app/admin/...t.html
windows7-x64
1app/admin/...t.html
windows10-2004-x64
1app/admin/...g.html
windows7-x64
1app/admin/...g.html
windows10-2004-x64
1app/admin/...r.html
windows7-x64
1app/admin/...r.html
windows10-2004-x64
1app/admin/...a.html
windows7-x64
1app/admin/...a.html
windows10-2004-x64
1Analysis
-
max time kernel
167s -
max time network
196s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
07/11/2023, 15:06
Static task
static1
Behavioral task
behavioral1
Sample
app/admin/controller/Ajax.js
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
app/admin/controller/Ajax.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
app/admin/controller/System.js
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
app/admin/controller/System.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
app/admin/view/common/alert.html
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
app/admin/view/common/alert.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
app/admin/view/common/layout.html
Resource
win7-20231020-en
Behavioral task
behavioral8
Sample
app/admin/view/common/layout.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral9
Sample
app/admin/view/system/data/accounts.html
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
app/admin/view/system/data/accounts.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral11
Sample
app/admin/view/system/data/kms.html
Resource
win7-20231020-en
Behavioral task
behavioral12
Sample
app/admin/view/system/data/kms.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
app/admin/view/system/data/notices.html
Resource
win7-20231020-en
Behavioral task
behavioral14
Sample
app/admin/view/system/data/notices.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
app/admin/view/system/data/sites.html
Resource
win7-20231025-en
Behavioral task
behavioral16
Sample
app/admin/view/system/data/sites.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral17
Sample
app/admin/view/system/data/tasks.html
Resource
win7-20231023-en
Behavioral task
behavioral18
Sample
app/admin/view/system/data/tasks.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral19
Sample
app/admin/view/system/data/users.html
Resource
win7-20231023-en
Behavioral task
behavioral20
Sample
app/admin/view/system/data/users.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
app/admin/view/system/head.html
Resource
win7-20231023-en
Behavioral task
behavioral22
Sample
app/admin/view/system/head.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral23
Sample
app/admin/view/system/index.html
Resource
win7-20231023-en
Behavioral task
behavioral24
Sample
app/admin/view/system/index.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral25
Sample
app/admin/view/system/pay/agent.html
Resource
win7-20231023-en
Behavioral task
behavioral26
Sample
app/admin/view/system/pay/agent.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral27
Sample
app/admin/view/system/pay/dg.html
Resource
win7-20231023-en
Behavioral task
behavioral28
Sample
app/admin/view/system/pay/dg.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral29
Sample
app/admin/view/system/pay/order.html
Resource
win7-20231023-en
Behavioral task
behavioral30
Sample
app/admin/view/system/pay/order.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral31
Sample
app/admin/view/system/pay/quota.html
Resource
win7-20231020-en
Behavioral task
behavioral32
Sample
app/admin/view/system/pay/quota.html
Resource
win10v2004-20231023-en
General
-
Target
app/admin/view/system/pay/dg.html
-
Size
8KB
-
MD5
c5383bb74ac6bea557cfdfdc828b9122
-
SHA1
6818ddb931b8f0db4a2ec231d438afcce7ecca51
-
SHA256
e81c697ae2b623979d7dd483f473befc76b706afea566b4f3e42ec01ef027b01
-
SHA512
387e0777e550379a697593da09ce3ac5ded3fb79b2da66c62e24035b1e204c92645f345c547f8667cca0b817e34af20c395bf0c2c8d8af986706db1ef950f44e
-
SSDEEP
48:hneSCJl5ndG5DQeHDpEJlNnHaBLSSTTp6JlZnPYYhQI8XPYRU3e85PYwXOQ82PYE:hneSyn4RQed0n6ZSSxanqxeuB7IGHx
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d79072038c960342ab421b8facb933e900000000020000000000106600000001000020000000cf40c53de14c7a0220e780daa74c5c8ecbd4d59672c96aac63832a6918026080000000000e8000000002000020000000b87beb7c68d6dafa049d89178a85261f99f39f84621f41f075080408f41283ac20000000c163bc780fb8f23d131053e93cd71d002b259fee4ea67a2b348ea313cf3ec969400000005b6455824fc15cbdfed09bc301be0f9911bdaa868ef6e1d8ba8ba32218ebc9ad0d90104dfe1a659ce860b50d9a2dabed89ae5944ebefe3de8efd3ec8ab131cca iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{18C46CA1-7D80-11EE-AB10-C6963811F402} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0a462f48c11da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d79072038c960342ab421b8facb933e9000000000200000000001066000000010000200000002095e801f500a65db5aed0390d9cc7b083650637dbc93eb82abb0dca586781a7000000000e8000000002000020000000ffe740e9a52f76b0736b71faf79fd94775fbe357133f05b570ea3924ff36a9de90000000f91402586a27ac0227b0f73a32ddff59d9b73ef6fde920a8f3a99ec1e1eda3e060e25aff49111b974da7a6ab8b748eb6e42efb780961bdcfdd22479bb6b36e98153ec7d9f7204e9f9dab7c012eff10d9cd1d7b24e907c9083e6103e9e05243a337ffa03011d28dc56d6b7a55c49e1cb833c837d166806c71e1c05b2881134babdd073c7bb5ff04749b8b6ed629105e3140000000aea949692b35e44e8813215111dc0864962176c8456d0bde659d0660512758aa68200e29c9d9ac85d531e011f15e06f0b307c4ac7c11d1dd548e379e8068e67f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "405531858" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2500 2668 iexplore.exe 30 PID 2668 wrote to memory of 2500 2668 iexplore.exe 30 PID 2668 wrote to memory of 2500 2668 iexplore.exe 30 PID 2668 wrote to memory of 2500 2668 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\app\admin\view\system\pay\dg.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f1147ca43b672eec144039236354edf
SHA135a3d21ee486718c482a2820e79e33ee44a52cb3
SHA2562312ac2153492552f79b81a292e7352fd40f4242b5a5d17e61e5bf6dc53a96f5
SHA512465a3ccb95931706f6a47df904c111753b262c663f2438693752cdf6baa7f8d6e56ca63b82a9cf9bda5deeaec3a5df5a054dc1599f437fef4cd039dcc0d6b5f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f5df56b5f1b71c65d592d10cc049835
SHA180721ba15e1b996c0ef47f379884165a01a41de8
SHA256abca5ceddb4c252eb6cded16bf19ef6e31b3761857d5b6f93ac476c3e215ed21
SHA512dc776e86e64e08039a4655d5df5160436537dded80aa0edaa71e31b81dfde3fd5146eafbdb489cc6fca3a761234a989cdbd90c997f2fb069be6b8957b88bd07f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5c23d1ecebb3296561b8d32b28b919c
SHA1a470b5344816644f820d324610fa83fc997ef391
SHA2560e6e9a1175d7b48c60511ebc04ffc2f87f6175959729bb445659b57e2a11af17
SHA51211b419d6ac20f033ab5c7e3ef8ebc578bf0277a261573355b11730d472b8c872be4924d4f29775f4c3140e0cb593027f928cbb16af03d810ea64b7882b1730aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3f6bc685f723911b65bf76509a0a688
SHA1a65151398146b1cd1d66d306bb28174758477f0f
SHA256d7ba9d75f8a1865c820720affaee37a51a09d9ab8aeed4685f5d06358db3dd62
SHA512657cc636270f194fdbe8b1e48908ff2f8625a15c17af9f6edd8f032a7f138c2ec5c2c511dafe7af5be9dc32c6d1e8d70cec763aab91b5dc2981185d827e07145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b73a05d9f3f332dbb2868ffad02a79d
SHA197d2f022a0177b8d4c71b376917ee162662640b5
SHA256d973f9024aabd1f65d1c72f8ae1f4b9fb0577fb73c080fcb0eff93fa8e39ee61
SHA512e37c1010d556513e44098c35616929853b90779de13282f2caf213f966af15781f6fba54b64ba6d2bb0d6df1a0e0acdcce3e657914068c6989ae93502418d2e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500fae3f4c7fd4220c8795e50318b21c7
SHA1d317127e0988651942bb44ff747168e92e551fb4
SHA256bedad014fe105f5ebe96313a0e7a5f96b57f2d26fb0557cf5b8e5b7d0554187d
SHA512ccf8c22b9fb51356abaf3399e4ad2bb195c0e91a99f3cc9bcc13c94f7cf5508ecd45b99b3aa94781db9c93926d6f112c83bafe8006eb633dadafda382cd6f15f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5539dd6bb9b388351c784e58472118ea1
SHA1b0a8ab0bc8347aa158debdf62789ceb86f44706c
SHA2560eab44d239507e801f840975eae57170a95375a0661da6fbe029493f4c463f75
SHA51275ec654cf9c8090907c9e9a135f2fd788e6c9d1a2708cf62bc7cc56448612a37a787b5f71604f634c0b290141139d7895444fe2f68f1275d01bf7933bc7e7ded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518270ce09829fb01a173ee9681e85807
SHA17eca462204b2fadaa93fbf4af8d18c95a670e0e2
SHA25644fe1e33b3cbe2828f466399c5ab1fcb2ee29866f61c7827abb6fdff919eb7a2
SHA5124aa72506ef9ca05a5acf9fe5f6d9444fbb53a69359b2231ab5b884c75c615b6dd0e6497b9950dc52d5e37f03e20f792c80edbb5f281e3abd9b7af75df59cd610
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf