Overview
overview
3Static
static
30001-explo...ww.ps1
windows7-x64
10001-explo...ww.ps1
windows10-2004-x64
10001-explo...p8.htm
windows7-x64
10001-explo...p8.htm
windows10-2004-x64
10001-explo...15.htm
windows7-x64
10001-explo...15.htm
windows10-2004-x64
10001-explo...erh.sh
ubuntu-18.04-amd64
30001-explo...erh.sh
debian-9-armhf
30001-explo...erh.sh
debian-9-mips
30001-explo...erh.sh
debian-9-mipsel
30001-explo...ck.vbs
windows7-x64
10001-explo...ck.vbs
windows10-2004-x64
10001-explo...11.htm
windows7-x64
10001-explo...11.htm
windows10-2004-x64
10001-explo...ame.js
windows7-x64
10001-explo...ame.js
windows10-2004-x64
10001-explo...53.htm
windows7-x64
10001-explo...53.htm
windows10-2004-x64
10001-explo...x.html
windows7-x64
10001-explo...x.html
windows10-2004-x64
10001-explo...10.htm
windows7-x64
10001-explo...10.htm
windows10-2004-x64
10001-explo...en.htm
windows7-x64
10001-explo...en.htm
windows10-2004-x64
10001-explo...en.htm
windows7-x64
10001-explo...en.htm
windows10-2004-x64
10001-explo...20.htm
windows7-x64
10001-explo...20.htm
windows10-2004-x64
10001-explo...21.htm
windows7-x64
10001-explo...21.htm
windows10-2004-x64
10001-explo...s.html
windows7-x64
10001-explo...s.html
windows10-2004-x64
1Analysis
-
max time kernel
0s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 04:04
Static task
static1
Behavioral task
behavioral1
Sample
0001-exploits/analogx.www.ps1
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0001-exploits/analogx.www.ps1
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
0001-exploits/asp8.htm
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
0001-exploits/asp8.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
0001-exploits/bind15.htm
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
0001-exploits/bind15.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
0001-exploits/bruterh.sh
Resource
ubuntu1804-amd64-20231222-en
Behavioral task
behavioral8
Sample
0001-exploits/bruterh.sh
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral9
Sample
0001-exploits/bruterh.sh
Resource
debian9-mipsbe-20231215-en
Behavioral task
behavioral10
Sample
0001-exploits/bruterh.sh
Resource
debian9-mipsel-20231215-en
Behavioral task
behavioral11
Sample
0001-exploits/bypass.viruscheck.vbs
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
0001-exploits/bypass.viruscheck.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
0001-exploits/icq11.htm
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
0001-exploits/icq11.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
0001-exploits/ie5.cross-frame.js
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
0001-exploits/ie5.cross-frame.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
0001-exploits/iis53.htm
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
0001-exploits/iis53.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
0001-exploits/index.html
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
0001-exploits/index.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
0001-exploits/krnl110.htm
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
0001-exploits/krnl110.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
0001-exploits/mi009en.htm
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
0001-exploits/mi009en.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
0001-exploits/mi019en.htm
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
0001-exploits/mi019en.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
0001-exploits/mi020.htm
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
0001-exploits/mi020.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
0001-exploits/mi021.htm
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
0001-exploits/mi021.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
0001-exploits/midikeys.html
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
0001-exploits/midikeys.html
Resource
win10v2004-20231222-en
General
-
Target
0001-exploits/iis53.htm
-
Size
4KB
-
MD5
420df2c0f778194590d6ca0d2f538ccd
-
SHA1
f62c7936061de6818853ae8873f76be703d45238
-
SHA256
c6301bd7666cad9967d8dafc5ad77f1302a8469ac918b24e757bf1d26a8ed0d1
-
SHA512
853efa1b310f6b2cb0b4b9c81f6a2f15c55a0accd42dd1503bc34e94414b0ff2f4c3d9f64631dddb6ab70f1bcf4e09c144fcc2879acdf7bcaa776814f61b3c62
-
SSDEEP
96:/0STSROSQZ1ClNLl5Sojd+c9SoSjheS81TSXR2fSEdSoJsSpteSzD4SowmS5:sSTS4S6ClNLHSg9S5sSkTSh2fSEdSZT0
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8DD93AC1-A166-11EE-8CE9-D2016227024C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1960 iexplore.exe 1960 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2024 1960 iexplore.exe 15 PID 1960 wrote to memory of 2024 1960 iexplore.exe 15 PID 1960 wrote to memory of 2024 1960 iexplore.exe 15 PID 1960 wrote to memory of 2024 1960 iexplore.exe 15
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0001-exploits\iis53.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:275457 /prefetch:22⤵PID:2024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538a78a84d02653d7168cdd0c2a951a88
SHA10c39a1b86e4878f2188d4e92cba835caf7035a50
SHA256b5e81e7fbaa4a3d9693fe23f1ab4a57ea7bfc29e8dd0b829a6c796a3ed5db664
SHA5125b1d5f4313188c456c7daecffecfaa7967f4c7a40d60d5fedc9506164504f261c1dea80b6fd2a224194266391f85070d4f4339cb52138ca68db0e796ca29669f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7b61ed88deb5cd6ca9f5346092d00d2
SHA163f36e9fd183db104084bf28096e6cd0477f80bc
SHA25695a14aba23d73185afc469a4176686b4db31acef1d22cb65b96839040b390cb9
SHA512a2d6db7d057629ad853033d214ffae617d7db7589ce38ba0f6783ce7330665b18a249181cb652c1ac5c3e8b69071562dd0748cecc723fabd1adea33d60feff10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511bf06e2e4931fe65554ddfa02187f2c
SHA14f3c735fb528fcd14f70b3ed6abccb0997ae1f1a
SHA256c7a2a92e62f3727500d876a2db1fde638472cd209ec44d79ea3133ff3258d18c
SHA512c1d4b88feb84d49e5601df90b9fe56fd318bb4188928667046ef7932a5bb19b0ce9d5b20369fa35db178bbcdc70ef7b7bf4b30544f0d4746f68d339beeb8bbe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a66f5d377eb901dff8ad6835039f9c62
SHA1f756eda098b23d61933c01244c5386136d930bb0
SHA2564f668e57c96c627d9137d2dbb8347bc758bc3a000156b1a296c4051d860b4853
SHA51230a018bdaf6dfd194fae45d0be8fbf52e80531ee58073db6e9e8646ebd2ad55b90cf40da7893883294a22a160c987b55a1f661a151f160429933a79a5b6524da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f1e04d8e0ac8556311df646315f49d9
SHA16f1c0e902d8ee56083bd1dca0bc9b549ff5eb165
SHA256d849b0a2475600a8bfd6f001cf75428f96d71668fcba5207bd22fd7ba0d72e57
SHA5129bc52ede272cc940bb80bf040e9d71bc54b91125688c0ddcdf0d58f65d65cc8d7ee930fdfea82fad0d06a68813ca33cd398444bae8efa430b8651bfb5aa1f9a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56abafed59ef8eed6ed8e97128e87ce37
SHA16a6fdf45d7204b155b4670dfa80cf58944f3b290
SHA2564c765c3644004c91321a442100015916e1273d620b0d94a7488184addd9aa7df
SHA512617297c93a1bc3400eb2407bbbaad170bda95503c40c0a82456f852673a9726d7e384e2f38ce4723ccfdf3ea9c30c4fb913d9d6bc5fbe4a578dcb3180ef2ee1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f07aa6874fed6f5b8caef52e2ea24048
SHA1a6ce2db2f11ce4361a77e98a04c3a212803d8dd9
SHA256e949e7f02c38d309525ed3ae5a5bd6ef70310c1d323779e04ea48ae7ec34e511
SHA512c0b9a16227228fc6e4077d7c83119c4bcfea2c7e95861fc66976688e7e68cd3be37ee723c7c6b909101ba2d511b97826eb9f5cc179ec1e41046f44a15c00c70a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2f0973b11ca6bf1bdf7fcf861382356
SHA11e1e0605a845db5a80362e3289001ceee61f54a7
SHA256f13dfae1be4a807e0cd876722794502f63c022c067916ab27ef23dd2bf4f1c75
SHA5127b8847cb3acbc13168b6169f287eedb4ea2076e857876fae294649d8c7bcb2c0b05260b673f5ec694eae13d366dab2a622b87126a2624e50bc16f3c20ac63d87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a8b41ee25bea362f16c89feb778af5e
SHA10292a120e7a728e2b8da17cab6510a4e3ee1c435
SHA25605d412f8dd1de96452bfe0be9d71ec240420ccdc04aca18985f240aef2d6d719
SHA51270e28631afc5f796f5e54f5f48c9e20cb8ade3b45e4854d744fe52e5440edb1c95ff35f328fb0353f8f65b5762033d5a722705be38a3e0be34e982427dbc2151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab10cd8df862b7d5f6621b75d42433fd
SHA120f8800ca9ddca157b18d1fad08774b427ad66a5
SHA256877f1e902b12710ce9b3bf497422bf5bec0f7808636878b00d4bd16f46a4beda
SHA512f88b99883e551bfb07450113779a63dde3ae7714e1b21e9197a5b33cdec82d9e0480447c51ba5ed68bc8b3a58efaf397b96e108274d2d920e214bf44448c161b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5874da81a7a385032cfb8a86bca87c6ae
SHA127471e06bad667093e9ba3e3b6ee5e50ec04a8e7
SHA256dedbe226aa6481adeb31d058311d4c69ebc88c8a8df93ff1610ca5574717f5bd
SHA5121133ef5a1dec5192e0876e8a22e8b0f534285c8902515f07bfd1f678c4d0632fc0ccebba096e395775db522f757388c6e2bdf05bb6b73d4f39ae3c22ee57805c
-
Filesize
1KB
MD51f1a3b101012e27df35286ed1cf74aa6
SHA146f36d1c9715589e45558bd53b721e8f7f52a888
SHA2567f0b1fe38c7502bea9c056e7a462ab9f507dd9124f84b1d4666fb7d37cf1b83c
SHA512d6f6787de85049d884bf8906292b0df134287cc548f9f3fadd60d44545652d55c296ed50e72687f776f0bf6b131102b4bf9b33143998cb897f21427fbc8306a3
-
Filesize
21KB
MD53145b3bbc2789358523faf9f7522a818
SHA10fc7219bb9a49bc8a518ffca452f638d794e9e1b
SHA2565a90e32eedd922f6e77ede7b28e368f9eb446990adb34a3649b8469e47df2165
SHA5128094d573d0698e451ea906c7412e8b98b206a37e1051a772b959c1415175f20d40ba8ba609e2b2b7da3bc0b2175e390fc28eb59542ca60aecbb418095810848e