Overview
overview
7Static
static
7Data/Astatix.url
windows7-x64
6Data/Astatix.url
windows10-2004-x64
3Data/CrazyTet.exe
windows7-x64
1Data/CrazyTet.exe
windows10-2004-x64
1Data/DGO.url
windows7-x64
6Data/DGO.url
windows10-2004-x64
3Data/Games.url
windows7-x64
6Data/Games.url
windows10-2004-x64
3Data/Help/...ng.chm
windows7-x64
1Data/Help/...ng.chm
windows10-2004-x64
1Data/Homepage.url
windows7-x64
6Data/Homepage.url
windows10-2004-x64
3Data/Regis...g.html
windows7-x64
1Data/Regis...g.html
windows10-2004-x64
1Data/Regis...s.html
windows7-x64
1Data/Regis...s.html
windows10-2004-x64
1Data/Top100.url
windows7-x64
6Data/Top100.url
windows10-2004-x64
3Presetup/Ungins.exe
windows7-x64
7Presetup/Ungins.exe
windows10-2004-x64
7Analysis
-
max time kernel
119s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 20:40
Behavioral task
behavioral1
Sample
Data/Astatix.url
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Data/Astatix.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Data/CrazyTet.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Data/CrazyTet.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Data/DGO.url
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Data/DGO.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Data/Games.url
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Data/Games.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Data/Help/Help_eng.chm
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
Data/Help/Help_eng.chm
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
Data/Homepage.url
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
Data/Homepage.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
Data/Registration/reg_eng.html
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
Data/Registration/reg_eng.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
Data/Registration/reg_rus.html
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
Data/Registration/reg_rus.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
Data/Top100.url
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
Data/Top100.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
Presetup/Ungins.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
Presetup/Ungins.exe
Resource
win10v2004-20231222-en
General
-
Target
Data/Games.url
-
Size
158B
-
MD5
7da6b1d97bd5b9c5529fd06935927385
-
SHA1
fb04806711e529a2b578f142017cfafa1256f6da
-
SHA256
46a087efefc2f721491bf5d875b2c9f75015cdba0966f820633560a212e6b5e5
-
SHA512
17ad185bfb4dd2b9f8203563099695caf7ac67862d4ca3fc14b940258e24fab95774c7c7a887e5f2d7dd81017e85851f356edb9cd9cc786ebb2d790add0ce871
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa0000000002000000000010660000000100002000000092ff89c92ef5c2846a3bbd04deb3a1b0aaccf9ccbc9276d01f4d67f97e34d7cd000000000e8000000002000020000000fc42779cb6af29041d09d3e40a0f8e6c9333b473c44b97f9b14fe9be25f066a420000000cd6ecd102570a5ab4c4cc2b5ed3a4953a9eef2998b0f98e6754e4c29fc818acb40000000668aec4c5d713da00e8eb0a2d56f87682a0aa4cd0c3bce10518e1857476218ab67c6355bd5d9729d12580e8767ec6ea2e0f29f4a83a320830a10c53688921830 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{60CB1C21-A85E-11EE-A7E3-F2B23B8A8DD7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa00000000020000000000106600000001000020000000526b65f66e6f4b82ee64deadd96ada3f0d6955b760ce37b56b7979986f4ea06b000000000e800000000200002000000063c1078d981d77d01f42e38da2bd0874803e71c8a737b85d635240b34a5a3f4e9000000091524e42b08bab6cae525f0468d3e3c316b488e5b69dd8a648b5be904f836b363d0935799b2b9bdbcf5f7adb984e66f56dc6249ba2e2d25c8a8766cde463295a070fed490c6ed42dcfb00f0abff39b15cb06e248f00870e8d9c45b3140728cf737b5aa2ecac887f4d8d636a862823479964327e1166bec224db3660fc9e1c980e164f0cfb66d14947c4a60c9ca76c2b9400000008b313d1110ad89f0c6580696578189b6601ac156e90a7730f5168c7dc67b7ecc1773cac7ad2856de4767fb1408cd23c22749ee435ddd183c7d1c1e02ca7e7968 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410245266" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c044c0396b3cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2724 iexplore.exe 2724 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2736 2724 iexplore.exe 29 PID 2724 wrote to memory of 2736 2724 iexplore.exe 29 PID 2724 wrote to memory of 2736 2724 iexplore.exe 29 PID 2724 wrote to memory of 2736 2724 iexplore.exe 29
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\Data\Games.url1⤵
- Checks whether UAC is enabled
PID:1628
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dbee84bc3346372eb6e0e327df3d342
SHA1edb5b22baaf660e4077936e358ed09328c431478
SHA2563747cf8200e0a382b61868637bf94579a91071ed59d4252f8dd0d1e90e81b711
SHA512944bb4e6d6cda4c36b53da4c1eacafcb202ef1e370590a95b22e3168412146cd32c67687b4443943ebf8dcc0370cc1135a0328ed5bab851b650ddcfe12085d7c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06