Overview
overview
1Static
static
1upload/cit...se.ps1
windows7-x64
1upload/cit...se.ps1
windows10-2004-x64
1upload/cli...ent.js
windows7-x64
1upload/cli...ent.js
windows10-2004-x64
1upload/cli...ex.htm
windows7-x64
1upload/cli...ex.htm
windows10-2004-x64
1upload/cli...ex.htm
windows7-x64
1upload/cli...ex.htm
windows10-2004-x64
1upload/cli...ass.js
windows7-x64
1upload/cli...ass.js
windows10-2004-x64
1upload/cli...ex.htm
windows7-x64
1upload/cli...ex.htm
windows10-2004-x64
1upload/cli...ass.js
windows7-x64
1upload/cli...ass.js
windows10-2004-x64
1upload/cli...ass.js
windows7-x64
1upload/cli...ass.js
windows10-2004-x64
1upload/cli...app.js
windows7-x64
1upload/cli...app.js
windows10-2004-x64
1upload/cli...ase.js
windows7-x64
1upload/cli...ase.js
windows10-2004-x64
1upload/cli...che.js
windows7-x64
1upload/cli...che.js
windows10-2004-x64
1upload/cli...ain.js
windows7-x64
1upload/cli...ain.js
windows10-2004-x64
1upload/cli...end.js
windows7-x64
1upload/cli...end.js
windows10-2004-x64
1upload/cli...ex.htm
windows7-x64
1upload/cli...ex.htm
windows10-2004-x64
1upload/cli...isc.js
windows7-x64
1upload/cli...isc.js
windows10-2004-x64
1upload/cli...ote.js
windows7-x64
1upload/cli...ote.js
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 19:37
Static task
static1
Behavioral task
behavioral1
Sample
upload/city_data_response.ps1
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
upload/city_data_response.ps1
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
upload/client/client.js
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
upload/client/client.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
upload/client/control/index.htm
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
upload/client/control/index.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
upload/client/index.htm
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
upload/client/index.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
upload/client/lib/db.class.js
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
upload/client/lib/db.class.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
upload/client/lib/index.htm
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
upload/client/lib/index.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
upload/client/lib/uccode.class.js
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
upload/client/lib/uccode.class.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
upload/client/lib/xml.class.js
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
upload/client/lib/xml.class.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
upload/client/model/app.js
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
upload/client/model/app.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
upload/client/model/base.js
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
upload/client/model/base.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
upload/client/model/cache.js
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
upload/client/model/cache.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
upload/client/model/domain.js
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
upload/client/model/domain.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
upload/client/model/friend.js
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
upload/client/model/friend.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
upload/client/model/index.htm
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
upload/client/model/index.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
upload/client/model/misc.js
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
upload/client/model/misc.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
upload/client/model/note.js
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
upload/client/model/note.js
Resource
win10v2004-20231215-en
General
-
Target
upload/client/index.htm
-
Size
1B
-
MD5
7215ee9c7d9dc229d2921a40e899ec5f
-
SHA1
b858cb282617fb0956d960215c8e84d1ccf909c6
-
SHA256
36a9e7f1c95b82ffb99743e0c5c4ce95d83c9a430aac59f84ef3cbfab6145068
-
SHA512
f90ddd77e400dfe6a3fcf479b00b1ee29e7015c5bb8cd70f5f15b4886cc339275ff553fc8a053f8ddc7324f45168cffaf81f8c3ac93996f6536eef38e5e40768
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00dc3499943ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000044efa3f88b9b7b7b05d9322a564c66a118325b556d4a3d53b56ed1da57f0f68000000000e8000000002000020000000f30994a4babfdd7103c256e666cd6a110aa94a60498c2887f96dfdf40d14cd682000000062b9e9d8797559db0b5d84612621427e68c21780b3078c96b773b5b52b2b6acb40000000a431cf72c25fa43afa2c11fb735350620148b84a7aa47665d7e86bc03f8e88958733a08fa33b68d4e5c0899e0166bf17c58b555583adf755cdfa4e3b5491cc15 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410043139" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C419E051-A687-11EE-BC40-6E3D54FB2439} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1720 iexplore.exe 1720 iexplore.exe 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1720 wrote to memory of 2072 1720 iexplore.exe IEXPLORE.EXE PID 1720 wrote to memory of 2072 1720 iexplore.exe IEXPLORE.EXE PID 1720 wrote to memory of 2072 1720 iexplore.exe IEXPLORE.EXE PID 1720 wrote to memory of 2072 1720 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\upload\client\index.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549fea72c1c031d05ecd13ae76a8d252f
SHA1bb4c0f109ba31c74eff212bef4eb412ff84dd954
SHA256bd20eee3166816d0b8bb38053a59572117fce40500bb3fbb2cee80335a2c3235
SHA512d619d69e00725a5df4fc3e9c4e0b90ac3e6b133865f760d4b7c93546625e86c75b09d8c0af3815f4cc85a0f1efd0c7679c1762e0f5516b61e1ea9d37d70cd092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bedc965335ca7a935fe974169557af0
SHA1c35885d6a3ef47f3ad7b43132867285bb03b8db9
SHA256063492b83f18449dcf97c77776618d4dae6f260f6e15ff36a56ba2e843aa8e7f
SHA512be33471ef701c3b25e8070cf8759583bbd7cc7601d2a72ef11d22911134a2e2c8efc1383b395cbbd7270e44284d9f53112e54e43fa07a0443fa01c60b919462b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50624f855be92c0a61977aec0e87bc903
SHA14d5c03b34f43ea4c8c97e37a82e0e7aecb08e975
SHA2561edd31ef0bda957fb979884b45c8684a42ad72de024f1cf83872d42bd3a367dd
SHA5127107975572e2adebe0be61b251c93df0359169ad9c90ab96100431a0868c06c20097dc9839ed8d0120686c3b10cb802922846ca574d57aa5223b15da20d0660c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c880a545617da419696ee30ed56b46e
SHA1e3008b4011b5023aa771d45d033a2787d3468ab3
SHA256e538e1c418fe81f273bc23248dff7b5c37a8ff97d8661e0cf67630eef015743e
SHA5125f3af3aff3803e161f4b51dfd76cba61c2fe08a3d4915664079e86ceb6cb9442cf32c414a13bd0855d5ebfd199a1e319af6ccab1add91c15e3f612b6217a5a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544e09484e5df29e0cf0e27446fe2966e
SHA14d8ab1b8b842f8d8af1ca45f0c70b1abc23d5ed3
SHA2565453f4f54cb788877c0807a117eac3c7be00f8f7dbdbaf2cf91ad4898ae00827
SHA51242a3dd8d69c68073a05ab08cb21580c4f0fa5a1103960856d653910b55dae0322de6813cdc896940275a0c6eb9be65d26ae94cd6aa06c49f1cb83bf807dc7ee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5834038cf56d05c0ff2e45d1a1cf752ca
SHA11d6b26be071aeb7e64959b5268cc3b436516190c
SHA256e8a8384f6859bf000ce6a3fb8bf75fdfa9c2a43dfbcde61811274fda51bcd2b7
SHA5126d990a74fb979ab118bd7c3f80c5bdcbe103bcb1c4dcc74db5aa3de3bd5eefe1038845bc372d12fc985be7a1cb73185ddba5b1f00dcb1befb2460e551351e785
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06