Analysis
-
max time kernel
117s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-03-2024 04:55
Static task
static1
Behavioral task
behavioral1
Sample
Payload/aisiweb.app/TencentOpenApi_IOS_Bundle.bundle/local.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Payload/aisiweb.app/TencentOpenApi_IOS_Bundle.bundle/local.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Payload/aisiweb.app/aisiweb
Resource
macos-20240214-en
General
-
Target
Payload/aisiweb.app/TencentOpenApi_IOS_Bundle.bundle/local.html
-
Size
4KB
-
MD5
eb178a536d50a25f51c77eb780fa36ca
-
SHA1
5d06cbc455fec0f591f6994e9f8e75c501e6e180
-
SHA256
9f90d886d5750e7bcbaa148f9b9b3c04c3ba924cdf7962f37d97a5fb1cb59272
-
SHA512
4afad9921f32ae28e048fa80c59e0ccb1ededd94f213aa8d94d268bfd749e753dbffc03f02413ddaca86ba2470411648c8839e41b13276df74d51681bbc62ef5
-
SSDEEP
96:YDNWFcZTmEFJmCtu3hN0a4BkrvLG13GjiiipDJLu67c:L4mCEhO3B4Eai5/c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009d182698a4727943a65bc6c9ecfd0fc500000000020000000000106600000001000020000000208251561bc9b660e439fd2af345b2a19caf41649e201b6cc3c9544f15fdc970000000000e80000000020000200000003b4da3720e67b6224b1ac6fd72469e76f4a5b21cfa62fb0fd2a166014ab0549a200000001fb6b341e7e82a1a61a691a03d95c1628355d3a8986eb5004adbb3e95e064dec400000007d99f4537ff47aae13165876388db6ae1ae7f6d4c84ade6873db6e4403fd9f2e168f39e3665aa542400104770ae866764fc65a06a1a00899d7833907f6c2f327 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0863fd70275da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416467636" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FF2DC8C1-E0F5-11EE-BC96-FA8378BF1C4A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2632 iexplore.exe 2632 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2500 2632 iexplore.exe 28 PID 2632 wrote to memory of 2500 2632 iexplore.exe 28 PID 2632 wrote to memory of 2500 2632 iexplore.exe 28 PID 2632 wrote to memory of 2500 2632 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Payload\aisiweb.app\TencentOpenApi_IOS_Bundle.bundle\local.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2632 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570bfa8a775ac552d84d38bd422fe03e7
SHA1440fe35413baf8269cce309b359828d69a03817b
SHA25607bca0d73857f1ca1bdf57d3927b5ff77be9b682bea783ca66be780721e1ec98
SHA51274a3e1247829f12b5a9057667b5fc148af9baae5490c16e1a4953a897b0738c04b28e70085caa864a7d8d976832cebf1041aa2950ba33b79d3e6f4893b3a4616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541e4e48eb301f17b58827b0e4f0a81df
SHA1896961e444b9e768c0864a9f145cfaecbbcce777
SHA2564498eba06dfb826466102aefcda75cffab551d379fa33441d7a64f587c9fde4b
SHA5120885f33a8774bfd1c00d3e925faf686b34794dc6f0339830adf5378079adecccbd236fc75ca6e1dc0c506dff5ec8b516730e0c5bef90dd48a0cf9f1cd31f2077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3ea52bdca15e6a74d94e962151fc9a3
SHA11cad2bed9728c1905e94c6156bd59e1624138604
SHA256acc704fcb48a6006491e1c3851dbbea781e3caa1dd6739dfc5b69a3766224069
SHA5121a20d837cd55fff9db174438404592a0ee312e9d6078e9debd6cb2d31956ed6bcf4169034daaece90a9662f2f094a0b37f2cba5435cafa2e84eb9bc23d5503d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edbfa206b9aeca070cb9ae256b72f2ad
SHA1303eb1c160c3e94082ee7b4b14621714a5543a9f
SHA25672139cec671db43c92d1ef9e1a23cea82acfc08246af1c5223538235a4c5d18d
SHA5120ae4737d02a14ba6d69071a72427a3003017b29a4ac5a943f47e8e702d84ff91504a7c0d581ba2a6d08e00ce5af60b98e5d1258bca661ce4304441f43ba58e44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588a84cf76606ad924c11d4bfd92deb9c
SHA141a22fb85e99e594fb2fcda61a0380dcf8d10412
SHA256c5d0f790c008fd9120993e76db335c7101f42dcae9feb5eadf1c2cab1badf87e
SHA512705ff1f39a55a21bbcaa729a1f9d44d71685329908792c617b86d352233b1fee3899a1b6b8b8370f2acb898e1205a1cf47de928f4a8750842739080df85716b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557e2a1f048134187b45d551614e93589
SHA118bc5d009c60e1f25494eafeb9a022815f1922a1
SHA256509c2bc52157f81f9ac7d23d9a0128189bcb928d24cda1c349047534391fd217
SHA512e74fa646b0801fdfb2ac2b6a790cade8be02315f9d050403e4b1b756b3340f98024edc02d2525c90f0a2fd79b7b50065713d917f2c2ddb1e176153468838b966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520da2daffba05040612d4a21e2906de0
SHA1d84899320e42b10e872c245ecadbaa0bdcbc1738
SHA2562754f0b919cbe3e2737406ad3b723f92b90397860b450ce4417903a7df155d6c
SHA512b5477cb21f01b52f554963f69d35d9690cefe6282f2bb93050895f27aef92d046ad28015b69a04992ee4f9873dd65ab611ddcd9db30fc2c7cf1b513579463781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f623d76e30ad6cad9f85860c2aca76df
SHA1104be629a08e3194f9c33a8e1ad966b2ff636403
SHA2569d1686fbcad0b198d3b651f45ba7b6c41eaa0a1168e21fd9137594927aed76bb
SHA51223c4703b7c53daa1d2aff7b485818ddc50198a33973fbac89746d993d4db8721b08910b4ba889e01a9057df522ec1d6d0197616be2c48fe54cc6bcd8e39fa376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596b40dc628adb2b1f9cd18dfbf8d94a3
SHA1c6124425e1eb25c6332b7431bfe32349231742bd
SHA25694c634049811c0e11f5fc9e3f515cf84d9102913803814dbc0831ff99d33b8b7
SHA512a4b944d8e16d75aea40fe2c7eea6548a71b55765eed467ffae3ed60cb5223adb4197647a741dcc4603937f7014a765ebe35712549437b33e5ffc46fa782fc982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b70c312e39d82d87b6c32d6740d88b00
SHA1d11e25927ceaaccbffda721833e0ebdbcf88a4a2
SHA256b26935cac480a61a12682412dec55d12645663af482833764fa9f8dea14582ed
SHA5126cac7db3db66fde7fa7b96d2820006175f3218098b750d2c784957ab4072740edf7d696081814fc41e50ce435be14473c7cea294b4826285091fde2282ea76c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b5d40a7226a83ea0631f249e13144e4
SHA1e4f0e160c99632b91b50ccd284058925a983a9df
SHA25664081ba65a1d7b1a035fffb0c0026b4525cc34a481d2af12cba38c0e62656ada
SHA5121648b081be199e8f4d11ebb255f747a3456fcdaba45a5766192e57ea0587bd51e7fb5452c245de59148402d643d40550df63a56bc8fb89283e81bf8dffeb77b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eae6b6a37174341c71956a19167c03bd
SHA14cdca2151efe578772ff1a22015869420183ede3
SHA256be1e1b95cfb0f9b748753cbf3abc8c2113dc5313d27f73fc654dd9bb42ce5193
SHA512f40c8e56b23dcd781d8c2f9b07fa341aeb3227aa07028fc97585aade521dfdc4a4bc7578a632756beec1f0f818c773266958ca38b6f2877f9d04ae69b72031d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5840462b2a51742d6a0f63cf00fe2883a
SHA10d8111aa0bacd09b1d12f2be113518c33a6c5222
SHA2563a9eee0657edd54d7eacd6baa02f3657ca20d7489a1ca2248201d9c683d7449e
SHA5123f98a2e6424a262b533860e872b9d740393b5e7bd017e8c5d2f7cc91e198c006e34ff5420abcff8e5dd61f60c03bb7493d176bc356c8ba326ca980e1c9618c22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5391977e2004f930ed3e72e2e984f9b1e
SHA13b9281354d0616ce071831de45510b2a718e1bce
SHA2568ffc54d55879bb76565c4f0f34d581255f1d36b60b9bb2b2af726fafcecdc8cf
SHA512c0265d7617c40c5c82966bd0c0c069104e44a8b19ef1c3ab1a52d3d0c4e238a30a804d470fff3991f8f86ca22b7fa5ecaf7491e2eda20ec10775c8e3ffa07925
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63