Overview
overview
3Static
static
3Themida v1...lp.chm
windows7-x64
1Themida v1...lp.chm
windows10-2004-x64
1Themida v1...da.exe
windows7-x64
3Themida v1...da.exe
windows10-2004-x64
1Themida v1...ct1.js
windows7-x64
1Themida v1...ct1.js
windows10-2004-x64
1Themida v1...e.html
windows7-x64
1Themida v1...e.html
windows10-2004-x64
1Themida v1...m2.dll
windows7-x64
3Themida v1...m2.dll
windows10-2004-x64
3Themida v1...sp.dll
windows7-x64
1Themida v1...sp.dll
windows10-2004-x64
1Themida v1...sp.dll
windows7-x64
3Themida v1...sp.dll
windows10-2004-x64
3Themida v1...l2.dll
windows7-x64
1Themida v1...l2.dll
windows10-2004-x64
1Themida v1...lt.dll
windows7-x64
1Themida v1...lt.dll
windows10-2004-x64
1Themida v1...01.dll
windows7-x64
1Themida v1...01.dll
windows10-2004-x64
1Themida v1...in.dll
windows7-x64
1Themida v1...in.dll
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10-01-2024 02:23
Static task
static1
Behavioral task
behavioral1
Sample
Themida v1.8.5.5/Themida_v1.8.5.5/Themida Help.chm
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Themida v1.8.5.5/Themida_v1.8.5.5/Themida Help.chm
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Themida v1.8.5.5/Themida_v1.8.5.5/Themida.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Themida v1.8.5.5/Themida_v1.8.5.5/Themida.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Themida v1.8.5.5/Themida_v1.8.5.5/ThemidaSDK/ExamplesSDK/Macros/C/CBuilder/Project1.js
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Themida v1.8.5.5/Themida_v1.8.5.5/ThemidaSDK/ExamplesSDK/Macros/C/CBuilder/Project1.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Themida v1.8.5.5/Themida_v1.8.5.5/ThemidaSDK/ExamplesSDK/Macros/C/Visual C++/vc_example.html
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Themida v1.8.5.5/Themida_v1.8.5.5/ThemidaSDK/ExamplesSDK/Macros/C/Visual C++/vc_example.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Themida v1.8.5.5/Themida_v1.8.5.5/plugm2.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
Themida v1.8.5.5/Themida_v1.8.5.5/plugm2.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
Themida v1.8.5.5/Themida_v1.8.5.5/plugmainsp.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
Themida v1.8.5.5/Themida_v1.8.5.5/plugmainsp.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
Themida v1.8.5.5/Themida_v1.8.5.5/plugsp.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
Themida v1.8.5.5/Themida_v1.8.5.5/plugsp.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
Themida v1.8.5.5/Themida_v1.8.5.5/sewl2.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
Themida v1.8.5.5/Themida_v1.8.5.5/sewl2.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
Themida v1.8.5.5/Themida_v1.8.5.5/sewlt.dll
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
Themida v1.8.5.5/Themida_v1.8.5.5/sewlt.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
Themida v1.8.5.5/Themida_v1.8.5.5/xbundler01.dll
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
Themida v1.8.5.5/Themida_v1.8.5.5/xbundler01.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
Themida v1.8.5.5/Themida_v1.8.5.5/xbundlerMain.dll
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
Themida v1.8.5.5/Themida_v1.8.5.5/xbundlerMain.dll
Resource
win10v2004-20231222-en
General
-
Target
Themida v1.8.5.5/Themida_v1.8.5.5/ThemidaSDK/ExamplesSDK/Macros/C/Visual C++/vc_example.html
-
Size
1KB
-
MD5
97ea28334d67d71e4a96b56d76fe0d15
-
SHA1
caffb42a57d09d6b8246c583f0d76004fd003d86
-
SHA256
9965e660e07492e5c45bc7c52b981d1d65f6341a415979742418f5f699c1e771
-
SHA512
0f2c0e693dd4e83e3c0bd2b68f6015a878f77b87dd0c84da836416b74e4284e8787c19b5d361732ab0d45c2b9c924746d73dba1493d1722b93731db6229120a3
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c00000000020000000000106600000001000020000000cdca3114691b5e5e5cc5f30513a16bf1e559d1453de47469c2c481e583efa1f6000000000e800000000200002000000032ccbb7afef94889c5af4c6da38df5cfef55d73fb4f94bfcac2930731263339220000000dc95506506ed00b420a664f86e692bb12dcc716a845e120b349b04418e13c66940000000de23bca489daaf42fc150bea8e0eef510e477aed2a7ad54b08a223dc609811450931e780e830c94ae94f7ff488b8dcd10ebb9d015c9983cfa3dff301ef9ba66e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d098862f6c43da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411015332" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5AA9B791-AF5F-11EE-A835-76B33C18F4CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2268 iexplore.exe 2268 iexplore.exe 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2108 2268 iexplore.exe 28 PID 2268 wrote to memory of 2108 2268 iexplore.exe 28 PID 2268 wrote to memory of 2108 2268 iexplore.exe 28 PID 2268 wrote to memory of 2108 2268 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Themida v1.8.5.5\Themida_v1.8.5.5\ThemidaSDK\ExamplesSDK\Macros\C\Visual C++\vc_example.html"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c4c3ef12abc72329d388b69325aa3f5
SHA1b94e29c23251ec39842a33931b6ccfb2e86cf437
SHA256bb259cc869c2780002c3be2d2a942fca9ce6ec897d975d82e9d00d4fd98d9e81
SHA5120c2255724b757bbe72f401ce9e45e407087c724fe5027d480abbda1ee1f39e4fd1047f78c636a9fc85cff61226bd90b2adc15f6d10c00b3cea954fff22cc92f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555718dd98edb44795ebae2864835af67
SHA11923ac657f707c377563dfca51b30a4b30919d88
SHA256f93cce00cb048bd5495a5893cf78f7ed5f74165f892597438b38cf4231c63180
SHA51249c8a8be787d2ad3b9a7c9cbbdf874127275f09dcf9f65710a6737af8c2561ccc9d46d6cbd5011eaa1457075534638b2045890af078c2b98ac004d1e3628000b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de3cafd5ca2152dd8939884b20206a00
SHA1dbc0d42ab9ace0d141fad64d213181bf22d04ce7
SHA25695b6e7d2d77a418c7764d0f503c5515221503543da338091cdec2171596cdd52
SHA5127287fb40f0d4943b2bc27fac1caf5ebf325eb2cda1f7814b999957bddd658d5b819dbf1426b14d82b17c4ac5b536c9448842f48412aa7807b5266cd5699c385d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5711fe4208bc080b7d8176314760a627a
SHA13df603afd09f90a26d1601d1006c75d7c24fd4d8
SHA2568847e84eb7c56bc6099dc2771456530b95f79ab1ec7c7edda0f96afa5f6fdbbb
SHA5120de91bb9ebfe9c3cab048c8ddde0f3a4fd30843d2fa163a140f5fca693ba0f7d0f60ec8a177f45f2bc64ec68445eee1b48e1054e1e1afd0ba67520495d50637b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7c21de8876f9fda9e0cec12bf5d6857
SHA187233a9375181a0d2acbebbf923d69ad93a27294
SHA2560667ee2ae022c31abe9998420c2002ef323252d67ed6477327e0dab92e1c41ba
SHA5128d0031a3b930afecde81bcccdfc95872e8699fd4f642bedfab6c2bbe034247146b6cf1a803c1c844f22df14175af632593b389c61c1df53f0d6380cb7b4ad542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d55469598c58861bb29185c4a0d188c3
SHA13fd1d14f6dc874743f013d33d339b5bde63dab9e
SHA2564ab1812e2e384725d4658d4af16a399fd6128520b6c3cb6db8333fe6f55e21c6
SHA512dc5187726d1a85a2e9b6c19979ac45ac9bcd5e7faa45f86bbd5b83fc1350341502c1bab5455c4bf5e23f47cd4a671e854d011fbd20656fced70ad463152f94a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0734a7285a3e6b3570baa7358144c02
SHA155b000bf76e04ee006191facab7b47235e09629e
SHA25651c31443f82c0254caeb64caac9a6bce8afca7ab14bea29ef5b2bc26d8b23e3a
SHA512289aa738707dc1c2e34ed0f40465506f69e406a00f551e29fb9b99378489f31b0de7cbba241649138615a06d87f7c69ec2dfd16c0f31d236833be3d0dc5b9976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52569b6ac713fae0ee3f9d591ea12ec15
SHA17b7919de6af1e3b9a72a3d73b35917e6b090d9d4
SHA256e061448358c6f7ca2a58a4f12ee82ce2be0dd5ea90d32a598206f4cbc32734da
SHA5122c24b63f54636ab9183aa10d19c42520bc547182991ea707040a231a130067397c42f05cca24c9675d72fb49f7f7baabaf164cc00cd68117876fa8483b16494d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb1f32a7c5d4beb7861eefeab189d7ed
SHA18d1200ffe67bddd711437f8e45d95a8cc38b8555
SHA25683ae0c1ed728a7fbfa850a6b126bd960e3352ed30b5a1a6b434c8bfb3ff74ac4
SHA512ca7147965a326e33880cde1ff394a5fc5df00d6fa167ade44981066bc9ea9ab519061f49d93a25510006b0c483ff10562649ffd7a57e7e500c17ca7bc41dd159
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06