Overview
overview
1Static
static
1404.html
windows7-x64
1404.html
windows10-2004-x64
1Checkorder...ion.js
windows7-x64
1Checkorder...ion.js
windows10-2004-x64
1apisub.ps1
windows7-x64
1apisub.ps1
windows10-2004-x64
1confing/36...can.js
windows7-x64
1confing/36...can.js
windows10-2004-x64
1confing/config.js
windows7-x64
1confing/config.js
windows10-2004-x64
1epay/epay.html
windows7-x64
1epay/epay.html
windows10-2004-x64
1epay/epay/...ass.js
windows7-x64
1epay/epay/...ass.js
windows10-2004-x64
1epay/epay/...ass.js
windows7-x64
1epay/epay/...ass.js
windows10-2004-x64
1index.html
windows7-x64
1index.html
windows10-2004-x64
1index.html
windows7-x64
1index.html
windows10-2004-x64
1index/add.js
windows7-x64
1index/add.js
windows10-2004-x64
1index/add_pl.js
windows7-x64
1index/add_pl.js
windows10-2004-x64
1index/addqg.js
windows7-x64
1index/addqg.js
windows10-2004-x64
1index/asse...art.js
windows7-x64
1index/asse...art.js
windows10-2004-x64
1index/asse...ker.js
windows7-x64
1index/asse...ker.js
windows10-2004-x64
1index/asse...min.js
windows7-x64
1index/asse...min.js
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
24-11-2023 04:20
Static task
static1
Behavioral task
behavioral1
Sample
404.html
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
404.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
Checkorder/configuration.js
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
Checkorder/configuration.js
Resource
win10v2004-20231025-en
Behavioral task
behavioral5
Sample
apisub.ps1
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
apisub.ps1
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
confing/360safe/360webscan.js
Resource
win7-20231023-en
Behavioral task
behavioral8
Sample
confing/360safe/360webscan.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
confing/config.js
Resource
win7-20231025-en
Behavioral task
behavioral10
Sample
confing/config.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
epay/epay.html
Resource
win7-20231020-en
Behavioral task
behavioral12
Sample
epay/epay.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral13
Sample
epay/epay/notify.class.js
Resource
win7-20231023-en
Behavioral task
behavioral14
Sample
epay/epay/notify.class.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral15
Sample
epay/epay/submit.class.js
Resource
win7-20231023-en
Behavioral task
behavioral16
Sample
epay/epay/submit.class.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral17
Sample
index.html
Resource
win7-20231020-en
Behavioral task
behavioral18
Sample
index.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral19
Sample
index.html
Resource
win7-20231023-en
Behavioral task
behavioral20
Sample
index.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral21
Sample
index/add.js
Resource
win7-20231025-en
Behavioral task
behavioral22
Sample
index/add.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral23
Sample
index/add_pl.js
Resource
win7-20231023-en
Behavioral task
behavioral24
Sample
index/add_pl.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral25
Sample
index/addqg.js
Resource
win7-20231023-en
Behavioral task
behavioral26
Sample
index/addqg.js
Resource
win10v2004-20231025-en
Behavioral task
behavioral27
Sample
index/assets/LightYear/js/Chart.js
Resource
win7-20231023-en
Behavioral task
behavioral28
Sample
index/assets/LightYear/js/Chart.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral29
Sample
index/assets/LightYear/js/bootstrap-colorpicker/bootstrap-colorpicker.js
Resource
win7-20231020-en
Behavioral task
behavioral30
Sample
index/assets/LightYear/js/bootstrap-colorpicker/bootstrap-colorpicker.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral31
Sample
index/assets/LightYear/js/bootstrap-colorpicker/bootstrap-colorpicker.min.js
Resource
win7-20231023-en
Behavioral task
behavioral32
Sample
index/assets/LightYear/js/bootstrap-colorpicker/bootstrap-colorpicker.min.js
Resource
win10v2004-20231023-en
General
-
Target
epay/epay.html
-
Size
1KB
-
MD5
808cc9131e758f4f5425d61586145322
-
SHA1
d6a4fa11f1c78131af18a486ca0290f7bb0cc1b2
-
SHA256
556f0cc4f07120d3e8ce8d4c00a2e6e31a0afd3d58df6bb7474dcce29a89fa19
-
SHA512
561710037ad1ec1f40da9dc8fe687bedffcc21c07a394cdf02f308f6eae18e329bccc1ee780063413d04ef89abf0a088153e7c8f12889f91fd76550120453020
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000efee191c820df7499e31472656722fd500000000020000000000106600000001000020000000132e7fe1e6a37af2953a1df26fc882c4bba3395a55db6a4a21fa9738a27df55e000000000e800000000200002000000014828b609f2cd774d24b8155a4270f8dd2db0e51ff98502e1f88c3751c8a565390000000f39ebef507ee1f432f48bdd96dfcf3c6bcdccccc7b54cb0aad60665457aa9cdd39c577ab1cb2dbd69a016e971b9e65b41eb18b0cb5e3105d06fd654517d9baa46137180f0518f55bf2889b0957d815a964e9900723278399a5559c0d9c7aef0b6fd77b093665f61f172e25d6ed0a6585f16ae357c616b6a6b1d05b6471c7e773cd181ae0cbcd9953aea950b53dad17a5400000004359a812bcbbab433ae96e41444174002af664c4e577fb4cb4db45f0107a2f865048ee8e66bedc9cee5cc0ee8723a3ec4b40de1977dd05f38b757c61e04ff135 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000efee191c820df7499e31472656722fd500000000020000000000106600000001000020000000b3a74c8e20e7eed3d9ac89aa3b1dfe1ad27d29bcb6a64263bfa85b3837aac245000000000e8000000002000020000000cb7ffbf000bed106f61b1d7588f63f3c84cafc0c94909be6b68c0a35368f9830200000008b49f25c05dcb7ea585532616dbe184f6554c612493ed15afdbb32312958edf240000000b1250b178f47dd5a3535e4b12c0f9df8e71767189aace7927abd19cf79ea6c9bf4611189f8dbff949c2c8f2b4d23b625345bbf34fd4a84ea8347078cf82c9598 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C9570B61-8A80-11EE-B005-5E980B41BC44} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0dab4a08d1eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "406961492" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1276 iexplore.exe 1276 iexplore.exe 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1276 wrote to memory of 2224 1276 iexplore.exe IEXPLORE.EXE PID 1276 wrote to memory of 2224 1276 iexplore.exe IEXPLORE.EXE PID 1276 wrote to memory of 2224 1276 iexplore.exe IEXPLORE.EXE PID 1276 wrote to memory of 2224 1276 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\epay\epay.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1276 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af3024b69e6bab59251692267217ac1b
SHA10303f946efae4d8528b38fe1493bae4f783ffccd
SHA2561e2f0868acb02bfc24cfc1bc07f00a744c14c1cb376fe5a0f4f95f6d2e93e334
SHA512d495200f5c48a7820a85e5fe40de87b181dadf364233c1087ebf6ed4313ee301247debddab78bdd47688db4ec67141660023ee1ab58a6d0fbd4b045d909db274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575114403915e202e1d67e1dbbfff77ca
SHA18c09ca75aa1abadb6b1ff3da1ebd1ae29485ae06
SHA2560ebb94dc84e13ca379635272e4d075a6a04582fc28844d81cc175af910d63bc8
SHA512b6b774b07ae1e669dc6f73933142b8f9c164d251535805e2c1192cbd2f2ad4f2666a7cd1c75288d644d8bb033a0427eb041fdb3a02201e83dfab0f1bbc711446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58eb4cb6ee468d324628e822be721e389
SHA1e3bee47723bb614d99afacdcfbb04381272d5312
SHA256b23238f8b6479d04e983c5153b1aa8bd80dc08f892ec6aa5d5120e6300a52ebe
SHA51285233a0ed2ef2c62ce34b55c71e0e21a30c613bf365a968add2b9ae1bb346eb72209bf47fd788569dc650c6e8b852b6202d78e424b97294d1618e4e86e6ea66d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539b9be73e349324ade96d95e780f5acf
SHA11ed2dc46c8b990d3a077539581de5900c05e1797
SHA2562d1bd95c6c5d55d029c2cb1adc3db64c882192ab63b481cd512b0c1681eecc31
SHA5120a76e6e2656eb3fe484147f83d65ff0738cf125bf5bfcb43dbb798e722bc25c788d5d51b3aff9b97fd5cbaa921dae9e71d9869d0911c3e408cdcdffd05fef6b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c23db1df17b0ae068faf2e6f36224ab
SHA143888ae014b4de2399562ccabe431a0c705aff34
SHA2564a3e2bb8caa5b192aaf54d5ab4b23dee67b9df1608954e7106993da2873f3dd9
SHA5123bc62f9165f69acd21b0d52932fda57aa53ba8d89ae436e98457f4ebdf94537e0d38150c5035f2ca3b35a9d60a1805404fafc400e4e70bac50be227194f49a91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8322d441540e98f9917b5cc1d678d6e
SHA14023b3ae5594dafdcb1d3c7f56e1fd96f5137a5d
SHA2568cfdf35ca6b8d8c35873b6e5ec0075176ecfbea426f4780f8cc97e316ff28c3b
SHA512b3ee9d3b3fc90d35dc76a1189a9e41f8116ac77be46cf8474afe6ce001c0c1244bc7b5c14712fee8f9c9b5ed6d4e2599f50828c632a2c4c93698eda4c4e4ca44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d25b0f3d46975d9e6560657b1c57f688
SHA1a842fc6ea7574d746453d2daaf9061bec27982aa
SHA256420295e8a879d05b88406321ef29448710c908dea5ea38d7c4efac829b0af503
SHA512ec6517132513734e38f1ce22450583dde0ce6ffb7e742efe112bf74f8d1b3e8b086f512d133d00ef8c6119e50dfaa114546d9527f7b2daf32d1d72abf6280450
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9e316536b62d912b3dbe2ef55f98749
SHA106f78f858180f037affd7de856a10d358522890b
SHA25667462243ac729c5689bf57052d87f9e8bf36ca5e3cd831912074ca3145f30a0f
SHA51239b8168ee76a2a13c2093f091752051af698483a0d415017996e65479befad95541930f409d8b35a200ea3977226f67101612c2e5b8120606ff71710d9d799fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d016aa15b2f964c6469847701a29b174
SHA1ca72abb042f6dd4d59835a8672cee17e22223b5d
SHA25682dbb97bc4b11b1bd829960b9af27fbd83435f6b581f76f71135b93a544a5660
SHA512d760cac1081297cdae3b04052cce9c5031ce532049e11c8cd6b565d9e68d276242f81d57adaefe6e5d24c33b92270be2b5923af226b7d7c56a42a9b9fb9102ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c7727a6f3f98096cd96e900c5e54ccc
SHA1c9f59b66343cd2bcd6009303509663912df17fc7
SHA256372e0ed6784110def22282cbfd20eeaf32a49076d79bb4b4275089d00afaa08f
SHA5123b10a9b0a60c3fd8d747d3ef58f98c502b0d553caf59fd9306f36ee47c5d5438bd6c2813f38c87724fe3e5534a7a9e653e794ac63e6c474e1dc61cfdb9535f8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5380c1b48345f8dc99188e9eb870192b2
SHA10d06b667553a659afef0fbec2a7271804dc4aede
SHA25650981af69e265fcc8e634455b7769c43f51a0f6693aa66a9323f54f16162eda2
SHA512e14a0ac86c30dd5445a9623d2a2e6fc85b17ccafa4f0d23f2f5bad719df91ae48e078c61430e651338b76559b7c2e11bd495052837e1fd14a25c747f133a798c
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf