Overview
overview
1Static
static
1youthblog/...nge.js
windows7-x64
1youthblog/...nge.js
windows10-2004-x64
1youthblog/...ot.htm
windows7-x64
1youthblog/...ot.htm
windows10-2004-x64
1youthblog/...nt.htm
windows7-x64
1youthblog/...nt.htm
windows10-2004-x64
1youthblog/...ks.htm
windows7-x64
1youthblog/...ks.htm
windows10-2004-x64
1youthblog/...op.htm
windows7-x64
1youthblog/...op.htm
windows10-2004-x64
1youthblog/...ad.vbs
windows7-x64
1youthblog/...ad.vbs
windows10-2004-x64
1youthblog/...in.vbs
windows7-x64
1youthblog/...in.vbs
windows10-2004-x64
1youthblog/...wd.vbs
windows7-x64
1youthblog/...wd.vbs
windows10-2004-x64
1youthblog/...ar.vbs
windows7-x64
1youthblog/...ar.vbs
windows10-2004-x64
1youthblog/...nt.vbs
windows7-x64
1youthblog/...nt.vbs
windows10-2004-x64
1youthblog/...se.vbs
windows7-x64
1youthblog/...se.vbs
windows10-2004-x64
1youthblog/...te.vbs
windows7-x64
1youthblog/...te.vbs
windows10-2004-x64
1youthblog/...le.vbs
windows7-x64
1youthblog/...le.vbs
windows10-2004-x64
1youthblog/...te.vbs
windows7-x64
1youthblog/...te.vbs
windows10-2004-x64
1youthblog/...dex.js
windows7-x64
1youthblog/...dex.js
windows10-2004-x64
1youthblog/...ip.vbs
windows7-x64
1youthblog/...ip.vbs
windows10-2004-x64
1Analysis
-
max time kernel
16s -
max time network
176s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 02:05
Static task
static1
Behavioral task
behavioral1
Sample
youthblog/OblogStyle/style_change.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
youthblog/OblogStyle/style_change.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
youthblog/ad/ad_userbot.htm
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
youthblog/ad/ad_userbot.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
youthblog/ad/ad_usercomment.htm
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
youthblog/ad/ad_usercomment.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
youthblog/ad/ad_userlinks.htm
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
youthblog/ad/ad_userlinks.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
youthblog/ad/ad_usertop.htm
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
youthblog/ad/ad_usertop.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
youthblog/admin_ad.vbs
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
youthblog/admin_ad.vbs
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
youthblog/admin_admin.vbs
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
youthblog/admin_admin.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
youthblog/admin_adminmodifypwd.vbs
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
youthblog/admin_adminmodifypwd.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
youthblog/admin_blogstar.vbs
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
youthblog/admin_blogstar.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
youthblog/admin_count.vbs
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
youthblog/admin_count.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
youthblog/admin_database.vbs
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
youthblog/admin_database.vbs
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
youthblog/admin_filtrate.vbs
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
youthblog/admin_filtrate.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
youthblog/admin_filtupfile.vbs
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
youthblog/admin_filtupfile.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
youthblog/admin_friendsite.vbs
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
youthblog/admin_friendsite.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
youthblog/admin_index.js
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
youthblog/admin_index.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
youthblog/admin_lockip.vbs
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
youthblog/admin_lockip.vbs
Resource
win10v2004-20231215-en
General
-
Target
youthblog/ad/ad_usertop.htm
-
Size
1B
-
MD5
7215ee9c7d9dc229d2921a40e899ec5f
-
SHA1
b858cb282617fb0956d960215c8e84d1ccf909c6
-
SHA256
36a9e7f1c95b82ffb99743e0c5c4ce95d83c9a430aac59f84ef3cbfab6145068
-
SHA512
f90ddd77e400dfe6a3fcf479b00b1ee29e7015c5bb8cd70f5f15b4886cc339275ff553fc8a053f8ddc7324f45168cffaf81f8c3ac93996f6536eef38e5e40768
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{62BD7831-AB7D-11EE-A031-F6BE0C79E4FA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2208 iexplore.exe 2208 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2208 wrote to memory of 2800 2208 iexplore.exe IEXPLORE.EXE PID 2208 wrote to memory of 2800 2208 iexplore.exe IEXPLORE.EXE PID 2208 wrote to memory of 2800 2208 iexplore.exe IEXPLORE.EXE PID 2208 wrote to memory of 2800 2208 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\youthblog\ad\ad_usertop.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5b28cc972df2c08d3d730d5921398e9
SHA1f55952ae20d0d0e136062d4afdfb7f9853701800
SHA25679a4d041f54eb6290c7c360ef0ef20ec3b4eea385b5965baa0cdbb108d68bd29
SHA5123e25c453275eee7a519bde42045d749bba227bd142ec8a2bbf5ec78b6b611bb2cd025f71d8cffedb9c8534877eba41dd12abe442c76a9260c787a1151f5baaa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e31a335532b5fcd790648361c41eb232
SHA14fb0caf73db62527058f47e3ad50d338e1156bf2
SHA2566e8b75329a37434db63f19c931fcc71b7525cbea738b74dca92acad470565fcc
SHA512d956fbdde0a750dbe226cd93a2d7568e62db99589b726721d907ab68003b5c3039ed5b0e2018bac76fa8762a7e548fe25ff973eb3a00a1ff04fc0afe15ff5eda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5088d83e6df8921d13883292f70ad33c8
SHA15ebe80d901e85789480259f77974b09c2035b7c2
SHA25643373b2bc691a7c7ea491f6e6882005d744a3db0d81b955bb0e0a71a1d812d0c
SHA51283cc9b1f2d19591601d338d815401b312fd0a8f818e5f878bb6dd828a529fe4ce74f4bb778fd742a39175f4c4377be3e74a7de05cfa7a2f0d86f5162ded568f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c97289a882ef242729de205b92a08051
SHA105541a09f977919488e3e3e5694ace3f78a5b04f
SHA256ca16111e9b4c314f0472ec8b6e706b969560be5cf0a2f4e4966054b4ccd8a1b0
SHA5128d838760892906ea77ff11f655dff34ed93838080a2bb7179b0f175a8ecdb943ed665ec12e635c1ee59a4d0f95c1d18057725ba38b60093e54e265ef23e44889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503934047ee675d4500ff94a290d544b9
SHA1a76775bbb31067d3e7ed39f36e11d9afb17819bf
SHA2567c9aa05943f3adc841ea33681bf740f626fde81e903a7fb677d154ddf62f8860
SHA512c37c74527d485481d0def17f8aa42d8db0c196a4fd8624f9f2df5d427dc59ede5a52800b85b85722c54546bd3fd6f936297178ea3d534a91fdeacc668809b986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d43d26b059c17c1848b24e4fe289a35f
SHA16daa8ab176728a0bb908cdcde11cea7bec4a55fa
SHA256c0d48c4837d3c22e5961b0a055df04a22de5003147d9f13debe8c4b4ef344d10
SHA5129e16d3cbf9f74a79f4ea3fffe8d099b5637d874e94ef3d6d7d0f4f06a07d76c848885707971980c4ffa479faa9cc354e1b8cd6eaea7c4bbc987d6961d2fd69fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58933ba3383c5dca776431564e2ccd15f
SHA176f6fe129a6f51e1f1a6f4275e487ee8c315600c
SHA2564b04e2a58bc7a94775cb4b2e911349e9a42d3e0ae397e599d8cb477172b68122
SHA512031bb20134b76a67ae0a0d449e5c3e655d287c672ab65dc2e3f5e5262fa7860aa94fc8b79a8ee0a694eac99d9739cba9684250d1d862da91c42dbe4d498aa057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546d6d5984da4aa11089c15fccc95d319
SHA1115dfe29b4dc793ee6c0c84df7beeb6feda83d0e
SHA25603a47d77974fe294803c1d99138f5f18c15b988312f565747bf2ce8554f7dee0
SHA512022a51b8e7cfbf6dc5ddb685dfb779346831ac765b23929cf948aee55a99538751846ad49a3304bd1cda1c5405de92c7576c510d7022bc314aca39dc6a6c209e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f06495778497c55cab4906249c44f05b
SHA14d97e3e9e0c6de0df2b248a0f3189a993163aa57
SHA256fd4fcd7d322460961a0c2a6dc42958885a1b36dd0b2b5af56a3f303c7a5e6cd1
SHA5122084bfc8d17c97c1bb061f3ab713f5a53b9ebe5635a64c360128965c5f3c26e7ba6c207fcbf998e5dd66fdaed35047fa8d4e6e6a5dac9c4c56105ea19fa7422c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535f7f21e0ffe93314dc3172aa8ec85f9
SHA1fa546e363dd92ad89590cf9a1bd911a44c5f52f8
SHA256df5d7e9f3ae3e15d5b8fb2df47adc1272ec2074c222218f71cce18b01042e79a
SHA5125a379838b4e142e44f8216172f88ac19edc32804b3c3b514d0398d2c722f9f0fa51406e57dc48e270236aa46e8478da2db84ad6c0fd252c2f32103470b3e61ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59108cdcee0a8874647cf6ee115eff7d5
SHA1d10ed214f7bf5a317df8f5b8543b7c1eeef85463
SHA256a0c02df82a36f16bf3e132c9a7a23919bbfb221b56af22df024ae22d7c82eb35
SHA5123264ba048ddb411177dc63b50b029aa7f8b85dea94b1527102b12a0386f2a4e13e5580c7b975f32244f31ec9b27208d3970117aa0391e93e794d99e80e881804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c1ffc8152bdd817777ac108d0a6c223
SHA1d369b899fb21488552ada23b1b06003c3d7de247
SHA256327d082c18b10446dfbb36d3f51a2fbf89f8dbdd7ffbc6791ac586175434e52b
SHA51239382d867f830052c3f8bf78fcde7af30938eb573a382cd67aed4754771344283b72644721c0587578634fefeb3234fd7458b021a377fb08466509bf618cf9c1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06