Overview
overview
1Static
static
1admin/channel.js
windows7-x64
1admin/channel.js
windows10-2004-x64
1admin/content.js
windows7-x64
1admin/content.js
windows10-2004-x64
1admin/guest.js
windows7-x64
1admin/guest.js
windows10-2004-x64
1admin/kind...tor.js
windows7-x64
1admin/kind...tor.js
windows10-2004-x64
1admin/kind...o.html
windows7-x64
1admin/kind...o.html
windows10-2004-x64
1admin/kind...t.html
windows7-x64
1admin/kind...t.html
windows10-2004-x64
1admin/kind...r.html
windows7-x64
1admin/kind...r.html
windows10-2004-x64
1admin/kind...ger.js
windows7-x64
1admin/kind...ger.js
windows10-2004-x64
1admin/kind...h.html
windows7-x64
1admin/kind...h.html
windows10-2004-x64
1admin/kind...e.html
windows7-x64
1admin/kind...e.html
windows10-2004-x64
1admin/kind...k.html
windows7-x64
1admin/kind...k.html
windows10-2004-x64
1admin/kind...a.html
windows7-x64
1admin/kind...a.html
windows10-2004-x64
1admin/kind...e.html
windows7-x64
1admin/kind...e.html
windows10-2004-x64
1admin/kind...e.html
windows7-x64
1admin/kind...e.html
windows10-2004-x64
1admin/menu.js
windows7-x64
1admin/menu.js
windows10-2004-x64
1admin/other.js
windows7-x64
1admin/other.js
windows10-2004-x64
1Analysis
-
max time kernel
0s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 04:13
Static task
static1
Behavioral task
behavioral1
Sample
admin/channel.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
admin/channel.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
admin/content.js
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
admin/content.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
admin/guest.js
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
admin/guest.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
admin/kindeditor/kindeditor.js
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
admin/kindeditor/kindeditor.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
admin/kindeditor/php/demo.html
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
admin/kindeditor/php/demo.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
admin/kindeditor/plugins/about.html
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
admin/kindeditor/plugins/about.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
admin/kindeditor/plugins/file_manager/file_manager.html
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
admin/kindeditor/plugins/file_manager/file_manager.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
admin/kindeditor/plugins/file_manager/file_manager.js
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
admin/kindeditor/plugins/file_manager/file_manager.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
admin/kindeditor/plugins/flash.html
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
admin/kindeditor/plugins/flash.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral19
Sample
admin/kindeditor/plugins/image/image.html
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
admin/kindeditor/plugins/image/image.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
admin/kindeditor/plugins/link/link.html
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
admin/kindeditor/plugins/link/link.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
admin/kindeditor/plugins/media.html
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
admin/kindeditor/plugins/media.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
admin/kindeditor/plugins/plainpaste.html
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
admin/kindeditor/plugins/plainpaste.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral27
Sample
admin/kindeditor/plugins/wordpaste.html
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
admin/kindeditor/plugins/wordpaste.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
admin/menu.js
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
admin/menu.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
admin/other.js
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
admin/other.js
Resource
win10v2004-20231215-en
General
-
Target
admin/kindeditor/plugins/plainpaste.html
-
Size
918B
-
MD5
9787000c1e77e14ec1c7b4088030f518
-
SHA1
ca31b1a2506fabaa5717ba0177255bd300105c2a
-
SHA256
eb9c01621abb71c3bdc87b4e573d52486ce6c8d36255c0803a83814c4ca621a0
-
SHA512
337af29ab33caee63377693dd2a1cf50754f2a678dba94df317b5d9981ddfbb545f8f4739877e57334cece00fc9466d3fefc0843596992e851c38af511addba8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{753B3761-AEA5-11EE-A76C-6E3D54FB2439} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1668 iexplore.exe 1668 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2448 1668 iexplore.exe 16 PID 1668 wrote to memory of 2448 1668 iexplore.exe 16 PID 1668 wrote to memory of 2448 1668 iexplore.exe 16 PID 1668 wrote to memory of 2448 1668 iexplore.exe 16
Processes
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1668 CREDAT:275457 /prefetch:21⤵PID:2448
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\admin\kindeditor\plugins\plainpaste.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591178160ea0ec1acddcdf30024f8bdfa
SHA1a81ff544991dccb69889dfb68aa89322efcbbcd8
SHA25635c3b81f56d5a22fa83851a886ce750a0de26b449d24c821c95bbfdb780c459a
SHA512ba9751f6a2b643913877633333f7c30e508c7996c2fd030fdda7947ad98e5cf83f318ee4bb0f7c38daba256fe37c0ca7778637e9ba31edda941d03fb4029dc02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b216eb626c883624d3b3c7584e7bb4cf
SHA134d693f865f1eac29cb90c19e9d2bbf83aa2a721
SHA256e96894fa904baddee4b1b639bf85d3b145701b28a6a70a110c8c6aee4f63e719
SHA512c8499f70b74d77bb3631ad0c2e395e0eb766050e0eb50fec561772f6ac16d4845d03fa6b4e41db008368e6fc81a77a7fd3fd18eac5c4d7679f697a9488276dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c4c04ec87366167f53b6d132d60c9b2
SHA126455f397ad6148f8a294e38a4212aad1cf46813
SHA256b4f0888e4ab794ce2930e10039395dc0efdadd910e2eb8102fb312d4101e42cc
SHA5121fa1fc7df8fa36d0bc7af9e08381221cf0d1d46f6fe5e2172a78a8a828863b7cb678286177f00abc2689376dfe8dfded0770bc5dfed2e8a280f040e1b4f794bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55de12679bcdb270e89f865e2a2730600
SHA1143077d0d989a035332c6c6edf9bbbdf0fcec681
SHA256cc473af7d7d9cb0bbec14a31ca6ca0ff447cdf47c844c008ae8f5a0dd7daee70
SHA512fb170eb6990a400640fa0882563bb80a1625e9c48a7c4be3ce061abd11f57e9f6824ea94eea3326b3b7940eb27e153ff275009a6ae4cb3edca6a400c8977cbf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526dd50405ed41aef635e939b9e5852a5
SHA1a848886737b2de94d194da49ec00ad37a45645db
SHA2565c4ed2e208552c261990e85f4d0fe87763db75ca70f5c3b87a3ad7d6572ba07a
SHA5129e4be0723b63ed1a467f289297d27447f11e2731f09ea90c2054eaa256c8303234361c1b2b7975e827c8977e7e68570374c853e85172ae2218e210bd69db01ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9c6b86bbbb67ab9ce9af7e2e4fb217d
SHA17eff3b4ba788d598267b1dcb08625c827e01d66c
SHA256527617b988c5ce752da3868719a76e136771c5d4e90872f525778ee08e3d7b5e
SHA5124d8e079431284db28df090530dcc8c87abd63dbe0f61cd1e26e14cb3d574fccbe8fa261f57f668025948503b0236efa345df5e1a119caaa2286703253719798b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d29a2fc4270f7bf9c9448179fa0b2acd
SHA1ff9da3f975bf7348df8b4074513c16c182fd6df4
SHA256a673f2b51ecb9bff7df16b2cceee601f73b6581ba4c1b8c5fad60a116568ae4c
SHA5127d9cc2c1428813e3a1c63f9ef7fe12aa0cadfd5d1fd09a387acf154a6e2a8ee5ea76008e8576a980e9e383121c5feffbeb644ba750d85ef0145eb8f8e64380c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5284003dc7696b7fc638991f004824ecb
SHA14c412422d566fb6c99b6add17acb3ea83cbd8ffc
SHA2560359611b1927cbafa69059b56eba851d95b672fa4cf764824e84a490d1aa14be
SHA512cf1e56b447ece23e8f2aee3b83bb456a133b6e3cf797dcb446fae54f624e12c8a70f54680686a491e6e3edf9016f995df2cf101f884b9be1400761ceae9346cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bc766ee64741496489604b29db71948
SHA120096fa06e04a96b6ad83d077e1c08b37a5e4cf3
SHA25679834f724c33d50d65ed529251f33fbfce37bdedb0709e6937ce04102a99888f
SHA512c7ff6943b850c45b2ef1e68165a8f28599b365bc6bb4b55a74871737e9616a503110f83ea441cd5d54587adca54bf940c0c239ea9c57f9c8c6716841bc5ca562
-
Filesize
1KB
MD51f1a3b101012e27df35286ed1cf74aa6
SHA146f36d1c9715589e45558bd53b721e8f7f52a888
SHA2567f0b1fe38c7502bea9c056e7a462ab9f507dd9124f84b1d4666fb7d37cf1b83c
SHA512d6f6787de85049d884bf8906292b0df134287cc548f9f3fadd60d44545652d55c296ed50e72687f776f0bf6b131102b4bf9b33143998cb897f21427fbc8306a3
-
Filesize
1KB
MD5fa527dcd6b5eb05e72fc51570a2a6608
SHA13380c5ef74408265fba2f67e790636d0ad0a51cc
SHA2564dc7a4a6cb3be2c334a27a49df89f18f8f91749fe6aa1cf28d548e0e0c75ce3d
SHA51205c0e217c433949cab210102a26ca7f6a765515b228b217e25c7409408fc167b5a59a8494e1181284e9ec72849c90288f3a066faa284e29d871097ec76291a5a