Overview
overview
9Static
static
3Code Virtu...lp.chm
windows7-x64
1Code Virtu...lp.chm
windows10-2004-x64
1Examples/A...le.exe
windows7-x64
1Examples/A...le.exe
windows10-2004-x64
1Examples/A...32.dll
windows7-x64
1Examples/A...32.dll
windows10-2004-x64
1Examples/A...le.exe
windows7-x64
1Examples/A...le.exe
windows10-2004-x64
1Examples/A...e2.exe
windows7-x64
1Examples/A...e2.exe
windows10-2004-x64
1Examples/C...ct2.js
windows7-x64
1Examples/C...ct2.js
windows10-2004-x64
1Examples/C...e.html
windows7-x64
1Examples/C...e.html
windows10-2004-x64
1Examples/C...e.html
windows7-x64
1Examples/C...e.html
windows10-2004-x64
1Include/C/...on.pdf
windows7-x64
1Include/C/...on.pdf
windows10-2004-x64
1Lib/Device...DK.sys
windows7-x64
1Lib/Device...DK.sys
windows10-2004-x64
1Lib/Device...DK.sys
windows7-x64
1Lib/Device...DK.sys
windows10-2004-x64
1Lib/Virtua...32.dll
windows7-x64
1Lib/Virtua...32.dll
windows10-2004-x64
1Lib/Virtua...64.dll
windows7-x64
1Lib/Virtua...64.dll
windows10-2004-x64
1StealthMod...on.pdf
windows7-x64
StealthMod...on.pdf
windows10-2004-x64
1Virtualizer.exe
windows7-x64
9Virtualizer.exe
windows10-2004-x64
9Analysis
-
max time kernel
122s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 03:16
Static task
static1
Behavioral task
behavioral1
Sample
Code Virtualizer Help.chm
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Code Virtualizer Help.chm
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Examples/Assembly/MASM/Via API/Example.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Examples/Assembly/MASM/Via API/Example.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Examples/Assembly/MASM/Via API/VirtualizerSDK32.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Examples/Assembly/MASM/Via API/VirtualizerSDK32.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Examples/Assembly/MASM/Via Macro/Example.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Examples/Assembly/MASM/Via Macro/Example.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Examples/Assembly/MASM/Via Macro/Example2.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
Examples/Assembly/MASM/Via Macro/Example2.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
Examples/C/CBuilder/Project2.js
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
Examples/C/CBuilder/Project2.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
Examples/C/VC (via ASM module)/vc_example.html
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
Examples/C/VC (via ASM module)/vc_example.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
Examples/C/VC/vc_example.html
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
Examples/C/VC/vc_example.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
Include/C/Via ASM module/How to add ASM files in your Solution.pdf
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
Include/C/Via ASM module/How to add ASM files in your Solution.pdf
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
Lib/Device Drivers/32-bit/VirtualizerDDK.sys
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
Lib/Device Drivers/32-bit/VirtualizerDDK.sys
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
Lib/Device Drivers/64-bit/VirtualizerDDK.sys
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
Lib/Device Drivers/64-bit/VirtualizerDDK.sys
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
Lib/VirtualizerSDK32.dll
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
Lib/VirtualizerSDK32.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
Lib/VirtualizerSDK64.dll
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
Lib/VirtualizerSDK64.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
StealthMode/Device Drivers/How to add ASM files in your Solution.pdf
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
StealthMode/Device Drivers/How to add ASM files in your Solution.pdf
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
Virtualizer.exe
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
Virtualizer.exe
Resource
win10v2004-20231215-en
General
-
Target
Examples/C/VC/vc_example.html
-
Size
1KB
-
MD5
97ea28334d67d71e4a96b56d76fe0d15
-
SHA1
caffb42a57d09d6b8246c583f0d76004fd003d86
-
SHA256
9965e660e07492e5c45bc7c52b981d1d65f6341a415979742418f5f699c1e771
-
SHA512
0f2c0e693dd4e83e3c0bd2b68f6015a878f77b87dd0c84da836416b74e4284e8787c19b5d361732ab0d45c2b9c924746d73dba1493d1722b93731db6229120a3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{319D1BA1-A742-11EE-B309-FE29290FA5F9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f120000000000200000000001066000000010000200000000b35435280932d2f25f989dd36c003ec3b539ac0085b46bc0fd5685eabcd0db6000000000e800000000200002000000015cbc848b6749787471535a4fcb6bc8aaf9bcc6082b806539c26f7a18ce34167900000005cdc66c6b59310d3e91f4a198df84dad944f8593b31d212ee8dc9a1c14f2f165b1f539b28311bd304d61d3c07951c8bff09584d18c4ec8d5e1e5bead083c409341b610f21a52b85fc8102e30a9493062d56f328b761dfef7013c350c507987de19beb6baf160315126696610b200fb16648d69815d759b0c12aae7372200460d6233add774247f8ae8322515ad87d8cd400000003240b71c2cc6b8c1f632542f66f191dfb9421c0509e071c68a7666496906d52129fcb1127ca3e6a8052b10b75f8f840e8cd764aed7bb2f2679c98b18c244e577 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d058fc054f3bda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410123196" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f12000000000020000000000106600000001000020000000e7ac2d04cbed6037bad3c5af91a4e234b6b4a42562c51b0c60b28ff0214b6247000000000e8000000002000020000000462a2f55f0cc13da6d66673f3e250da48df9c9b929ef5fad3be03b5e0c5f272b20000000dae3ebc5ceebb00b1dfe579ec5077dbc7bf03cbab09da7e1ac9ec4349c83341e400000003d0dc8d5fb18bafe6225716926c2e5e166eafd7e024b6018a8904215dc7bca3ec1a2150b60ed800ca35e05f0f9cfb54c07a20a6d7e38341229b19321642549fe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2940 iexplore.exe 2940 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2764 2940 iexplore.exe 17 PID 2940 wrote to memory of 2764 2940 iexplore.exe 17 PID 2940 wrote to memory of 2764 2940 iexplore.exe 17 PID 2940 wrote to memory of 2764 2940 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Examples\C\VC\vc_example.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2940 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5a145df1babb8062cdef90e039dfc5a19
SHA101871a1e009404287b55e4b376c1c32c6360924f
SHA25601a005b9cf2d7bce203dffa20be872f0c1f7030dc4be3aad6bcac7576cb5d353
SHA512f9fb8ba6539b3ca5519bc01797d31bb36ac2e3252aa1845cb1457c102a37943e24953516113f3fbf75f6426e5b165cc02e1ea9da77f1090093d28226d234f214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5458c95cb955ebdb5ba81ff82e1596a77
SHA1e1db3af307098374e51d5456f8a3a9e8b7f9cf4c
SHA2569e6066f636023a867c6c0f2df49335fb3f85ad37bb998e4d480c276db8e5b349
SHA512b6b02406ab48a4b1afc6765dc3ce3e0b1c96e5c29d9156d7ead5ab72c76e075c9ef4985e58d2bf28d2079393c48cf97b8ce42330c4834389e2707df9579d353b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6e6c480f15b2d402a2504143f0402ae
SHA165341da9db51f4dc0d65c536eec6de5c2a555a27
SHA256303ef7ceb23cfc579d5b48a2b13f58fb37b3895fb6a0c02a01899ae5acc4499e
SHA512918119e20484a937acf30aa9b4424fa69cfb29c485bcd3e2866bc75e24f5fe32c67545fa732b81bb24264926514d0b1ec29f4e968b7dae91b5fc47eaefb30962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD532c1e293f0c6326b7e83418cda31ddf8
SHA17afb98cdfe0ccf363739e8e25cc6d50a91c993e2
SHA25690e46d7686bbabe93bad91732db00011ecf6ec7098523195b361aec64007bc53
SHA5122f269ba7ed72725caac61037f2bc3f1c1085caee63c03592c4748c3928a2b7553b8205054408053ec635c745120c626fdd403e6160cdbdc91274b2d3c09c4fa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD54ee3aebd6847c55636946d0c0a527604
SHA1e4a05dc0588257f5d426d4f2d3e663facae20ea9
SHA256793c473c469567a4a0e99962d032b2ebac572ae3767807a00719fc32094a9dfb
SHA5128c5155e5c9ebcf66c2649b4e559ea307d272582db213d1d57d0b582ff96080be2a4ce08f768a3b13449cc44e88839b06038ee61cc0d698bab3a1a02f5193b1c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
45KB
MD5cae17bc9c5d74e0e1142b20a7889efdb
SHA1cfea5f7d29a7dad0a1a25daf18a0cd4cb79cac86
SHA2564d74c7d252b593f92d04a5538ff5688a4ec720ab664ac723512fbcfa3f5ab691
SHA51242ba66aa767f8a15ce38f9e72990fe41e4fb2d7266e4334be0bcb7db7ac7eb38e7f3b424bb4fc5583197257e9fefc11ab19285f0881a054f338463fefb483dfd