Overview
overview
6Static
static
1Trojan.JS....!.html
windows10-1703-x64
5Trojan.JS....ax.msi
windows10-1703-x64
6FP_AX_CAB_...64.exe
windows10-1703-x64
3Trojan.JS....you.js
windows10-1703-x64
1Trojan.JS....l.html
windows10-1703-x64
4Trojan.JS....ax.msi
windows10-1703-x64
6FP_AX_CAB_...64.exe
windows10-1703-x64
3Trojan.JS....you.js
windows10-1703-x64
1Trojan.JS....!.html
windows10-1703-x64
4Trojan.JS....you.js
windows10-1703-x64
1Trojan.JS....l.html
windows10-1703-x64
4Trojan.JS....you.js
windows10-1703-x64
1Analysis
-
max time kernel
135s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
15-03-2024 21:54
Static task
static1
Behavioral task
behavioral1
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/Idiot!.html
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/Idiot!_files/flashplayer32_0r0_371_winax.msi
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
FP_AX_CAB_INSTALLER64.exe
Resource
win10-20240221-en
Behavioral task
behavioral4
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/Idiot!_files/you.js
Resource
win10-20240214-en
Behavioral task
behavioral5
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/lol.html
Resource
win10-20240221-en
Behavioral task
behavioral6
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/lol_files/flashplayer32_0r0_371_winax.msi
Resource
win10-20240214-en
Behavioral task
behavioral7
Sample
FP_AX_CAB_INSTALLER64.exe
Resource
win10-20240221-en
Behavioral task
behavioral8
Sample
Trojan.JS.Youareanidiot-main/Mostly Local/lol_files/you.js
Resource
win10-20240221-en
Behavioral task
behavioral9
Sample
Trojan.JS.Youareanidiot-main/Mostly Online/Idiot!.html
Resource
win10-20240221-en
Behavioral task
behavioral10
Sample
Trojan.JS.Youareanidiot-main/Mostly Online/Idiot!_files/you.js
Resource
win10-20240221-en
Behavioral task
behavioral11
Sample
Trojan.JS.Youareanidiot-main/Mostly Online/lol.html
Resource
win10-20240221-en
Behavioral task
behavioral12
Sample
Trojan.JS.Youareanidiot-main/Mostly Online/lol_files/you.js
Resource
win10-20240221-en
General
-
Target
FP_AX_CAB_INSTALLER64.exe
-
Size
757KB
-
MD5
c7a36096c3c7fe45a70fe9375cabfbd7
-
SHA1
a8ce9a12c963874a28cf067eb4f187d63e82f356
-
SHA256
b1124fb749b2e46e6d5e572b28f847f20c3432dc693c41c765b569e17485d95b
-
SHA512
06c9eadeddcdd5c4274b430336c96d39ee3df2fa6814272cbf937e24a8f07661bad276de9486fb5570202855b97e7a1fa266d4f36885457215f581fada88000b
-
SSDEEP
12288:FZi53OdV+TLBLD5bHoIP4+9B7OzbgxyT08CAAAAAAAAAAAAAAAXAbAAAAAAAAAA6:FZ23Odc1R94zbvT0bW
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2609343012" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000975e778a95a9ad4fa32c3348f33dafa3000000000200000000001066000000010000200000000a5cef17bea685704795984a542a49859b5006ef9bd28eb78c67754989ef8f72000000000e80000000020000200000001e11f42350bdb29ba8941e484a8a4ec3a69e6c1da80569b7a71c28f548b2a5a320000000ae0d21e6cc0fb0e62d9708a1c955af22ab8751f9baf6ef7bdf81bcf3e8b727b640000000b950d4a13dd3977e268025c3844e982700f56e56f15415648f0ce2bbd331fef19f52e1f4401c3c5324a033b5a9aa7f02084a5ec914b9893e212b1caf3877de57 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31094563" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2608874275" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "417321317" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C687AAAC-E316-11EE-A294-CAB0334DBC84} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31094563" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0f4009c2377da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2609343012" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000975e778a95a9ad4fa32c3348f33dafa300000000020000000000106600000001000020000000ac82d8b272c859ffec0ed4e318c545bb7894849295ec0ba811ea1f98d562fb20000000000e8000000002000020000000aa5f5308d5bd246d664874735c65e68ab796d32b743aa3f440388941c1afcbb920000000b4e2a0e91d24c2a2c1edc2d5df003cdc3a7cecc3cd61e4b0bdb07604c93e1c09400000009c6f0eeeca7cc9c64b5e908be9300435024a42bec051cae1a47ae6b8f6746f13f008e067129ea51b1ae245866803caf492e9e287edafc54e2d0a248a4c28bfa8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "417353307" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31094563" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31094563" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0af059c2377da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2608874275" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3281913400-1494313570-2321515684-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417304721" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1408 FP_AX_CAB_INSTALLER64.exe 1408 FP_AX_CAB_INSTALLER64.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 3572 IEXPLORE.EXE 3572 IEXPLORE.EXE 3572 IEXPLORE.EXE 3572 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1408 wrote to memory of 2088 1408 FP_AX_CAB_INSTALLER64.exe 74 PID 1408 wrote to memory of 2088 1408 FP_AX_CAB_INSTALLER64.exe 74 PID 2088 wrote to memory of 3572 2088 iexplore.exe 75 PID 2088 wrote to memory of 3572 2088 iexplore.exe 75 PID 2088 wrote to memory of 3572 2088 iexplore.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\FP_AX_CAB_INSTALLER64.exe"C:\Users\Admin\AppData\Local\Temp\FP_AX_CAB_INSTALLER64.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.adobe.com/software/flash/about/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:82945 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD53752459352c1f1cb603d0cb700cccec3
SHA1003f35792d54be17d517a4af7c3dbef49a23bddf
SHA2569bd9b22ad8b16128aa257e9629ec146612d2c14ccd422248a5cd60128c0fb534
SHA512ceceac9e5e353507b28d3755cf1c372a669d793287c05b6c6dc0d4465289b9846399d16b396ddaffdf699b1cc474566648e5239c20288fca3b3d9c7d620283f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD540fc2661e33caa08819ab47003b60ff3
SHA171b95ddaae1f83fbc63154b4de63c03ac59ac3e4
SHA25629d03d8c7fa5ce4021f5d337ffd06a2d9b94f1a04508dfe990e46152ce7f13f0
SHA512ad59fcbf5da8de87b690ca5b343f100991223a5e6945b222a78cceaf32683bc9279778946f596145a177ea0e2107e175fe4fbddaca6996a3269aaee2fd941a67
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
545B
MD58de2513c69ad00efd9775680c06282d9
SHA132c21e3fa3c0a9b2343284c873d922a4c83b592a
SHA256ebab9e15d963dcec39a01faf72c4cf848bf72f5b093f4418b953617e17ee8897
SHA51207fce4185bd2cfbc2df684d788da070e69fb2445f61b8ce151a3a55d8adf30764412a4f08d1d15690d8a7c85d3f31efeb0fcebca40a56aa5d0015abac6dd17d4