Overview
overview
1Static
static
1admin/channel.js
windows7-x64
1admin/channel.js
windows10-2004-x64
1admin/content.js
windows7-x64
1admin/content.js
windows10-2004-x64
1admin/guest.js
windows7-x64
1admin/guest.js
windows10-2004-x64
1admin/kind...tor.js
windows7-x64
1admin/kind...tor.js
windows10-2004-x64
1admin/kind...o.html
windows7-x64
1admin/kind...o.html
windows10-2004-x64
1admin/kind...t.html
windows7-x64
1admin/kind...t.html
windows10-2004-x64
1admin/kind...r.html
windows7-x64
1admin/kind...r.html
windows10-2004-x64
1admin/kind...ger.js
windows7-x64
1admin/kind...ger.js
windows10-2004-x64
1admin/kind...h.html
windows7-x64
1admin/kind...h.html
windows10-2004-x64
1admin/kind...e.html
windows7-x64
1admin/kind...e.html
windows10-2004-x64
1admin/kind...k.html
windows7-x64
1admin/kind...k.html
windows10-2004-x64
1admin/kind...a.html
windows7-x64
1admin/kind...a.html
windows10-2004-x64
1admin/kind...e.html
windows7-x64
1admin/kind...e.html
windows10-2004-x64
1admin/kind...e.html
windows7-x64
1admin/kind...e.html
windows10-2004-x64
1admin/menu.js
windows7-x64
1admin/menu.js
windows10-2004-x64
1admin/other.js
windows7-x64
1admin/other.js
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 04:13
Static task
static1
Behavioral task
behavioral1
Sample
admin/channel.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
admin/channel.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
admin/content.js
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
admin/content.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
admin/guest.js
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
admin/guest.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
admin/kindeditor/kindeditor.js
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
admin/kindeditor/kindeditor.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
admin/kindeditor/php/demo.html
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
admin/kindeditor/php/demo.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
admin/kindeditor/plugins/about.html
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
admin/kindeditor/plugins/about.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
admin/kindeditor/plugins/file_manager/file_manager.html
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
admin/kindeditor/plugins/file_manager/file_manager.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
admin/kindeditor/plugins/file_manager/file_manager.js
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
admin/kindeditor/plugins/file_manager/file_manager.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
admin/kindeditor/plugins/flash.html
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
admin/kindeditor/plugins/flash.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral19
Sample
admin/kindeditor/plugins/image/image.html
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
admin/kindeditor/plugins/image/image.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
admin/kindeditor/plugins/link/link.html
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
admin/kindeditor/plugins/link/link.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
admin/kindeditor/plugins/media.html
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
admin/kindeditor/plugins/media.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
admin/kindeditor/plugins/plainpaste.html
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
admin/kindeditor/plugins/plainpaste.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral27
Sample
admin/kindeditor/plugins/wordpaste.html
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
admin/kindeditor/plugins/wordpaste.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
admin/menu.js
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
admin/menu.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
admin/other.js
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
admin/other.js
Resource
win10v2004-20231215-en
General
-
Target
admin/kindeditor/plugins/image/image.html
-
Size
7KB
-
MD5
3dcb1ddfebd8b3769ec8e62c5c33a454
-
SHA1
daebb51b0383ac4dccbe093cd10af1427188a3e9
-
SHA256
dba13a8ba367124f6bc51a55ce124fe6b816b103ecae1e3199a202306093df4c
-
SHA512
ac7b0e71b62e20009f2a8e2d5f38a67aa4919fe913ca846a8eb86405dbfa4b2982b4dd8655940c7bbf7375e9a8a368ed83fe7cdceb34dbc410d9e398f5c385e1
-
SSDEEP
192:OIUjFD+NzYj88+7gwC09uLyBQ4rTzLsL6K2c:M+888+7gwC0kyBQ4rTzQL6K2c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8154E731-AEA5-11EE-BD45-D2016227024C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd7691733418900000000020000000000106600000001000020000000eadfefc3235c948d804fbd35246d1995d329d2a93fd2135d79a5d26e4c9abcf0000000000e8000000002000020000000ef186eb006e643b27cd0ddf82119617eb7130142dd1e617e83b066fa26d497c220000000d81943b02abf9a9ef93f8d27f2e69041f29295556aa260c8e4854eadda37e787400000004a3d9ae225793529bc87752cf1a68b9ff5f0b40a8160d63c68e1a0fc08ac1855bb219758f83d9055319714a0bafad59dde76bf78f6211bbe556cc30004b1db8a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd76917334189000000000200000000001066000000010000200000005441906755bb770070ccf30b60e5d9b3f30a67cbb57845c5c51aa3e9438130f5000000000e8000000002000020000000923cef2fd9ac302f3c9e17d79cca6d6da3269a0f2c68c5fe92c51dbf55588f81900000008865528e9a3c165ae81643a9173eeb44175962f6629453f37acf6491840e2084fd73d73fed41575c479643210968ddff0680549ddb301f371ca5dd96b47fb8a7b81e89bd5501dc39d4828d44bc50494cc7249775203311eec773edfe57623fdf0a0c95027bd56c6a91f706fbaed792c1e95ce48069600bad9e3b314a11e4dc3a17dd9a91791de7eb16055b387be353bd4000000039bfbc0a781b31621c0488f1ae722fc6dddab81f342e5633543cb21cd7e616cd07ea4a3b1f36e9741ffff303706a8651087144ab3729e079f91bbf74197bb9ee iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00aa4756b242da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410935506" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2480 iexplore.exe 2480 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2760 2480 iexplore.exe 28 PID 2480 wrote to memory of 2760 2480 iexplore.exe 28 PID 2480 wrote to memory of 2760 2480 iexplore.exe 28 PID 2480 wrote to memory of 2760 2480 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\admin\kindeditor\plugins\image\image.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c16ac120b5c6283ae328d6ee4e2fbe53
SHA188034b37ad0a31cd84ac87a31445e84e4483883b
SHA256071c5e2ed0b77c12b3dfa23a061263bb724365129e65558bd44ffc084bc6fce6
SHA512c40f6d7f05f51b87238518fd4886628dd2b31e24339094099679ed76d17f19c094577a077494ba865071f06cfa2207a0a4062531afe1af31e0677caf1907e616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9d61736dc6a7a0a0d96d7fa15d8e45b
SHA1540abb5c30e84dd18df5dc6cd73d451a7a46e84f
SHA2560b04618a04149b9bb00c8b890ce5834a339667a27cd9b2c4dc269c9f0c8d5a76
SHA512f44e65c39ac65b7ff7c319de6940aa1df920015906fb7328298a66582d36a437d2996442f97db3265a2c842e7a9374dc7624067e8ae15d5096d68f3e4dc474c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a65a9866ef224e8d379d51df75316c7
SHA17d34f0933ba2d9ce6b10a59581b606ffac2359fe
SHA256e8c002deec76839b68a3912d4521008e33c0423b35946b1084f6d49c1ac1e397
SHA512196c932d1e24da4511c6a0bdb5b35abad7a1f581ffe1f3c08c5c5328c38475308993b55bd64eb6e9126aab830d019ea72e5dbbaca02948d1b987fe9d58e557b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591d5b25d65693cbbf75d91218ff3a9f7
SHA19dacf59f75b856d38ce1bb5a6a85f6e765f27d42
SHA2567648b73273cf19b73d8e18ea07c8317cf855fc1612045015aed0ca63cf1642d5
SHA512e719580314982086a86b3ffd0660a721012172ddbba80c572299b221a4c4976ca906c32ff6839963755433bc14ee0ff68864ae6c9e00a793d6351a7dbb9cb0b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5900de4b5ed18a3aadbddd619bcce0163
SHA1013419e5813f5f489322147916c5430a0fcc8623
SHA2561ade3aaa390bb1b2453bbe911ec0dd2dc819dd7b937f95d51f9de78ee4e48810
SHA5125bc5a552a448555c5dc5edc966ad915e8be93af789fe81bc9cbb9e7b5ed0ba448cf66d3bea84a7633cb275301a2fbed35347168430d9655d6b8d8e19813945d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa842e46d7d83b9fdd78990e8f474af6
SHA1e8b6d61dea129cf3b76de5048475d4b6591aaf76
SHA25606130c1ab6c2d3648bae2bd11c3535c16e970c4c86bd1bb9ab5b51a95e0f9bc2
SHA512c999c7f414e0700c03167096b9d0fc7c39315585a3c193d0c35fe5741b33ac99997860819d584c1fb34c13c76714c8c4d787ad2accca80488ebf8262a2bfbfa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ba8d59c81188d559c93bce72c063182
SHA16b6c339e235bf400c1d614a6a15d5b36d27f1d0b
SHA25686bfecd9e5bc71ad64938865f67e429bea3f301596de20fcbbf4089abe6125e5
SHA51201adb188e82e5b97304c419047223bac6627d616baa34d06403cc9761255b6d7bd4ea03cc83a12922aabcc4ec9eb9249e70c579a22509b53971bce2ef8f0ba16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51db180b81821a445cb2dc49c3be05758
SHA1322904765085079306117b0d366b49e28fa9f7c2
SHA256331c865dbbb74de25303e6d4f422bea7981a819a9260222bdac8d21b13da20f4
SHA51294a99bffc3b679a043d10f34c9ef71a18ca9a26cad41e37ed03c957e3f585a41cd6242d8e498b95086ecf8c440f0c67cf8025630882aef2bb9e3f2a266f5880d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55296fce7e91da328095b68c4df38d80d
SHA1b80b3997d11ff7e0608a87dc2076c8fe27ff6ef1
SHA2568635f2b6c4bddaf6a6bfe80b7a6d71a4db39b0e8c732f854052f5483f6c0d049
SHA51227d6df42fd9e117f205949883fc7b3d7dba90df1f0443233b58b138f5a9061b27758562ad159c2a2ed04fd9d592ca0f454a926b51357d24fd355ace8e25e4af7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578f85a505fbb090d59ced826b0549952
SHA1cd1ee96120bec67ddcf0e4a0da0ea04cae0cd945
SHA256ce1cf8add9e169760872a342c262eaf7bf5ade60a964d34d44c554c2886d7b45
SHA512d69c50c7869c8c1b2dca696e5f5e111c5e962be03b31495b4fbc49d4c9b35be3265dfaa9b958aacb8dd620d87c5ce9d1cc84068a9bc52638b827576209ed8b68
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06