Overview
overview
7Static
static
7Lenin_Scri...do.htm
windows7-x64
1Lenin_Scri...do.htm
windows10-2004-x64
1Lenin_Scri...ert.js
windows7-x64
1Lenin_Scri...ert.js
windows10-2004-x64
1Lenin_Scri...ds.htm
windows7-x64
1Lenin_Scri...ds.htm
windows10-2004-x64
1Lenin_Scri...-1.htm
windows7-x64
1Lenin_Scri...-1.htm
windows10-2004-x64
1Lenin_Scri...-3.htm
windows7-x64
1Lenin_Scri...-3.htm
windows10-2004-x64
1Lenin_Scri...ads.js
windows7-x64
1Lenin_Scri...ads.js
windows10-2004-x64
1Lenin_Scri...RS.dll
windows7-x64
1Lenin_Scri...RS.dll
windows10-2004-x64
1Lenin_Scri...nd.dll
windows7-x64
7Lenin_Scri...nd.dll
windows10-2004-x64
7Lenin_Scri...or.dll
windows7-x64
1Lenin_Scri...or.dll
windows10-2004-x64
1Lenin_Scri...en.dll
windows7-x64
1Lenin_Scri...en.dll
windows10-2004-x64
1Lenin_Scri...og.dll
windows7-x64
1Lenin_Scri...og.dll
windows10-2004-x64
1Lenin_Scri...ls.dll
windows7-x64
1Lenin_Scri...ls.dll
windows10-2004-x64
3Lenin_Scri...ll.dll
windows7-x64
1Lenin_Scri...ll.dll
windows10-2004-x64
3Lenin_Scri...le.dll
windows7-x64
1Lenin_Scri...le.dll
windows10-2004-x64
1Lenin_Scri...dx.dll
windows7-x64
1Lenin_Scri...dx.dll
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 12:23
Behavioral task
behavioral1
Sample
Lenin_Script/#Beginner - IRCops, Who they are, and What they do.htm
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Lenin_Script/#Beginner - IRCops, Who they are, and What they do.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
Lenin_Script/#Beginner - IRCops, Who they are, and What they do_files/mseovert.js
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Lenin_Script/#Beginner - IRCops, Who they are, and What they do_files/mseovert.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Lenin_Script/bordem_net full commands_files/ads.htm
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Lenin_Script/bordem_net full commands_files/ads.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Lenin_Script/bordem_net full commands_files/i-1.htm
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Lenin_Script/bordem_net full commands_files/i-1.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Lenin_Script/bordem_net full commands_files/i-3.htm
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
Lenin_Script/bordem_net full commands_files/i-3.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
Lenin_Script/bordem_net full commands_files/show_ads.js
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
Lenin_Script/bordem_net full commands_files/show_ads.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
Lenin_Script/dll/BARS.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
Lenin_Script/dll/BARS.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
Lenin_Script/dll/Band/band.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
Lenin_Script/dll/Band/band.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
Lenin_Script/dll/color.dll
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
Lenin_Script/dll/color.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
Lenin_Script/dll/ctl_gen.dll
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
Lenin_Script/dll/ctl_gen.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
Lenin_Script/dll/dialog.dll
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
Lenin_Script/dll/dialog.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
Lenin_Script/dll/dlls.dll
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
Lenin_Script/dll/dlls.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
Lenin_Script/dll/edll.dll
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
Lenin_Script/dll/edll.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
Lenin_Script/dll/findfile.dll
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
Lenin_Script/dll/findfile.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
Lenin_Script/dll/mdx.dll
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
Lenin_Script/dll/mdx.dll
Resource
win10v2004-20231215-en
General
-
Target
Lenin_Script/bordem_net full commands_files/i-1.htm
-
Size
558B
-
MD5
c784d953cf435e0f5c2776720114a9ba
-
SHA1
39ec1a26a62075703e7628d22b847ef1bb5b6293
-
SHA256
7ad89521a3b8b3962ba6a2cccbf100c168efc7e12ede3e5221751f815de53ef6
-
SHA512
ebb29afe84be86158bd7284a8d5c31237bce95338181e04c2d6ffe185d6e7b4a9d325a4dfcb84ab7a28292a3bcccf303d9dc57f1ec32c0eb6101c5044f983914
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409908486" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000006aa9d50f9e5de6416131c1734dd7b3901b7e3a4042d38f87bc0193ad0a16dd3e000000000e8000000002000020000000dae364ae42e89f7f4065184d86be311decbb106c13b24bb8a8492ec57ad1a01d2000000050a74c497f4cca8da47e76ec9f91a8a89e2f330a458e2fa4a5271fd1c575b67a400000001f486ce41601635684bfeeb66c108196b2f715925236423336f3dac8ddf59e185b645f27ba7aee1e18f3f7c2fb107134097870360bbe2f652ea50c951d8134c6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 008aa71c5b39da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{473E2FD1-A54E-11EE-BF8F-CE253106968E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1204 iexplore.exe 1204 iexplore.exe 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1204 wrote to memory of 2912 1204 iexplore.exe 28 PID 1204 wrote to memory of 2912 1204 iexplore.exe 28 PID 1204 wrote to memory of 2912 1204 iexplore.exe 28 PID 1204 wrote to memory of 2912 1204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Lenin_Script\bordem_net full commands_files\i-1.htm"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f0c96f627af740c872d6f84829aa8be
SHA129db8540638c08ec6cedcd70d65c4b6681d3394d
SHA256993549f6dc4e4f3c7a712f0a4f7e0c0b1e5756bb9291bd4d78a5ed2d55003c02
SHA512e5c6b5971f7519e4fd648c37ab573df0c0d99e95cc1179bf5293fc620893976d04d3649ad3109c8624e886582919b53df9faa5134d6cfdc893ac13044f260405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565d0cbc3b660306ba59ca45d2e7d5c2e
SHA12fc5996993387583008ef9faef6d4e7702ec85dc
SHA256b4356542dc21122865723344c20aff9da471d8afb2573eba2b08ce835092732f
SHA512b17d1577a16800f38eda80fcfe915d3fb987acd8d6cda6721ba208a6e4d4f7f79317d24c39d5d0980fc383753e3b06279be13d3dc492f0b6b1dbc7089c44d05e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5666df613754d67c8511d5a4a1fd0e40d
SHA1038b61bbc4daa0b7ae377ad6900caf95a4981dd1
SHA256f02abff11b64f9dd8756c0cff42a441b5df50ce88a4bc7230b402d52fbee4bed
SHA5121f83673654f1d112d178aa8a3b0c804841f37048678fdfd8a6b67c676cfaee7ab5b5e2dce3f60b12848669d3ef64f2a22917e62e3fdfa1660560d76d1593e255
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5caf72ac2a86ae14ea3d03ca490cbdc29
SHA14c6a80debc7303bf86e49322fe1b242bbbd0f5cd
SHA25624f68d38f03a9c3877af0b42c5289d64dd48140e4e6acfc766587314c51e3f15
SHA5127c2a935892f4c38fb9331acb6bd83f1973721943063930218c582066fbe9796699538c48919e0fee38eb57d9d145c67b6a744387fabf825c10d47f29acb3c096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e5c191a372d60ea7968d596049a39a0
SHA1becb4ad73bc3215116648d1e0278e3d849f5ea93
SHA25668b2ff479b1e264ed0fa12e5014a105c971311bfafdf7763cb2cc781c7516a97
SHA51214ea9be1fe436d3d7f496cd7b4063cd1748730a8a5e9b0f500313ff29aeb273adba1089a384a5afe63048e51232441e5478ce3ebb0d331f3f31da08082af7599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b117c3c40574de98afffc2b4a1544bc2
SHA1037fba7295090a8c841954678ee92cd682c66fa1
SHA25691120eb32100374ce5ba91681517edd542d501198e62e81659ea557505bd0c6a
SHA5126d403dc082275854ad7e6a0331f41928bb35d521cc9f151fbea73c66e4e9cfb46199f9b2cb4602668b579b5aa4248b1dfc5085bcf8517672c9a7a35c48821817
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06