Overview
overview
7Static
static
7Data/Astatix.url
windows7-x64
6Data/Astatix.url
windows10-2004-x64
3Data/CrazyTet.exe
windows7-x64
1Data/CrazyTet.exe
windows10-2004-x64
1Data/DGO.url
windows7-x64
6Data/DGO.url
windows10-2004-x64
3Data/Games.url
windows7-x64
6Data/Games.url
windows10-2004-x64
3Data/Help/...ng.chm
windows7-x64
1Data/Help/...ng.chm
windows10-2004-x64
1Data/Homepage.url
windows7-x64
6Data/Homepage.url
windows10-2004-x64
3Data/Regis...g.html
windows7-x64
1Data/Regis...g.html
windows10-2004-x64
1Data/Regis...s.html
windows7-x64
1Data/Regis...s.html
windows10-2004-x64
1Data/Top100.url
windows7-x64
6Data/Top100.url
windows10-2004-x64
3Presetup/Ungins.exe
windows7-x64
7Presetup/Ungins.exe
windows10-2004-x64
7Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 20:40
Behavioral task
behavioral1
Sample
Data/Astatix.url
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Data/Astatix.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Data/CrazyTet.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Data/CrazyTet.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Data/DGO.url
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Data/DGO.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Data/Games.url
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Data/Games.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Data/Help/Help_eng.chm
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
Data/Help/Help_eng.chm
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
Data/Homepage.url
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
Data/Homepage.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
Data/Registration/reg_eng.html
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
Data/Registration/reg_eng.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
Data/Registration/reg_rus.html
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
Data/Registration/reg_rus.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
Data/Top100.url
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
Data/Top100.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
Presetup/Ungins.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
Presetup/Ungins.exe
Resource
win10v2004-20231222-en
General
-
Target
Data/Top100.url
-
Size
89B
-
MD5
69c38f286df818b3143262368d2defac
-
SHA1
217fdf3e16aedc6bd7c34fc65f841c032763a3e3
-
SHA256
25e1f4f403c488473499ddd83212d5944fb959accb2593ad2f614ff0d4421eba
-
SHA512
5349c894ad2125c4e8dc6b61697261974e46e9de7b8d8c4bfa29bf7c4ab00351f18260395901117e5aa3281794461aa2efd0c74ef187bc42e59350e42f0eb1f2
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d6000000000200000000001066000000010000200000008b5f3fcc2b2e8c83e381f16f4d142437d988060e97067a36dc2a43e428439c62000000000e8000000002000020000000e6f278d0e17cf5caa3314542ef0272b62bba95260e5226b2569d73c0f3899447200000004adaeac6bee03c89cdb492bc0163f68ec2f2f7bcc8d1bde3fdbd39ff397749114000000010fae491c023cff997c0663195e374258f149d647288108fe06803c326f47473f14171c8c30a0a1b65258a2bbd51d416337aaf7e737ccc03e875483074962b32 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E9E797F1-A85D-11EE-8D93-6A53A263E8F2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410245050" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 903db8dd6a3cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2012 iexplore.exe 2012 iexplore.exe 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2484 2012 iexplore.exe 17 PID 2012 wrote to memory of 2484 2012 iexplore.exe 17 PID 2012 wrote to memory of 2484 2012 iexplore.exe 17 PID 2012 wrote to memory of 2484 2012 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2484
-
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\Data\Top100.url1⤵
- Checks whether UAC is enabled
PID:3036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5515d5c419d48720f0051de589af16c08
SHA1b85f27b517f1e90843c3c90f96dae41368aea5a1
SHA256e91f618a3dbc5683ed57a95ca806b468c79dd93b261efa919538d8e708e72ec9
SHA512979fea51d0362a00a0675c280cb7d7fcde9d78a7300d623312ff4386b396ee2681f4126b6dc846a65ca8aff4b3963eeb7f8a009cb9591f32a1937c9528a4044e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508327fe452d9ad524cc35ddc1034d8a0
SHA161ffe073d602ca4530624186823a91b71765e24d
SHA25674a6f7630b55caa19ec48c9fad74972a7e4f91310dc00f751ad0adee22c99e2a
SHA512a6efbbef1bed630b6edf163088f2a909a7160069787911f14c2272face37c0b2d56afe0c5c16c50fba90a1d9e304a2db07ee720fbfa21133821fd4e6bde64f29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577acb33089a9645b28fa5b73a9610079
SHA13f8e9f81a4b329e0995ef04c8de1e45b995b96f2
SHA25604a0fd8668b428f33124def9ced320a393079fc0e0939fa1a696d7008688aaf3
SHA5123ab609e502bdd5dde74e58c7e0afc2e4aeb0b556aa4e39da1755be060b33f7d368fad685d6fe6ad23fc59cf60d71217b23c5ef3e57eb51c3a95cc18e97fb3318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f803ae94635e1c0be74a80989f663468
SHA15addd46353c02da46a590d1b5b58e8bf0cc01a40
SHA2565b6f9601ffe9f8b0f2fa7062f357ee35684273f59f8b2bdbeb2491cb64c82da8
SHA51256f4455f637ee00caaf379854ecd89f0c2dea54d9aa04475b96e40cf2550d26b557f36eb9c23cef54b78ae87fda7bb92738e1f61231e172977294fc7bcc4b49a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c37a304b8daba8eb3fc7669d830f6c9
SHA109aebecdb1e19fd0906c9079c59765024aa2b496
SHA256b3362c9795176e598c277459ebc95b83af02d5dc1a7d4e37fba9bcd9824190a1
SHA51235f34be22710bc2b3d9f6ff96f30a81e2932958d67bb14adfe863be977f503da162a32fd21df1ad10df483eb46242a92e8cd4507221d3629961489fa274e752a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3118c72f7d35b578649095652b5674f
SHA107aacc267d86fad8c4a3eaa451a84af3e372aba0
SHA256d94df639a6ce8e55b94b9c27127b5c0eb21541222f98082792d0e44702d1583b
SHA512a06de119c164f117f222f005bc46c791961526afe075f5cfd9094011eb37015bb04d8b968aeeffe2645b1a7ebc51117e42343aa5f7c65f3c384e6f016da48bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5575600e9fbcc2816269f6f069159654b
SHA1998439ea6db609c5a281f3efee0432af1ae003e8
SHA2566eb31c080bac8efb5e37bdc8e1aa6af63c0ad3af08b2588a6d95427f056d240c
SHA512193521eff93642bf6ccf99e12718e81f2145f4ba83895a5c12e1b9900f837a15daafd32a5509c6834a30fad72199727c68195180335d59fa2cbffa9790196af5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da816120bc94cc6d5828db94a9626380
SHA16c36d36eee0a8f41493e3289079846fff41ce57a
SHA256b144ed71faacc73d15e6aa3cadf707ac3168faac0e13e9b2b2625dab2f03c32a
SHA512ccaa27df598ed10b07ba6daf47149a81b8f1ac06793fd134c073bdefc1c38f714e0e3634d97f43fcff52d1bde12ac8e981c35e19e6f8ecd7f39284db8dddd613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5676710e0e8fd27382bb70a3dec79be82
SHA17329dddd23b67fa800246e0a1daf4acc334326e8
SHA25670f630403a4b14901b848a74afbebb84a0a2af54b82dabd6f39dcbd133164e20
SHA5123989fd45d9001209a4bb185b5000b8cd6829125b33facd618054a50f7698feb9c18826fb6c6b36b52dca38cf1af82ceb8f3b3eb1307c6d98a24bfa3c7370c5d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad2e07c2bba8e98036b180a1dcf08ced
SHA13c4a25436cb211d166eea510a89f669a11e7c384
SHA2561f869660abbc9a8066399d4d25db1b3bdb2f103234a6114afecdefc5179f5220
SHA5127f84669038521c1dcd0e01fe49d1c955cea8658ad7dbdc86441c2ebecccbd13e743835a1c07bb9b0362eff5857c34217f41d244036db7e230b330afb3e3ee75f
-
Filesize
837B
MD528270b81890f88b6ca30ad30651d3cf8
SHA1b916f02e7bcde9aff518e8d18c1a1edad7cae75e
SHA2567fd5e30fe4e8e563e8db1242f048f4a38a6de09b2c34669cdaeb569ce6f61081
SHA512c7887573ffc318ec2af99ee88a1702f24e651d34f238b8f0cb1dece220b80de302107fd50c4739d29926a38f678cea95146e0d2c8a44f73148a0b1a6ab8aa38d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LFLWQ602\favicon-16x16[1].png
Filesize657B
MD50bca3069a605b7170c9858c3def69645
SHA156f92560a46d03162956ab37306801e977ce6865
SHA256a3528c6e28329af32a13751c1799d8f8abbd325c4e654f910a3e52f158afc5bc
SHA5126944a6a818edb76dbc1d53cb173cf4fd8c8383f8bdc8be9083a259f3e3190747637a3d91987a5f8f70e717ec33c951498a1e90c5424e460c84268f76423c4eae
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06