Overview
overview
10Static
static
10CHANGELOG.ps1
windows7-x64
1CHANGELOG.ps1
windows10-2004-x64
1administra...x.html
windows7-x64
1administra...x.html
windows10-2004-x64
1administra...x.html
windows7-x64
1administra...x.html
windows10-2004-x64
1administra...ml.ps1
windows7-x64
1administra...ml.ps1
windows10-2004-x64
1administra...x.html
windows7-x64
1administra...x.html
windows10-2004-x64
1administra...x.html
windows7-x64
1administra...x.html
windows10-2004-x64
1administra...er.ps1
windows7-x64
1administra...er.ps1
windows10-2004-x64
1administra...x.html
windows7-x64
1administra...x.html
windows10-2004-x64
1administra...ent.js
windows7-x64
1administra...ent.js
windows10-2004-x64
1administra...x.html
windows7-x64
1administra...x.html
windows10-2004-x64
1administra...er.ps1
windows7-x64
1administra...er.ps1
windows10-2004-x64
1administra...x.html
windows7-x64
1administra...x.html
windows10-2004-x64
1administra...x.html
windows7-x64
1administra...x.html
windows10-2004-x64
1administra...ner.js
windows7-x64
1administra...ner.js
windows10-2004-x64
1administra...ent.js
windows7-x64
1administra...ent.js
windows10-2004-x64
1administra...x.html
windows7-x64
1administra...x.html
windows10-2004-x64
1Analysis
-
max time kernel
71s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 22:55
Static task
static1
Behavioral task
behavioral1
Sample
CHANGELOG.ps1
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
CHANGELOG.ps1
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
administrator/backups/index.html
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
administrator/backups/index.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
administrator/cache/index.html
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
administrator/cache/index.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
administrator/components/com_admin/admin.admin.html.ps1
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
administrator/components/com_admin/admin.admin.html.ps1
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
administrator/components/com_admin/index.html
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
administrator/components/com_admin/index.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
administrator/components/com_admin/tmpl/index.html
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
administrator/components/com_admin/tmpl/index.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
administrator/components/com_banners/controllers/banner.ps1
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
administrator/components/com_banners/controllers/banner.ps1
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
administrator/components/com_banners/controllers/index.html
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
administrator/components/com_banners/controllers/index.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
administrator/components/com_banners/elements/bannerclient.js
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
administrator/components/com_banners/elements/bannerclient.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
administrator/components/com_banners/elements/index.html
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
administrator/components/com_banners/elements/index.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
administrator/components/com_banners/helpers/banner.ps1
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
administrator/components/com_banners/helpers/banner.ps1
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
administrator/components/com_banners/helpers/index.html
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
administrator/components/com_banners/helpers/index.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
administrator/components/com_banners/index.html
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
administrator/components/com_banners/index.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral27
Sample
administrator/components/com_banners/tables/banner.js
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
administrator/components/com_banners/tables/banner.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
administrator/components/com_banners/tables/bannerclient.js
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
administrator/components/com_banners/tables/bannerclient.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral31
Sample
administrator/components/com_banners/tables/index.html
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
administrator/components/com_banners/tables/index.html
Resource
win10v2004-20231222-en
General
-
Target
administrator/components/com_admin/tmpl/index.html
-
Size
44B
-
MD5
1c7b413c3fa39d0fed40556d2658ac73
-
SHA1
246f84103dc96f58f99c85e3a3149e4cae406a7e
-
SHA256
0f774764181a1d850141bf64393228b7acdb6261844f0165a78839f549d7bcce
-
SHA512
e05cd49cfa61dc4dc506c23151fd31558085a68544310c63b09386b5b6fd87e3d014e311596cc4f34da1cb9db0abcd9c5fa866c19e74c84718d941b7c5055a1a
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d6000000000200000000001066000000010000200000001174d974ee433073c8fa2fc1bc6dcd094ce71d9a738c0e095a219d56434de76a000000000e80000000020000200000000ce2ead90c2dcfec92dcde15a1a8ac4a4aefb8cfb7c12d9da11cfecb6d69ca31200000006ebd457f131277c4fe3e84ab1d0827c84114eb92706195f67e7887afa4e786824000000097688319da768f1475162bbed0450859bf9e093521b79b88eb884d1163d23eaa5e41cdb001cd95b8d775b5f057fc4b12dcf593ed719c18e5816fd531f892b0e1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{463F9241-AB2F-11EE-8837-E6629DF8543F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0dd991a3c3fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2300 iexplore.exe 2300 iexplore.exe 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 1972 2300 iexplore.exe 17 PID 2300 wrote to memory of 1972 2300 iexplore.exe 17 PID 2300 wrote to memory of 1972 2300 iexplore.exe 17 PID 2300 wrote to memory of 1972 2300 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\administrator\components\com_admin\tmpl\index.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5314e36c5fbe75282f7ed16ad88fdc1df
SHA1b3d4f916b1564dbf5ee134bd2ed1f290747a3518
SHA25682a220ba141e5bf18d6c66d996cf41a1ce27f735440c7038d6f7757b022d5ac2
SHA5120b0a073b0718b0bd63416b2c3cede60012c2dd35dd4009965cffad63ea015f7bb4013e068feee39dab45ffd50d3d2921689c900836b8baa5ae870c1df2091a39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a7ea1dde0afcaf53c1b265030b6925a
SHA1e93149c16022f14841048e3baa2b92b88d91611c
SHA256bcae0efb1bb66c1c7d25f6a68da7b75ba4fca209f04ad97fde8fb7aacf2fd568
SHA51220a7114779db02a728b7a489e300e0435ad0de12c85c0b8e388fc11bc9cf3850e1e40494f13a5ca6bf7141636f210b6d3d4976ce5fb8e1be2296c600bad924e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d51124a03d5403de8a8ef8d55afc5342
SHA1a47008baa725d90d5cd873d58c60e092799caa30
SHA256a344c0207d32e97a66aea0529ce4ba516d11c43160e70dec70cf53021ec7290f
SHA512f8a919147a14337b145278a2f9106dac595a56f451ee8ec2c4db3a4f6518c3680964ebf2c48ffc53f67ffcdcc4d5f4eccad66b4a38758ab5eebbee7901b7c999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5484d12414a433cad3dcd5b3c675f6714
SHA10b4ee930b5c42a542bf8a0b401efcbc1d5ca9a60
SHA25622a3ed64be7f104f25045dbce38fd466890bc58264cdfdc219d05d17eff3cd84
SHA512fff14feec6cee4f0ff2e45e93f517849b3be6c08d6ae9d6657e895679b75c49c00503fca70e04feb2df1e314e905223768069b251dc30e879a6f3058c11a4ce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7345701824161270da206a783974e64
SHA16b86302caa3c46180c4b3b87cce9895e5ec7ed32
SHA2564457797b4f83eb18f12d3c0f56859054d945d9e295f5937aea0d068293e6320f
SHA51249e16e155b95e1eb906256c50de66125c32f5409cb17fd1ae47f9214ade3aea9a90dd2e42420012961182e04a5a4b9494eb6e79438abbd4e9dafa14f6593a7fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547ce2cb8c66490eff453590f4579aa3c
SHA15dd1a34eab37a90b0bd88637373fb196c7dffce1
SHA2563708b15cff09316378dcce112c2c39f1e8764a15538933179275425517520aea
SHA5129eda0f4d49e41ce63a816c53488062aafc3ec776a8ae5d772dd6a31b74263504599206f30436bdac49ac6d925a898010da483dff238c9bad464b1304162daaae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cf108d67a67b16ee4ab9e2a28dfc79d
SHA1254e3c589742a288b7a5e4c113c480ab5285ec7c
SHA25643f6eb7ae9f1e985554b44d87519675400f2309192e4cc7027e81444b54fc4aa
SHA512985e384ad3ad38c1471905439f0dad044928e6dc5c3b34073e2e6bd637834a07ee9abbe7f183ae61540939be7052df5bbf2f929889adae25634e22a0410b9ec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57187abf9179b7131ad7d108089c97d90
SHA179452f257bb83d9021142749ae0915b562219a8b
SHA256443a1c177ba0cc006a083d7b5e2a8a639da9e33edfe44309d67c9db5530a2dd6
SHA5126b0a5c783b588a5a4c10e63e500a5006fc8830e5e5ed54a66be3e67138841fd8e89efaec10841c29221e06663f472cb62aa3d499abf4b0fc6506a12ad720f2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e958a1c6052766ea7f30e57d0b8e0731
SHA143ac0290cffcdb161b1d6d44afbcfde7ae90ae15
SHA256817fe537cf005766a742be1972a877e871749814aea002227a7b12808c9c0fe0
SHA512476531df27366bb032ec26675672e5d6ec7070ff2c250f2f4fef64bf8a795c00504807298594b84555d1bb19aff307305951518efd5d3a272f3c070d7fcd8a5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a57b10626cdd14cf3892f7249ce5be2e
SHA123a863b93179e0632d4925a5c736338a93d0cd17
SHA2568a194603e39a122916a6e4445a44e89662860f6d6353b335f4a1e910d01000a2
SHA5124e6f19f44c10c69e6d85c7f6f785749b3b942638b1323c05b36e151f3b70553b29eca93ee79f5d6d9dddd9c0d6714b3835c6d5d993834c69e8bf22b0b58cb7b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d190ce0f56dc37f8281f9af9ff9aa87
SHA1d67c595a0d9ba0fbb2e02c3b5dbe6fdbdcaaf6bc
SHA256149316681276caf0ca1bd581ae6e4d527ed75aee7e9b1e46e2163f3abb6c6458
SHA512c8dd1a349ce0c75747de2c40c15233da9e517a22b04ef690eaa965320b2a25cd487de2e00069c4acaf850a8600274041fd66cff34c48dcee9099b2277dff260d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f7490a8d4e4a8916b1f031670a1cb45
SHA133d86c0cf8e407557bd1d38c82f46d62c2d0875c
SHA256f950eb73b119989aeaa2694578cb38601e68045691906b05814c54e9761a63ef
SHA512a09c913b4c97d1e82a4f890a1ffd6ba41c4f364d993b6ec92605a663b60a39b43ead1d313be7cff3f7e49709cebac49f995489e8be48bd86299aaeb053b7b411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3dcbc72d7ab40a32b9f3d63b849985b
SHA105bbbcfbfbdb82aa51c4cb82d9f3ef77a04b434f
SHA256b9421a05db03a96662a39636ac2cf19d157ec33d7ab43055375d62fb3648b295
SHA5128cc8425e232f62a5b92ec837d125e19a1c195fee1ded761b75d2166c788a637444e2a844c9712a8d5470cfd13aa9a5d05044d3fceda2d5a2fb02bd414f5ba2f3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06