Overview
overview
3Static
static
3ajax.ps1
windows7-x64
1ajax.ps1
windows10-2004-x64
1api/index.htm
windows7-x64
1api/index.htm
windows10-2004-x64
1api/新云软件.url
windows7-x64
1api/新云软件.url
windows10-2004-x64
1attach/index.htm
windows7-x64
1attach/index.htm
windows10-2004-x64
1cache/index.htm
windows7-x64
1cache/index.htm
windows10-2004-x64
1class/archive.ps1
windows7-x64
1class/archive.ps1
windows10-2004-x64
1class/array2xml.js
windows7-x64
1class/array2xml.js
windows10-2004-x64
1class/cache.js
windows7-x64
1class/cache.js
windows10-2004-x64
1class/calendar.ps1
windows7-x64
1class/calendar.ps1
windows10-2004-x64
1class/cart.js
windows7-x64
1class/cart.js
windows10-2004-x64
1class/chinese.js
windows7-x64
1class/chinese.js
windows10-2004-x64
1class/clas...ler.js
windows7-x64
1class/clas...ler.js
windows10-2004-x64
1class/config.vbs
windows7-x64
1class/config.vbs
windows10-2004-x64
1class/db.mysql.js
windows7-x64
1class/db.mysql.js
windows10-2004-x64
1class/email.js
windows7-x64
1class/email.js
windows10-2004-x64
1class/excel.ps1
windows7-x64
1class/excel.ps1
windows10-2004-x64
1Analysis
-
max time kernel
154s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 02:17
Behavioral task
behavioral1
Sample
ajax.ps1
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ajax.ps1
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
api/index.htm
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
api/index.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
api/新云软件.url
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
api/新云软件.url
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
attach/index.htm
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
attach/index.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
cache/index.htm
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
cache/index.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
class/archive.ps1
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
class/archive.ps1
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
class/array2xml.js
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
class/array2xml.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
class/cache.js
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
class/cache.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
class/calendar.ps1
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
class/calendar.ps1
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
class/cart.js
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
class/cart.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
class/chinese.js
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
class/chinese.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
class/class.phpmailer.js
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
class/class.phpmailer.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
class/config.vbs
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
class/config.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
class/db.mysql.js
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
class/db.mysql.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
class/email.js
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
class/email.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
class/excel.ps1
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
class/excel.ps1
Resource
win10v2004-20231222-en
General
-
Target
attach/index.htm
-
Size
69B
-
MD5
b48f668d29cf52a6db9a95f56b3fb67e
-
SHA1
70d9a5412e54da30dc44868e21e1c00cabf04a15
-
SHA256
544503741cd48b65bf728ac517f8ed5b40961a7d8d359127b2d2fc24169cfb4d
-
SHA512
e30f600598f12bf6608a284eec1153720d1f8cc5e722a85928d02d2c3d53c533a1cebbda558066d4965b50d6c57ab06959b5003b622469c99db1d471a65b895b
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{DA7B1B8F-A7B7-11EE-B6AD-7E4216712C33}.dat = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2713907362" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2713907362" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{DA7B1B8D-A7B7-11EE-B6AD-7E4216712C33} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31079364" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31079364" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 400 iexplore.exe 400 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 400 wrote to memory of 408 400 iexplore.exe 94 PID 400 wrote to memory of 408 400 iexplore.exe 94 PID 400 wrote to memory of 408 400 iexplore.exe 94
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\attach\index.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:400 CREDAT:17410 /prefetch:22⤵PID:408
-