Overview
overview
3Static
static
1IP互刷�...ex.vbs
windows7-x64
1IP互刷�...ex.vbs
windows10-2004-x64
1IP互刷�...sc.vbs
windows7-x64
1IP互刷�...sc.vbs
windows10-2004-x64
1IP互刷�...B.html
windows7-x64
1IP互刷�...B.html
windows10-2004-x64
1IP互刷�...ws.vbs
windows7-x64
1IP互刷�...ws.vbs
windows10-2004-x64
1IP互刷�...ut.asp
windows7-x64
3IP互刷�...ut.asp
windows10-2004-x64
3IP互刷�.../1.htm
windows7-x64
1IP互刷�.../1.htm
windows10-2004-x64
1IP互刷�...10.htm
windows7-x64
1IP互刷�...10.htm
windows10-2004-x64
1IP互刷�.../2.htm
windows7-x64
1IP互刷�.../2.htm
windows10-2004-x64
1IP互刷�.../3.htm
windows7-x64
1IP互刷�.../3.htm
windows10-2004-x64
1IP互刷�.../4.htm
windows7-x64
1IP互刷�.../4.htm
windows10-2004-x64
1IP互刷�.../5.htm
windows7-x64
1IP互刷�.../5.htm
windows10-2004-x64
1IP互刷�.../6.htm
windows7-x64
1IP互刷�.../6.htm
windows10-2004-x64
1IP互刷�.../7.htm
windows7-x64
1IP互刷�.../7.htm
windows10-2004-x64
1IP互刷�.../8.htm
windows7-x64
1IP互刷�.../8.htm
windows10-2004-x64
1IP互刷�.../9.htm
windows7-x64
1IP互刷�.../9.htm
windows10-2004-x64
1IP互刷�...ick.js
windows7-x64
1IP互刷�...ick.js
windows10-2004-x64
1Analysis
-
max time kernel
130s -
max time network
212s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 06:33
Static task
static1
Behavioral task
behavioral1
Sample
IP互刷平台 v2.0/Index.vbs
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
IP互刷平台 v2.0/Index.vbs
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
IP互刷平台 v2.0/Info_sc.vbs
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
IP互刷平台 v2.0/Info_sc.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
IP互刷平台 v2.0/MB.html
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
IP互刷平台 v2.0/MB.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
IP互刷平台 v2.0/News.vbs
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
IP互刷平台 v2.0/News.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
IP互刷平台 v2.0/User_Logout.asp
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
IP互刷平台 v2.0/User_Logout.asp
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
IP互刷平台 v2.0/bbs/1.htm
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
IP互刷平台 v2.0/bbs/1.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
IP互刷平台 v2.0/bbs/10.htm
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
IP互刷平台 v2.0/bbs/10.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
IP互刷平台 v2.0/bbs/2.htm
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
IP互刷平台 v2.0/bbs/2.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
IP互刷平台 v2.0/bbs/3.htm
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
IP互刷平台 v2.0/bbs/3.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
IP互刷平台 v2.0/bbs/4.htm
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
IP互刷平台 v2.0/bbs/4.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
IP互刷平台 v2.0/bbs/5.htm
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
IP互刷平台 v2.0/bbs/5.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
IP互刷平台 v2.0/bbs/6.htm
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
IP互刷平台 v2.0/bbs/6.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
IP互刷平台 v2.0/bbs/7.htm
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
IP互刷平台 v2.0/bbs/7.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
IP互刷平台 v2.0/bbs/8.htm
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
IP互刷平台 v2.0/bbs/8.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral29
Sample
IP互刷平台 v2.0/bbs/9.htm
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
IP互刷平台 v2.0/bbs/9.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
IP互刷平台 v2.0/click.js
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
IP互刷平台 v2.0/click.js
Resource
win10v2004-20231215-en
General
-
Target
IP互刷平台 v2.0/bbs/10.htm
-
Size
498B
-
MD5
22eb177a8ee2f93c6326d32e3366f696
-
SHA1
6cc7f48f90c28916f942a692d90bebe350739018
-
SHA256
7742d621847cdb96a84e7be3c04b18da2f29fb4483bc6c6387fa038fb678045b
-
SHA512
970e6a9f23fef656217bad4dc08d2d96de977634c516bace1a326ed43dcf24d04a7fc6e9164282d682d4259be25eb34557bd04cc711dca347ecc32e140517097
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50dca65c0e40da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410645146" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c1930000000000200000000001066000000010000200000007e6c6f0a05cb65fcea05f39961c68459ef9b484dae85e8d8540f5729472b92e4000000000e8000000002000020000000feb4122171153d4e86cf4019ae662de0e998bd9c4b2d9cad2fa498dea40e082e200000001f23c3f0bf4fbdd5315b398ece17caf1276b4a8264f48e968d66840f5f20ba3440000000c83c62d80363666bfe55075781fc39c1ba67110f627986c74b93e5f6e1247318b6874bbfa8899ec9ec7838fba278039b65ba2708b4f85ee1f4773172cb9e8814 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{70D8EF11-AC01-11EE-BE47-DECE4B73D784} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2736 iexplore.exe 2736 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2736 wrote to memory of 3020 2736 iexplore.exe 30 PID 2736 wrote to memory of 3020 2736 iexplore.exe 30 PID 2736 wrote to memory of 3020 2736 iexplore.exe 30 PID 2736 wrote to memory of 3020 2736 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\IP互刷平台 v2.0\bbs\10.htm"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fbb7461eba099d95fc8fbf85b3bab73
SHA1b8313300e1fc659b33c0363477797c9e3c81f780
SHA256a0139024e0ca00474641aedf2f7276a4671c389855c6868b5bc3c42db1e970bb
SHA512d5be35a85ae1919559e553883e60825db4ffcba25b5e3181413cc4d5f165e14d86d15a95dac7a19be951e239fd1dd8cfe8e587222d460538601261be8eb6183e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50123763b15995e9d72ff361a7b087127
SHA106cb545b6bca307d51c5efdd29682c4f4ef03b57
SHA2564b13f5ae8982ab08fb2dd5b51f8d0d33fdaed767e85e9760f392a683e725c644
SHA512351e56f3ae10d2e7ce41963f26f93ad50f00b7e5395dfe25d77689fd40449b61e208e690060f67dabe0f98c6ffc3e9019dda0491ef59901d337645a848d5b81d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a6bd828d3e1017531d78c46daf219fe
SHA1433f1df143f85aecbfd5de1abbca1e002d703f4e
SHA256cff588c9a9e68c842045b85e7831a7fd5963d13af1f6695e8ba93b6282e87375
SHA512e38bcce1775cfb8ace6a24847f47bf7cf56dc8395537237896e52fb7f7e2a0d6ff19d3c051f0d2ec665a4f903543da2405144a1141f6472ea3919a6a0d6c5adf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5daee37e5e4673d07e107321b46e1cf67
SHA16b05f57dec31facafc5592a46ce262d6da6981af
SHA256afdcc8ffee437e4aa5469a205c9f4a0fac032e026cb0b0eb31e12f550821a4b9
SHA512e560e5a7171d413066e4cc3b3508300ed9edef4489d5ec207a8e807eec986bcd6a48b3557892d998b981baf2999ef4a2a31faeef225bed775e744a9e2be0cd6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b94c51e46f4e2ff7df323450fd6a87a
SHA1b1962fd7063564720439d05596f7d3675d300654
SHA256723492667063cf62c1b2e89240490f5380dcafd87a6346514f46bf73647028e4
SHA512279c0d69a515857d7e747f268c6937a21b9ca09b77c97e1c9052972b212311607a6fdced8b6f6cf06cfc6193c0d571fbb81470971d7a408b704287a75f878140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e03facdfa6c115104c7a34d7231159ea
SHA161423b439addb5f023cbbe71e5299542297ebc17
SHA2564a5c779b02e1ad86f39b3ead5ad0fa1626692008c1742526d602f16916a27392
SHA51222de08089ce08f62577f1ea4225d038b91fde1c17194591000084b5b31de9495781f01ae3e97fcf5e56b3dce97531850848205b5132cad0ec90d7372f6e6e407
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06