Overview
overview
7Static
static
3VisionExte...al.exe
windows7-x64
7VisionExte...al.exe
windows10-2004-x64
7VisionExte...e.html
windows7-x64
1VisionExte...e.html
windows10-2004-x64
1VisionExte...t.html
windows7-x64
1VisionExte...t.html
windows10-2004-x64
1VisionExte...gin.js
windows7-x64
1VisionExte...gin.js
windows10-2004-x64
1VisionExte...ain.js
windows7-x64
1VisionExte...ain.js
windows10-2004-x64
1VisionExte...ss.bat
windows7-x64
1VisionExte...ss.bat
windows10-2004-x64
1VisionExte...en.bat
windows7-x64
1VisionExte...en.bat
windows10-2004-x64
1PIO/Vision...al.exe
windows7-x64
7PIO/Vision...al.exe
windows10-2004-x64
7Analysis
-
max time kernel
66s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
VisionExternalCrck/PIO/Vision_External.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VisionExternalCrck/PIO/Vision_External.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
VisionExternalCrck/PIO/home.html
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
VisionExternalCrck/PIO/home.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
VisionExternalCrck/PIO/init.html
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
VisionExternalCrck/PIO/init.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
VisionExternalCrck/PIO/js/login.js
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
VisionExternalCrck/PIO/js/login.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
VisionExternalCrck/PIO/js/main.js
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
VisionExternalCrck/PIO/js/main.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
VisionExternalCrck/VisionAuthBypass.bat
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
VisionExternalCrck/VisionAuthBypass.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
VisionExternalCrck/VisionKEYGen.bat
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
VisionExternalCrck/VisionKEYGen.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
PIO/Vision_External.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
PIO/Vision_External.exe
Resource
win10v2004-20231215-en
General
-
Target
VisionExternalCrck/PIO/home.html
-
Size
26KB
-
MD5
cd91bb681e57855da043e87ce3acfdbe
-
SHA1
0dd1edfeaf528b2733b0b6d280eca8cbdec05dcf
-
SHA256
f277350bf2464339dada6f15e2b70a5542fd2b97a292263e9613d961a6a7c625
-
SHA512
af6252d1ad067fc81eb71ebeb03873ce98595a4b7178e17bbbaae3009c2a75680c59077fa7419efe26bbd0bcc6a1084da006c574b1b991618575a7ff46e6a564
-
SSDEEP
384:y/+QZ7PxSxrQFJwuSxmQZ9DHF7HtOfQZ7:yPTJrOL
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B355551-ACCC-11EE-B59C-EE5B2FF970AA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20a88df0d840da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d60000000002000000000010660000000100002000000008c6f64f810b0ac1cf411b36d3ab9234b42d34a70fa38338228f22678bb4b6df000000000e8000000002000020000000ec4f14d4295e513ac3db681e7d1868c0919b81817683c3e3d2782c89e69fa0d4200000008b65752b983cde628687064c23367395a8c75cde14dbb824fdd70fe329eb7e8b400000003a6e57fd897196d6c80790835a5c192148968a78646854e6499144fd4ef21b21ffad1e210bfc6aa48ddf4f7885afb417b6e0447a466833f245648d704e34ac6f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 860 iexplore.exe 860 iexplore.exe 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 860 wrote to memory of 1272 860 iexplore.exe 28 PID 860 wrote to memory of 1272 860 iexplore.exe 28 PID 860 wrote to memory of 1272 860 iexplore.exe 28 PID 860 wrote to memory of 1272 860 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\VisionExternalCrck\PIO\home.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:860 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59095a1ce32f4604c6b9da52b18276801
SHA1d99b3d40db99b79854e2e972007b4d5804b06167
SHA256b138f2899a06d362c926db532ad8dc42d43c1792cddf52300481cdfef0ab3d3f
SHA51255a697db4d8672ed85a122bb46a6f5383964ae7c01af1c7dbfa31febbe43b81091f31794094652bfa4059938eb21bbc1c3f34bb4d88375aee2ff888982621a2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d730b26d9d90866103d5109ef27743d
SHA1c3d0c1368c60cd1f177d9a785833405201d94a6c
SHA2564c7e13e9b13a7bb1842a391cebd5fe1afb18e4b63e1abc6dceb931ff8e6d8dee
SHA51225e1df27eed203ee473c9fbb52f266ebad63206d53b60d7d17fed3182ac752d50fbc660d6a1c471505f93df78ebc51ac093ee4ced2f17d21fea3809d0ba065f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f2930d1376c76ee1d898ebdc45f79bf
SHA1e1b40d801be77d47a6e91b2a1659d2d238dcb516
SHA256018db9cafe5a8f8d429853cc0fa58218433f81379899224962eab05402fba3c9
SHA512f5a47e87c54a0186a254f5b7ef706d77aa88d7d475a5c614bbc13b0cc22902967b0115c5a5188d97c95631f6ccba98c61a65f4d8fabe0e26ccb472390dff7d57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db191a99ae8aeaf2d2e1f0e9093aae9c
SHA13c657bde861d0257319d370fa942326f7da23aa6
SHA2564743110042cd603410f265c7dc9e6f090f9828b6276c8ffa87f9eb485ee05967
SHA51225fce496fd39c19c6de160c8aae56f9f382337dc1d3462f6364975c72a713dd59ba1cae8da5f62889fc7d53ac8f117f3b80f28f3b3c70e32c4327ec0a5eb33d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52839d07e27ccfec34b0f3acba5147d1e
SHA1bdaf56f819bf5783cb7217ffdfb55ba448517ee7
SHA256c37b63a6688911dacf553ed8653b9f3305fd64c00f8e9aa7a16585cc0ff24b3c
SHA512012bca8884c95048715397a0f4dc1286c521e4602df41743908f65749ae970482316e7ea835a417a19884480a9b279058c616fe1e85ad7dd811f13d7ef3745c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf9f17584886295c60219c365eede4a4
SHA182fc8a944410bbcacb97220642d0251af51b570d
SHA256ca128fbcfe4e1c4afc728abe82916abcdb51a9bd2d50d272690c8cc9a04f6778
SHA512e7413260ae62397869500c5fac83593e67b1dc9ac9cec256e81710cac8e634e2752da52ebb9922daa7fe616d176345c725ddb5ffcf150ec7809993ae3bc4f7bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566ffb4d0df1e889139852d03310bf770
SHA1ac175f2eba5e38849c3ea3baa3620e56cfc1f266
SHA256373c4ecc327e523dbf5cb5113a9c5117f5972b6f35f9cb77425688b8474756da
SHA51223c62302927e45549a67dac4a598aafe66c7eaaac29f6232b297c6645c8a8312dec6d5f05f4285d997b555f14534f9435cccea7a059d8846e3a7c3efe1b5d85c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595cd6d078c6781641da5fe23b028a112
SHA10fd64fcc81cc9322e28d2e0277c86e58db488462
SHA256bbf404079dcc86361ef6a55ece47121abee55b4ccb8788144ca844c4a481c6dd
SHA512cef8bfb3eac26a44ec32733e84640b21578adf85f0b54f7e04492481bbaa4be2e707166a6f739a3b4526b28db671bad898daf73c5b9958f26b276fc4f2c69b25
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06