Overview
overview
7Static
static
3c7b0a4d4dc...99.exe
windows7-x64
3c7b0a4d4dc...99.exe
windows10-2004-x64
3$SYSDIR/Ba...er.scr
windows7-x64
1$SYSDIR/Ba...er.scr
windows10-2004-x64
1$TEMP/dospop.exe
windows7-x64
7$TEMP/dospop.exe
windows10-2004-x64
7tbu03852/dospop.dll
windows7-x64
6tbu03852/dospop.dll
windows10-2004-x64
6tbu03852/options.html
windows7-x64
1tbu03852/options.html
windows10-2004-x64
1tbu03852/s...g.html
windows7-x64
1tbu03852/s...g.html
windows10-2004-x64
1tbu03852/s...b.html
windows7-x64
1tbu03852/s...b.html
windows10-2004-x64
1tbu03852/tbhelper.dll
windows7-x64
1tbu03852/tbhelper.dll
windows10-2004-x64
1tbu03852/t...091.js
windows7-x64
1tbu03852/t...091.js
windows10-2004-x64
1tbu03852/u...ll.exe
windows7-x64
1tbu03852/u...ll.exe
windows10-2004-x64
1tbu03852/update.exe
windows7-x64
1tbu03852/update.exe
windows10-2004-x64
1Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7Analysis
-
max time kernel
118s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 04:28
Static task
static1
Behavioral task
behavioral1
Sample
c7b0a4d4dc98801f9b51ea2fef75db99.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c7b0a4d4dc98801f9b51ea2fef75db99.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$SYSDIR/Bat_Screensaver.scr
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$SYSDIR/Bat_Screensaver.scr
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$TEMP/dospop.exe
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
$TEMP/dospop.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
tbu03852/dospop.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
tbu03852/dospop.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
tbu03852/options.html
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
tbu03852/options.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
tbu03852/static_img.html
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
tbu03852/static_img.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
tbu03852/static_pub.html
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
tbu03852/static_pub.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
tbu03852/tbhelper.dll
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
tbu03852/tbhelper.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
tbu03852/tbs_include_script_008091.js
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
tbu03852/tbs_include_script_008091.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
tbu03852/uninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
tbu03852/uninstall.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
tbu03852/update.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
tbu03852/update.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
Uninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Uninstall.exe
Resource
win10v2004-20240226-en
General
-
Target
tbu03852/static_img.html
-
Size
503B
-
MD5
2caff3519f5be538757c467d4fec4756
-
SHA1
7e77344f049d9ee4d216b6f412c01ba28596773c
-
SHA256
e94503ad0ea2a4f7002ba70f57e12da9daabb5037b6bedc7725d1fc43a487415
-
SHA512
029814dd117053d03acc6c0cb1af2802256149c6a3588cd41334deeffad6095dc16386887e2053f288b13a5ebd3599cbf9c55c194fde81f3df77045d2609a467
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5DB55961-E1BB-11EE-804E-6E6327E9C5D7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007823eddbcee3e149bc4db86b21295af6000000000200000000001066000000010000200000002aa9d599e16b812c6c18e07ea2fe834b25564b9937dcab50810084d60d8df709000000000e80000000020000200000000480ac97aa5ba1e9e8b5334a6e43ee46418d8e89cca9f7f925545f8e41b5eeb7200000001e2a00bcbbf1c54445af4c616469de56d24bb1b8e4478736c420bebab7d6379a40000000440c0d7bfb191ed36d868f433fbb3d619fc761fc7d3e72c577acb1da9f895cb3136a13c88a2760a54d4e4157f31396d656b0c86f10031c5cf46c4cc67d8d05ec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0039232c875da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416552408" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2488 iexplore.exe 2488 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2548 2488 iexplore.exe 28 PID 2488 wrote to memory of 2548 2488 iexplore.exe 28 PID 2488 wrote to memory of 2548 2488 iexplore.exe 28 PID 2488 wrote to memory of 2548 2488 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\tbu03852\static_img.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538a3b9a834a416cc38f29918db57b272
SHA13c624abdf38e8120b5448cb9df1513d3c1223288
SHA2567f32d3623e67636fc86beb50356345148b1a215002992712d6872b9dd7eff8e9
SHA512df9fb1d4c4702dc07b4ccc00968a8faefa84866e7d2d518d810e0d1c62e3174d5125dc101b09e80ea5c8b42df64cae184fd3ed48e118d6cc9fc983e5b472042a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c138e4df325c696fd6de6eef8dbd6cb
SHA1b940c658cf37863060a7456da86ad18d4c477f7c
SHA256aaf48f3365a35c079250b458af31cbb07e5d6cdb94e43b8f324bac4a212e8d6b
SHA5126462afe13336f4a845abf58b619a982af76e55b28cb189401f492a61805ff949163c6ca8d3efcfba86a264f9b8fc4a3e13d0428935eb20e60874eda09b9343ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539f8a3fd51da534b5ebc2fddd431c0be
SHA106b42ac35d5911d7136364705032cfa0f3854f58
SHA2561f1e828925cdeb7dd83166aee98016783f27ca88dedf65573414b0d32b55ff80
SHA5120be792ee0e19309c0dfad1a36999513719a94fc8ee19da508bf4db091fc9e6f11bde461957528503aaf2f5a537d49a0d8420d9bb31e72b120310ddd89ce4b05e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5549388e38a8430062ae7d78705b68fb3
SHA136bfead129c002f0ce4c380b8cd166e8bc9522e5
SHA25686d6f57f5443e4b02c6cd6dd6ed206977ae9966b87fe872585d7313e3a6bd1c8
SHA512e16f009005a9f3eba7b421a8aa728db3a46f52aaeabdb925c32780442b7e8a3a9516b3ba393120a7674f686cb047cad6bd62705a801fcb2260c0cb87b9154378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573d0e7604a810c103a7733c99b1e08e0
SHA1d42c693de0719332307eee63ee42e140cb33f180
SHA25604f1dfeacc29d31f8219a38291b500e41287d3097b169d45c8513337e2f9c2a3
SHA5125d28265aa2003a20f3b285d4005c5f1b8f976221c522b2b7087075b8086af24e9ff324401397b4c7d590b32073f3844e785d32f7edbb4d406a0a53b3a3e1e2cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abc36aba602c86b634e34bfa823f89cd
SHA17036219a081252df6b6246d33886acba9ae93bf2
SHA2566b4f8bdb5e71de37b3d8e553c2d0e9b867b88512546db008a09ba4131d1ecf7d
SHA512fe11d338bb964f10b42aee0ad5df58f2e936aa9eb8d7dba474e7bd9bb6b0c3c1a2007376c4ed5b03d742e6e2b92c5a8f4497a0fa44a96ffcc067e63340e76a48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5558fdccf935397de3e93f3497c0fba6d
SHA11eaad14d5e5108161a4745b0ac907634e0cad640
SHA25661e691a772106af07505f4a7008dfb0b97d7d2a7d1b5f430b04c9d6385435081
SHA51206d41312c027f3f59d3c6d85fc432ecf621aeefbd5fb0c20720208285276da4c57d5fe9c612bf0a5226f10e0364b055e26f6c113baf2ba6b03eec748d785ab54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcc4117d640947eca0c83db683983901
SHA15afd42a9635338a0fd1c5479fad1b3780f24a139
SHA2560fd343da6ab4d49dfb4198ca7fd52c6308461216d24d283dae8605b32f3a4f7e
SHA512fa1b46f74ef27a452dfedf9bd619d33b302e031665600f57c397b0b6278e079b4d9a958299b22b6347ea08d3509087ed8484740117e1ca08d70248da408ed41b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec3560c4e81d6053cea523ae929cf8be
SHA1dff8648af8850d71b79b74f9c2c9106261a8879d
SHA256bcb7209671283ae2610f1443d96eba876175703b38b5e3fcd7d9d5ac41cc22ca
SHA5125e004ad80384e710f3300895447fd3c7b2789496ab3322e3efdfc0181f05d0077bdc294486c3bedfd1debcd314e52c15dba5f31c1e334a3f0b5451f085d27c7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc34a35a0af5df32c037111ec0099e50
SHA1193cb4537f3ba2673a87190815c7a4096670ba17
SHA256057c94fa3d3c5cf4e0a26aef5b2cb98a990535fdc077b4c954619e38a6c26a76
SHA512dbd473e99321e22d620af87a0da4165d8a9ea050156a89fcd0f77ee6dae063fbbdd52b50cf7fd546d1de4e9ada7a9b8f9cae6b89f4400e2b12803c8bb718fbe7
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63