Overview
overview
7Static
static
3CCProxy.exe
windows7-x64
1CCProxy.exe
windows10-2004-x64
1CDial.dll
windows7-x64
3CDial.dll
windows10-2004-x64
3Language/C...GB.chm
windows7-x64
1Language/C...GB.chm
windows10-2004-x64
1Language/English.chm
windows7-x64
1Language/English.chm
windows10-2004-x64
1unins000.exe
windows7-x64
7unins000.exe
windows10-2004-x64
7uuid.dll
windows7-x64
3uuid.dll
windows10-2004-x64
3web/_acclist2.js
windows7-x64
1web/_acclist2.js
windows10-2004-x64
1web/accadd.js
windows7-x64
1web/accadd.js
windows10-2004-x64
1web/accheader.htm
windows7-x64
1web/accheader.htm
windows10-2004-x64
1web/acclist.js
windows7-x64
1web/acclist.js
windows10-2004-x64
1web/acclist2.js
windows7-x64
1web/acclist2.js
windows10-2004-x64
1web/account.htm
windows7-x64
1web/account.htm
windows10-2004-x64
1web/index.html
windows7-x64
1web/index.html
windows10-2004-x64
1web/list.htm
windows7-x64
1web/list.htm
windows10-2004-x64
1web/log.htm
windows7-x64
1web/log.htm
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:29
Static task
static1
Behavioral task
behavioral1
Sample
CCProxy.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
CCProxy.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
CDial.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
CDial.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Language/ChineseGB.chm
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Language/ChineseGB.chm
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
Language/English.chm
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Language/English.chm
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
unins000.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
unins000.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
uuid.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
uuid.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
web/_acclist2.js
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
web/_acclist2.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
web/accadd.js
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
web/accadd.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
web/accheader.htm
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
web/accheader.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
web/acclist.js
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
web/acclist.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
web/acclist2.js
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
web/acclist2.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
web/account.htm
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
web/account.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
web/index.html
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
web/index.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
web/list.htm
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
web/list.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
web/log.htm
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
web/log.htm
Resource
win10v2004-20231215-en
General
-
Target
web/accheader.htm
-
Size
201B
-
MD5
bd9a363fe33d131460388b98a52f6178
-
SHA1
e1c15c54f895446bf9a7d6792b9204acacc904c5
-
SHA256
81b5fd8247b4e5649989b420a7f83fe307c58d9df12e2bc8c7b2bbf827e38fa8
-
SHA512
27a353b988b71cc1f4ef7c724a42e7feddb09ed5823c143bd510c6ca23f7b85310f50ed6f9d69391e5981653c4826f1efb121876c25930728d85d713219b18bc
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410334800" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC1AC401-A92E-11EE-8A35-62DD1C0ECF51} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a0000000002000000000010660000000100002000000041898783d0e5c35a57ae341606f47399471341ddf854d75c05ae761a0898b2e2000000000e800000000200002000000026309260c1c92820e1514dc6b4e70e239ffc55489ed0f043012ab0ce51eaf1a320000000f45e575c2111bfac892bedef0ac008366f8616fe75d5e65cd29a78a4fee669da40000000cbf67bd994ca3a10d3fd970024edad5b51b428809f01550755202bc0b99a60bb967c485c84818e4b86e427b039fa5211d735030fc5406d0fad8aa0fc5bd744ef iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8021aaa03b3dda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2296 iexplore.exe 2296 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2692 2296 iexplore.exe 28 PID 2296 wrote to memory of 2692 2296 iexplore.exe 28 PID 2296 wrote to memory of 2692 2296 iexplore.exe 28 PID 2296 wrote to memory of 2692 2296 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\web\accheader.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf33ec1f88d9d20870f481a6968f86cd
SHA1aa400a2497bc0046dcf36ac62cefef249b069b9d
SHA2569141141ac1bf5ee7392aa48bc46b8dddb497db71cc38a0a8d9d47339f5650b37
SHA512cf02df4d45666541f25d88d29b05f4740457c4078e32fe95e3b1145fa4d1ff4730e9abc177de43aa9679fbb97acc3c14da3336d905b5be6819d9479cb51b9edd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566373b0a40bb59a5e64981c219dc2276
SHA1102528ae3f6c8e7624a1b99c51658bd98df25fb4
SHA2564e15831cab75157f236b5b486dd66fd44842491560b6338cde5e9b1d78a3a553
SHA512949c902b72691523e0b58fb64ac74580d870ea353000353a5b31e397368f29b371af8bcd54f56bb111950a473136d01172d81b7a510507f3304669da4b7a5ae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c2d115d7ec23dff2dd56934f5679d01
SHA131f2ccf261c292511f2ad52e5023ae646c9032f5
SHA256c5c14fa1fa32f6da4a96ec3fc874b45ff2233fd232d0e7a80180020f512a22ff
SHA5120ac81c16fe6d14406cc869ab1bdc1ff4bc75d0f4f63c56fb272b134f72e0b7f4e75daf292c2f9a68f70d96da28cda470f1c39257ab4c0780ad2444b692ea3bde
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06