Overview
overview
7Static
static
3QQLive3.5.exe
windows7-x64
7QQLive3.5.exe
windows10-2004-x64
7$PLUGINSDI...ne.dll
windows7-x64
3$PLUGINSDI...ne.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3ADManage.dll
windows7-x64
3ADManage.dll
windows10-2004-x64
3BalloonTip.dll
windows7-x64
1BalloonTip.dll
windows10-2004-x64
1COMToolKit.dll
windows7-x64
1COMToolKit.dll
windows10-2004-x64
1CacheFile/...ds.htm
windows7-x64
1CacheFile/...ds.htm
windows10-2004-x64
1CacheFile/ShowPay.htm
windows7-x64
1CacheFile/ShowPay.htm
windows10-2004-x64
1CacheFile/...ex.htm
windows7-x64
1CacheFile/...ex.htm
windows10-2004-x64
1ExceptCatch.dll
windows7-x64
3ExceptCatch.dll
windows10-2004-x64
3GdiPlus.dll
windows7-x64
3GdiPlus.dll
windows10-2004-x64
3LiveAPI.dll
windows7-x64
1LiveAPI.dll
windows10-2004-x64
1LiveStream.dll
windows7-x64
1LiveStream.dll
windows10-2004-x64
MagicFlash.exe
windows7-x64
1MagicFlash.exe
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
11-03-2024 16:39
Static task
static1
Behavioral task
behavioral1
Sample
QQLive3.5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
QQLive3.5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/CmdLine.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/CmdLine.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/procdll.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/procdll.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
ADManage.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
ADManage.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
BalloonTip.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
BalloonTip.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
COMToolKit.dll
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
COMToolKit.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
CacheFile/ScrWords.htm
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
CacheFile/ScrWords.htm
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
CacheFile/ShowPay.htm
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
CacheFile/ShowPay.htm
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
CacheFile/index_loge_normal/index.htm
Resource
win7-20240215-en
Behavioral task
behavioral22
Sample
CacheFile/index_loge_normal/index.htm
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
ExceptCatch.dll
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
ExceptCatch.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
GdiPlus.dll
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
GdiPlus.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
LiveAPI.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
LiveAPI.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
LiveStream.dll
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
LiveStream.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
MagicFlash.exe
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
MagicFlash.exe
Resource
win10v2004-20240226-en
General
-
Target
CacheFile/index_loge_normal/index.htm
-
Size
521B
-
MD5
f27c258679f3ab9e5e1eefbaff660851
-
SHA1
f5a95c049632406631f58dea367e683293cced44
-
SHA256
a418dd9829ab12231827281998ec859c306b7ea5f4f13bdfa843ea2417731389
-
SHA512
a79d62783dee77a6b6000f5c3e2b3183564053dc617b7fb5d08876e47f72d1860a7d946c337c4c6d861e5f9ee51bfd9d87ca908033df0ca6186fb7861e8a7dbd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B277751-DFC6-11EE-A6AA-4E798A8644E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000002609d26e17140086d2dbc08be00be2015c262e1a9b9eeb1b11daf9f9b48b0ce1000000000e800000000200002000000054630966b3065fa96c560f57640c9d1cff752ef94e3b7cb3a3b5c176d9a678329000000051e8a1de66928805d853c5766652cb5767ca004fcf098fea38ae90d97c140f2c620fbce55320463addceeb476dd0584087e75fdfe69d625aad7d78cd8e34bb30c9f99af8cb2b9337e0731a68fcc11d8825997188f396af630e7c31f0dda0bad1ec054b0a495607b82cf432faf3011e195c1eae7d662d47445694e83f167622ae0cb18b819ecb43a645e16c957bcfefeb40000000d8088efed8553c2ec2861fe2170321e5fca38b8e91e00a88a67139add7f2cc1db05e0727fe312767d2442e785c7b404fd649b328626a47bf1f0aa4722de0e711 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416337115" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6076adefd273da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000073af754124030189e3f6f65b312abfb2f8a2c018d3dd96ce806bc82c72c0ea19000000000e8000000002000020000000ab08b69ce1ef725eb549a41b7378df72ebae53e2c9a4c5a12f8328e0ebcdfad7200000009fe5c35521480ad5cd8a9e14cae3c1c3e7f206699d89393f05a3765f806ad5bb4000000027357fad48658c3656a935a21ca1dbd219739234f6756423d5557e9d13bb065066a60f95ef8d5c97297128bad8a9bf5af8ab68975a5c4fdb6bfe0f7b37ac9e38 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 1828 IEXPLORE.EXE 1828 IEXPLORE.EXE 1828 IEXPLORE.EXE 1828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 1828 2208 iexplore.exe 28 PID 2208 wrote to memory of 1828 2208 iexplore.exe 28 PID 2208 wrote to memory of 1828 2208 iexplore.exe 28 PID 2208 wrote to memory of 1828 2208 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\CacheFile\index_loge_normal\index.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571d77fac2ef0a5176561013d04b82c62
SHA18caa32e67282293ddd3c1028b40d77ede849c9a3
SHA2568c73533b2a0fe568cc83e389b5c2b964ec21b5e8af8345f7b76d1b8a30f12e51
SHA512bc5bab596b73ee17b9b0bcbd5bf18d98e74dcda2959c61a57835d06a3b093d66837a0f8d39524999c8bfc68dc534363ba05cd2eb6d2eebc81bc85fb1590e135b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d890427af3a247d33fb75aacf697f247
SHA17287644e743d125635ec5f74a48bae748d25f316
SHA256cbde81c0192829d2a962bc4175b07464d14008e9d3de7039ab781e02b7ae2a73
SHA5121fae5c0e5b7dc22ecb2f76f9796852f8b87795c8bff24dcb8784fd13cceb52b30837772fd57c1f31d09927a0c4eb56166ff5631dac35e3689c6a7edaa08e9261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec2d0494a816e8dd7c5c69a7a98e9c3d
SHA11d15ae5f78a70a8ca3239ebd9fc2f96769a80cf6
SHA256fe091cc15c24adb575c8bc202bd63457a6bdf257506d0a6afdb768c4da3a6dd1
SHA512f0d61bd1d4a293360f2d5f16be0f278789886dead9bca1d65aa41e6afb0df1694945861bff1fde8e030ac8c7d68d41b48b007635b10e2f70f829533269a7277d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63