Overview
overview
1Static
static
1ffs_mysql ...ose.js
windows7-x64
1ffs_mysql ...ose.js
windows10-2004-x64
1ffs_mysql ...png.js
windows7-x64
1ffs_mysql ...png.js
windows10-2004-x64
1ffs_mysql ...e.html
windows7-x64
1ffs_mysql ...e.html
windows10-2004-x64
1ffs_mysql ...t.html
windows7-x64
1ffs_mysql ...t.html
windows10-2004-x64
1ffs_mysql ...f.html
windows7-x64
1ffs_mysql ...f.html
windows10-2004-x64
1ffs_mysql ...g.html
windows7-x64
1ffs_mysql ...g.html
windows10-2004-x64
1ffs_mysql ...h.html
windows7-x64
1ffs_mysql ...h.html
windows10-2004-x64
1ffs_mysql ...x.html
windows7-x64
1ffs_mysql ...x.html
windows10-2004-x64
1ffs_mysql ...e.html
windows7-x64
1ffs_mysql ...e.html
windows10-2004-x64
1ffs_mysql ...h.html
windows7-x64
1ffs_mysql ...h.html
windows10-2004-x64
1ffs_mysql ...t.html
windows7-x64
1ffs_mysql ...t.html
windows10-2004-x64
1ffs_mysql ...r.html
windows7-x64
1ffs_mysql ...r.html
windows10-2004-x64
1ffs_mysql ...o.html
windows7-x64
1ffs_mysql ...o.html
windows10-2004-x64
1ffs_mysql ...x.html
windows7-x64
1ffs_mysql ...x.html
windows10-2004-x64
1ffs_mysql ...l.html
windows7-x64
1ffs_mysql ...l.html
windows10-2004-x64
1ffs_mysql ...g.html
windows7-x64
1ffs_mysql ...g.html
windows10-2004-x64
1Analysis
-
max time kernel
68s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/01/2024, 00:21
Static task
static1
Behavioral task
behavioral1
Sample
ffs_mysql v4.4/browser/close.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ffs_mysql v4.4/browser/close.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
ffs_mysql v4.4/browser/iepng.js
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
ffs_mysql v4.4/browser/iepng.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
ffs_mysql v4.4/delete.html
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
ffs_mysql v4.4/delete.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
ffs_mysql v4.4/html/about.html
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
ffs_mysql v4.4/html/about.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
ffs_mysql v4.4/html/f.html
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
ffs_mysql v4.4/html/f.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
ffs_mysql v4.4/html/g.html
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
ffs_mysql v4.4/html/g.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
ffs_mysql v4.4/html/h.html
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
ffs_mysql v4.4/html/h.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
ffs_mysql v4.4/html/index.html
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
ffs_mysql v4.4/html/index.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
ffs_mysql v4.4/html/note.html
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
ffs_mysql v4.4/html/note.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral19
Sample
ffs_mysql v4.4/html/search.html
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
ffs_mysql v4.4/html/search.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
ffs_mysql v4.4/html/t.html
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
ffs_mysql v4.4/html/t.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
ffs_mysql v4.4/html/user.html
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
ffs_mysql v4.4/html/user.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
ffs_mysql v4.4/info.html
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
ffs_mysql v4.4/info.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
ffs_mysql v4.4/install/index.html
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
ffs_mysql v4.4/install/index.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
ffs_mysql v4.4/install/install.html
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
ffs_mysql v4.4/install/install.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
ffs_mysql v4.4/install/setup-config.html
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
ffs_mysql v4.4/install/setup-config.html
Resource
win10v2004-20231215-en
General
-
Target
ffs_mysql v4.4/html/note.html
-
Size
820B
-
MD5
a26649f0e8e8d8077a5fe4140b99046b
-
SHA1
6acec62562a63e771040d3775bee70c61f4341e9
-
SHA256
374353418a5875437d5e872593ea69d7352183293fa24834377fa531403afe30
-
SHA512
74db0d27ce53090167db93b9b95c56c44d34cbe958485e0a399bb469d95ce16194913d3862cb3dbd96f9a3c7d3b9c46388b01e540cd3c2efce4901b4eb86c01e
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c00000000020000000000106600000001000020000000e62ac5d57f174dd76f52289193c8e172b81fb6e992210563a7e2a78b5c2f86c6000000000e8000000002000020000000c4d918e20076c9f8982bdaa3292397e6601b26c706018def2f547b79b989af5120000000881ab21a3926874a2173b5411a10e6c5f28caaee3a5e5d37240eec2748d7274940000000cbcf9de4162219b6987c96256dccf00baa946980d77247e7a26bc6744ef88f28c38d8877f95cb6e57d3e4767c71eb2f03b895dbd2efc0bf1e73ab09660091c64 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F1590131-B272-11EE-A7EB-CE9B5D0C5DE4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70327cc67f46da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1256 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1256 iexplore.exe 1256 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1256 wrote to memory of 2684 1256 iexplore.exe 28 PID 1256 wrote to memory of 2684 1256 iexplore.exe 28 PID 1256 wrote to memory of 2684 1256 iexplore.exe 28 PID 1256 wrote to memory of 2684 1256 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\ffs_mysql v4.4\html\note.html"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1256 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d04152308a80548dbd107d5aeef4963
SHA1cb3cdaffbac2acf967294d829d1bcae3ba89260a
SHA256eaf4a224fdfa9d3de942608f0939f6c588622c3ae986ccf281c56b6d559e9979
SHA512cf8062ac2c7307500c0cf744d1857dd73a9331d5d364c0492b6a9acc93aad3075d6c4e57532ac39e9817f73edb63e596e6dbce98046174d2aa765e7d79b18a69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1e57169918faa922dd29bd762c9a3bd
SHA16302af44bbfa8dd3b13e53ddd7ba4747a30081c5
SHA256dacee419ff9297d5be9dcbdfd1a1c99ba42273baf74fefa283e8fc5a2879ab24
SHA51270b91c22666e6e505d5f473ec123385692b7cdccb8f03b5310843b7577b48f6ad2ee54b44af11c4e5df6a29d032080abd8e5b3defd9917dc63f3bfec733ff5ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9126b7de84641cd558b41daffacc151
SHA1096eca895d945b345c378dcf3ab3ddafd8352ad2
SHA256a6d5927a7290e7b36ce0683c904fb6f354c7e2cc17dd8a120b3f26f72b85ffa8
SHA51285c19a3de4eeacc71e8c5a1907a4d6132c466da0bbc2a6e672787042eaaf64ea2192d19e2ed9a7373bfc0da0778ab8da0fc7af7c7954a45c63da956bdb2132d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abf00bf352bfb6b719f25e57fdb0d158
SHA1cc1b56c5ed868e475be20907ce4086d7c75f2ec1
SHA256e284a6071bf5ffec85a9db4e88de5b54c973e045b5c7a33d9906e53e513c0433
SHA5121531b5066b57f8016eaaf4df528e7139e0f734aa007a2d53177772caa328974dbdb218078a459f4e9ae42a031a5b9b73b814728a2e2a2daa8dfc356dbf7d8a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5638ce207d9be6c8a3a2621caf277e0c3
SHA132110ec3089c2a96e1d51672d50c2f64bf2942b7
SHA25684b14b639415029ded4781b6114be0377070ebf1995e825b9e80257623784623
SHA512eb3a557ca15c60faea39f15c0c9ebc0b803ceeb303665de95f1ad1e47b45988b2b7766286a5bff4f1c8d505ce298ca609d3e7f010c7899e178fc8f936651a2aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52efbb3b839c85e4ef19a89b6f3f15129
SHA16ab530e0462fc60e08f7c3f73c532ae42ae0812d
SHA25653b4a84eecc1d815068004aad8d227bc41bfb4e6f4bb0c063014773e5dd25c5d
SHA51265ca20c84248b7fa38a56940f9e6af3af1a69bcf7c9d083cd595011b81d244303bd0cb6d69a5058f9db51d6116036a6adce997a3f607bece1af2272ff12e2e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f25722f170fb57d479c4b4aa744e8f8
SHA1e55ee1c435ab1c3647b14e13fe0e7a1a31b4e299
SHA25666c40153a8a55563e6d8312945dbcbefaa7ee4769909fc7156854f87f157fa04
SHA51251e24c3f40ee94459ce75c4442d7d24c1d4832eabcf3d4af5a8c5ea542f26677a77ca6178175d5f1bfdf8670f9acee95a7c5663da4b0bd32faf4e482b8960e44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50907ed2aff885edc4ecbb5a7ba44b98c
SHA19da8871121c7e88b8856878c41a356b3c957ab24
SHA2567dc6a21f97bee9edfabd6afc0a11aa10825e2c61ff739e45dfb550d7b77962e9
SHA51298041f0cdbbea9c3e1a6ec41db891cc9c4effa6fde0a59583a6c629b6b8fd74e9b8b782b27b269a97cd0e4f989f912c9615d102301a129f393c41f4afef94620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a8567b5e71bb6bd3c30e3187a3a5d8e
SHA1e7fa92054f70afe3dc865d4ab802fa9e825396ec
SHA256130b81ffd1b31a420127da16fe2718bfa7f496880389884b32b42cb67902d91f
SHA5123a4d2eaad9ce82cfb56fbb6355eb9b639826d258ca660363026690701bb19bc4f6c0b87a2ad98b27f7518cee14d2218a582742fadb2815a1e972047d670d0974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ad90c378f6743a0ae22b1f619e4d25f
SHA17719bfc832797aff01fc5eb6369461c253b64316
SHA25669412a4b384a85aa5e5aa2eab76455a655f1780bfb52d57d3c42adeb2bb1c9ec
SHA512cfe79de1d7cfd55332933477bd4a0bf8770a2e076dab65f08ed1238651c1015eea68b118a8f9dbcc8ec248499a60df9be476ed874e654b88bccb528a083bb34f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5132159ba8a10e5ee5b6165978a75bc3a
SHA15672582315b0928a02fd371ae0a4010023f34346
SHA2566faf09de1ad6190d0d0fed9c9d07f13552704ebab62066a001476b23aff46019
SHA51205b9fae3029cc4aae80a94603a5b5df0dea5dd5b4a574e46097b6c01d63396c599d02c536e9befd9ded559e4f632699ce00971245f8fb39441d5b757ac09c597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57589ead1423a8de417d0a7c139729680
SHA11185c8fb4f3d2fd81989871b3ac62fb1b51dc58d
SHA25695b724899f86ed66eaffbe4809d87747b8a473b5ee020c6ac91bd823a2f4015c
SHA512abe47afe9fe0c73e424d269a7e9d783ddae1da1778e2ee5d0a0d6e4fac81b13658ac1698e6fff3eebe8d9339030b9c7ddba65deb35beca6221a80d07ecd0d03f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06