Overview
overview
3Static
static
1IP互刷�...ex.vbs
windows7-x64
1IP互刷�...ex.vbs
windows10-2004-x64
1IP互刷�...sc.vbs
windows7-x64
1IP互刷�...sc.vbs
windows10-2004-x64
1IP互刷�...B.html
windows7-x64
1IP互刷�...B.html
windows10-2004-x64
1IP互刷�...ws.vbs
windows7-x64
1IP互刷�...ws.vbs
windows10-2004-x64
1IP互刷�...ut.asp
windows7-x64
3IP互刷�...ut.asp
windows10-2004-x64
3IP互刷�.../1.htm
windows7-x64
1IP互刷�.../1.htm
windows10-2004-x64
1IP互刷�...10.htm
windows7-x64
1IP互刷�...10.htm
windows10-2004-x64
1IP互刷�.../2.htm
windows7-x64
1IP互刷�.../2.htm
windows10-2004-x64
1IP互刷�.../3.htm
windows7-x64
1IP互刷�.../3.htm
windows10-2004-x64
1IP互刷�.../4.htm
windows7-x64
1IP互刷�.../4.htm
windows10-2004-x64
1IP互刷�.../5.htm
windows7-x64
1IP互刷�.../5.htm
windows10-2004-x64
1IP互刷�.../6.htm
windows7-x64
1IP互刷�.../6.htm
windows10-2004-x64
1IP互刷�.../7.htm
windows7-x64
1IP互刷�.../7.htm
windows10-2004-x64
1IP互刷�.../8.htm
windows7-x64
1IP互刷�.../8.htm
windows10-2004-x64
1IP互刷�.../9.htm
windows7-x64
1IP互刷�.../9.htm
windows10-2004-x64
1IP互刷�...ick.js
windows7-x64
1IP互刷�...ick.js
windows10-2004-x64
1Analysis
-
max time kernel
0s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 06:33
Static task
static1
Behavioral task
behavioral1
Sample
IP互刷平台 v2.0/Index.vbs
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
IP互刷平台 v2.0/Index.vbs
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
IP互刷平台 v2.0/Info_sc.vbs
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
IP互刷平台 v2.0/Info_sc.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
IP互刷平台 v2.0/MB.html
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
IP互刷平台 v2.0/MB.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
IP互刷平台 v2.0/News.vbs
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
IP互刷平台 v2.0/News.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
IP互刷平台 v2.0/User_Logout.asp
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
IP互刷平台 v2.0/User_Logout.asp
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
IP互刷平台 v2.0/bbs/1.htm
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
IP互刷平台 v2.0/bbs/1.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
IP互刷平台 v2.0/bbs/10.htm
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
IP互刷平台 v2.0/bbs/10.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
IP互刷平台 v2.0/bbs/2.htm
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
IP互刷平台 v2.0/bbs/2.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
IP互刷平台 v2.0/bbs/3.htm
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
IP互刷平台 v2.0/bbs/3.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
IP互刷平台 v2.0/bbs/4.htm
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
IP互刷平台 v2.0/bbs/4.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
IP互刷平台 v2.0/bbs/5.htm
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
IP互刷平台 v2.0/bbs/5.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
IP互刷平台 v2.0/bbs/6.htm
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
IP互刷平台 v2.0/bbs/6.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
IP互刷平台 v2.0/bbs/7.htm
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
IP互刷平台 v2.0/bbs/7.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
IP互刷平台 v2.0/bbs/8.htm
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
IP互刷平台 v2.0/bbs/8.htm
Resource
win10v2004-20231222-en
Behavioral task
behavioral29
Sample
IP互刷平台 v2.0/bbs/9.htm
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
IP互刷平台 v2.0/bbs/9.htm
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
IP互刷平台 v2.0/click.js
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
IP互刷平台 v2.0/click.js
Resource
win10v2004-20231215-en
General
-
Target
IP互刷平台 v2.0/bbs/10.htm
-
Size
498B
-
MD5
22eb177a8ee2f93c6326d32e3366f696
-
SHA1
6cc7f48f90c28916f942a692d90bebe350739018
-
SHA256
7742d621847cdb96a84e7be3c04b18da2f29fb4483bc6c6387fa038fb678045b
-
SHA512
970e6a9f23fef656217bad4dc08d2d96de977634c516bace1a326ed43dcf24d04a7fc6e9164282d682d4259be25eb34557bd04cc711dca347ecc32e140517097
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{3D357F98-AC01-11EE-AA35-D6F9353EB06D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4536 iexplore.exe 4536 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4536 wrote to memory of 1652 4536 iexplore.exe 18 PID 4536 wrote to memory of 1652 4536 iexplore.exe 18 PID 4536 wrote to memory of 1652 4536 iexplore.exe 18
Processes
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4536 CREDAT:17410 /prefetch:21⤵PID:1652
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\IP互刷平台 v2.0\bbs\10.htm"1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e