Overview
overview
1Static
static
1admin/channel.js
windows7-x64
1admin/channel.js
windows10-2004-x64
1admin/content.js
windows7-x64
1admin/content.js
windows10-2004-x64
1admin/guest.js
windows7-x64
1admin/guest.js
windows10-2004-x64
1admin/kind...tor.js
windows7-x64
1admin/kind...tor.js
windows10-2004-x64
1admin/kind...o.html
windows7-x64
1admin/kind...o.html
windows10-2004-x64
1admin/kind...t.html
windows7-x64
1admin/kind...t.html
windows10-2004-x64
1admin/kind...r.html
windows7-x64
1admin/kind...r.html
windows10-2004-x64
1admin/kind...ger.js
windows7-x64
1admin/kind...ger.js
windows10-2004-x64
1admin/kind...h.html
windows7-x64
1admin/kind...h.html
windows10-2004-x64
1admin/kind...e.html
windows7-x64
1admin/kind...e.html
windows10-2004-x64
1admin/kind...k.html
windows7-x64
1admin/kind...k.html
windows10-2004-x64
1admin/kind...a.html
windows7-x64
1admin/kind...a.html
windows10-2004-x64
1admin/kind...e.html
windows7-x64
1admin/kind...e.html
windows10-2004-x64
1admin/kind...e.html
windows7-x64
1admin/kind...e.html
windows10-2004-x64
1admin/menu.js
windows7-x64
1admin/menu.js
windows10-2004-x64
1admin/other.js
windows7-x64
1admin/other.js
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09-01-2024 04:13
Static task
static1
Behavioral task
behavioral1
Sample
admin/channel.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
admin/channel.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
admin/content.js
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
admin/content.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
admin/guest.js
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
admin/guest.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
admin/kindeditor/kindeditor.js
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
admin/kindeditor/kindeditor.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
admin/kindeditor/php/demo.html
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
admin/kindeditor/php/demo.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
admin/kindeditor/plugins/about.html
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
admin/kindeditor/plugins/about.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
admin/kindeditor/plugins/file_manager/file_manager.html
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
admin/kindeditor/plugins/file_manager/file_manager.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
admin/kindeditor/plugins/file_manager/file_manager.js
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
admin/kindeditor/plugins/file_manager/file_manager.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
admin/kindeditor/plugins/flash.html
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
admin/kindeditor/plugins/flash.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral19
Sample
admin/kindeditor/plugins/image/image.html
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
admin/kindeditor/plugins/image/image.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
admin/kindeditor/plugins/link/link.html
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
admin/kindeditor/plugins/link/link.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
admin/kindeditor/plugins/media.html
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
admin/kindeditor/plugins/media.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
admin/kindeditor/plugins/plainpaste.html
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
admin/kindeditor/plugins/plainpaste.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral27
Sample
admin/kindeditor/plugins/wordpaste.html
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
admin/kindeditor/plugins/wordpaste.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
admin/menu.js
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
admin/menu.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
admin/other.js
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
admin/other.js
Resource
win10v2004-20231215-en
General
-
Target
admin/kindeditor/php/demo.html
-
Size
663B
-
MD5
3b865b14b9f580922c40e1da174a9dee
-
SHA1
1c65928e510e5ba16db335c8890db3462f810c2b
-
SHA256
0d28d5fb3d6bce1da488b08dc5a0865f4f814320f1bdec2d5dcb79b37357c94c
-
SHA512
946ccf4cfe6f6077865faf716594d57e66715a315634f78571de843e9e1c48d38754747854c02cafcc0102bffc0213739da1815268c885f7e87373e49f70354f
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7808CE81-AEA5-11EE-A29D-C2500A176F17} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410935492" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30d95f4db242da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa000000000200000000001066000000010000200000001fc71b00cc3846e4ba8913bb895dd980286905cfd0cb32a94df6e1275d4c6e20000000000e800000000200002000000089bbfd043ff9697957e63910fe7437d11d8fd067108ffd75e3e7f286ce70a23920000000fd2fe11fcf00c96c75f26d875d922b8766a20ac59d8cb0d331c7008dd2fa40c840000000c6c6893f91f2f46e773bd55317647fb0bb6353f769681c7ee52a1d8d3ee0e5b47a7f211a8729147699398f9db28c2a14e0b0ecf57eb940ef21b0a177813cb4cc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2216 2972 iexplore.exe 28 PID 2972 wrote to memory of 2216 2972 iexplore.exe 28 PID 2972 wrote to memory of 2216 2972 iexplore.exe 28 PID 2972 wrote to memory of 2216 2972 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\admin\kindeditor\php\demo.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590ca2cf153c51f0f9a218c197805f9fd
SHA1eede83046bea044fb342d4827aa89d5b02e8063a
SHA256cc183729a3fdfd8c749ce915c2b8c9ed30231587fbba9ed153e1705b1b8138c8
SHA51210a922a6ac73f3d2c634c8f153ec1844429dea816b7af4cf6c800e66e59ebd6413142360376d49117cb78103a5fa6b921a01c1f07b4f87712c9a7586fb9ae3ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522a591646d081ec83a9a21f7e39b9138
SHA135d41d1bbcbf757c25458cb0b1d57e13d0a8ae37
SHA256ef85b7a59eeeb95306c321987a73352d8b7f8e0dfa2d469bd09b834a3a042847
SHA512f7e1932599cb1fc4de2d1ce40318d35c6176a10eb10b59fa1c861f3fcc34cb5eb7c5049e6bfee4e3659952fc9b41d73485ae21b169a56c073d63d9d755d1b728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518dd1cec1878bc15d4066b7e27b58f8c
SHA1e09336074c34764b3667afca1a6fd126bd899187
SHA2565358cb1e047c319f97858fb41b503e17f9a450dfa403906742e9245eb381285a
SHA5123cf917fbf175f802541b1bfa5ddb711cd54d5212a7824de29211148165766deda0cd4ff22d576944a78d68a5b5824fc438be1076af28be2e20ced971a2ad5dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2f6bff6b5ff18de62519ffcc1550c52
SHA11168cdbfa4d8065ad4b0159ce02dcaa63de50c31
SHA256670d1ff631545d444e02854d56ffd8251a6d468df9ed7a355dfb000566844fa9
SHA51231cf341db5c2efe18ce1ff3d49696792070a29f0d0d8dd7f511498f91a960339731ed0e63d615f370c4840df7886373ee5ebae505366540608b003bdf58b218c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d29fa97e803f1427e0ba0691811a293
SHA1c89875159a36dd1547d3914ef3424b3795c8fdef
SHA2567d2233cc76c4c767b1781d29d993bb23653e4ae00b82e0e4ff4f1dbed90fbf69
SHA5120326a5279bb580a8a9d89887b8eb1f9d7bf909c62369d7461eca99ffec97d7d7e39b9627e5d458a22b0321714f4d4051ebe175de72c6c1c1150e1bfab8b2977a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaf893781aae9bc355f1318b9a815d73
SHA154e1e15ecd58da18c4fccb990db718e47200f3e0
SHA2565043e8fb178beb01e961c8ca7cf4253a58c58f31a03d28a3a4cfa8f13d11a9b9
SHA5125a9bfbd9bb9bd9538115415a51d730e48cfd12a95efc23d6330deb6599bb34f0465437f669d47792e5dd5eb77f0059afd23969e08f1fcb1fcd57d80c146b081b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d91fbefb8c4bd9c4eb44f9dcdb8b91ba
SHA1c45f17e5c960c5d485489580eedb27601dc76cb0
SHA256daeb92a7f40da4ff0eb2c3d8380e563603fac6dd941e631f5a885b1f2df4c8d0
SHA5121b1c093c4a2fe0ac74366597ae4eedc8beaa3e7fcdb1da44666cc13776b05b5a9758d3547c56943642b0c3e5e719c3110d05a8c7e08e314e9bdf1ba7cddffd02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5826ba5802827100d02e9ba4bd9afabe7
SHA1f5cf4be8f860bada7340e6d91a01940775ad8a8c
SHA256c2c46ca54e271bcb454b3c30473378799c8de65e8830175ebb3da7bfe0ecc6b8
SHA512adc45ddd9abe509b152494efe238702de84f15c3fd2aacff9802af771ec81ef826fb9ce789b04b9095cd871938c6195f6a60b3f26a43a15698400614359ad5be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533c29acb9e2211874c699ba227c556a9
SHA17505598193fdd250c9d0a36cdff050ba727f4bf4
SHA256c6c39f696257ba69c7868534c7364088ce9cccfc70bd1482aa24c88d244d8c1d
SHA5122522f9ca593d1132267d99b707b3aa85ada69ad05c680f70547524b0884fd15873a506f70492ed9a5c871a3296f14600ca7a6ed22349dbaaa297decbf4ae76b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545a54c37d351dbdf96775a382ea17b27
SHA1d088152c0a93321d7b95f64ce8f73d84dbf49c2e
SHA256b1934bdb8784a8072b5d8f0ba80ef354bfade0680af201eea4a44a354f4adec3
SHA5129d321f63e315d3eeda6f534d586604f4e4d5b28710ea5fc4c3f37dfbaeb1999307bea47452a3a9a64c95537a6b07760e6dd3f9188afe0cc332b2c73183bf6332
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06