Overview
overview
3Static
static
1404.html
windows7-x64
1404.html
windows10-2004-x64
1500.html
windows7-x64
1500.html
windows10-2004-x64
1BBRAdmin/A...lp.vbs
windows7-x64
1BBRAdmin/A...lp.vbs
windows10-2004-x64
1BBRAdmin/B...nd.vbs
windows7-x64
1BBRAdmin/B...nd.vbs
windows10-2004-x64
1BBRAdmin/B...ay.vbs
windows7-x64
1BBRAdmin/B...ay.vbs
windows10-2004-x64
1BBRAdmin/B...st.vbs
windows7-x64
1BBRAdmin/B...st.vbs
windows10-2004-x64
1BBRAdmin/B...te.vbs
windows7-x64
1BBRAdmin/B...te.vbs
windows10-2004-x64
1BBRAdmin/B...nd.vbs
windows7-x64
1BBRAdmin/B...nd.vbs
windows10-2004-x64
1BBRAdmin/C...op.vbs
windows7-x64
1BBRAdmin/C...op.vbs
windows10-2004-x64
1BBRAdmin/C...ck.vbs
windows7-x64
1BBRAdmin/C...ck.vbs
windows10-2004-x64
1BBRAdmin/C...dd.vbs
windows7-x64
1BBRAdmin/C...dd.vbs
windows10-2004-x64
1BBRAdmin/C...nu.asp
windows7-x64
3BBRAdmin/C...nu.asp
windows10-2004-x64
3BBRAdmin/C...el.vbs
windows7-x64
1BBRAdmin/C...el.vbs
windows10-2004-x64
1BBRAdmin/C...it.vbs
windows7-x64
1BBRAdmin/C...it.vbs
windows10-2004-x64
1BBRAdmin/C...st.vbs
windows7-x64
1BBRAdmin/C...st.vbs
windows10-2004-x64
1BBRAdmin/C...xt.vbs
windows7-x64
1BBRAdmin/C...xt.vbs
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 19:44
Static task
static1
Behavioral task
behavioral1
Sample
404.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
404.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
500.html
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
500.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
BBRAdmin/AdminConfigHelp.vbs
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
BBRAdmin/AdminConfigHelp.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
BBRAdmin/BBR_IndexCommend.vbs
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
BBRAdmin/BBR_IndexCommend.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
BBRAdmin/BBR_OrderDisplay.vbs
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
BBRAdmin/BBR_OrderDisplay.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
BBRAdmin/BBR_OrderList.vbs
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
BBRAdmin/BBR_OrderList.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
BBRAdmin/BBR_OrderUpdate.vbs
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
BBRAdmin/BBR_OrderUpdate.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
BBRAdmin/BBR_ShopCommend.vbs
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
BBRAdmin/BBR_ShopCommend.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
BBRAdmin/ChangeShop.vbs
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
BBRAdmin/ChangeShop.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
BBRAdmin/ChangeShopCheck.vbs
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
BBRAdmin/ChangeShopCheck.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
BBRAdmin/CnbbrClass_Add.vbs
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
BBRAdmin/CnbbrClass_Add.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
BBRAdmin/CnbbrClass_AdminMenu.asp
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
BBRAdmin/CnbbrClass_AdminMenu.asp
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
BBRAdmin/CnbbrClass_Del.vbs
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
BBRAdmin/CnbbrClass_Del.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
BBRAdmin/CnbbrClass_Edit.vbs
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
BBRAdmin/CnbbrClass_Edit.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
BBRAdmin/CnbbrClass_List.vbs
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
BBRAdmin/CnbbrClass_List.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
BBRAdmin/CnbbrClass_List_next.vbs
Resource
win7-20240215-en
Behavioral task
behavioral32
Sample
BBRAdmin/CnbbrClass_List_next.vbs
Resource
win10v2004-20240226-en
General
-
Target
404.html
-
Size
1008B
-
MD5
7836b08e972fa2744773beedfd779fda
-
SHA1
c095acda0c23d947459ff1e7b454a00cc8546498
-
SHA256
10d6e8b5ea724fd5d06ecf37007fe54c03bee8ffd4a6e54c68d10f9483d8b1ca
-
SHA512
aae95554336e9628dea7fc360e69166cc9f7b7f80be20589041af9d8910f022b0c19175a425d65c03e40d48ca897974487cae27916de670131a3fe2c87ec76e6
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416693757" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0b025481177da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000cd3c707ffcf58d90a9d88d993bf84854ecd9d286ee34281e2bd03b9b91184ac6000000000e80000000020000200000005bea2cc8dfa2b5f8f6345f45547bb606bb53d7762b090fddc655f5a88be4545b2000000026370b0890d5f668aaadead5f5e509aeea3cd395e411b169c4485f25997c3d3d4000000024054ef86b7c5f24b71f42bd83595383b8a675767e78fd1035dbc605634ad6e05c0f262a4419eceaba7ad6f11cba3d371a4a3025be98743f31f0715093b105ae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{73948681-E304-11EE-8840-6600925E2846} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2804 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2804 iexplore.exe 2804 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2680 2804 iexplore.exe 28 PID 2804 wrote to memory of 2680 2804 iexplore.exe 28 PID 2804 wrote to memory of 2680 2804 iexplore.exe 28 PID 2804 wrote to memory of 2680 2804 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\404.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2804 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4767979f9e98c665774a03a0666cafa
SHA178622f41b9933abfa1581a1d1a33e5179d588bfe
SHA256e2f8163c3407158bc80be8da7d1d0ae84479861bb847b58cc558fea4943849ae
SHA51294a474799b30f022133a28f21663126305cd3d037bf0ecd1b63e67c0dd9952ee9294d2e6dc652186696cae0964fa7e6cd7df0914aedd5f6ff26a86c91380affd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b09f9ebd77f3f25ae7eb26e3e61b814a
SHA1305f7c45590bfb7b2bbd715822c8496c37fdbaec
SHA25667c01a226925e9ab90603253ee202d37ee1eb57be2fa2e07de5a8b0932cbfa08
SHA512c9280fc22753ce0f0829322fbaa54887cbe0f3fe54bd56a243e9257b7b13041c44898a735813e68871a84ae9e70c93e0cebf8833f7af703d103576e3d77b4928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b8711d5a6f573a0fac7562cf9522b34
SHA1d6f0234175fb6dd385fc0ce0c1cf0a9b23e72645
SHA256eb4a123047149de71e47b4d6cc1299349c142cc75746b40cc69fe71f62043c97
SHA5121a5abb55186fa659481b3363ef2f98489f9b48c1e5580d66db5102379bfdfd2984d3ca37c5af8d763837c48d7b56ef921ae3eaec5e34b984fa823bf9efbd975b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537ee36c6f2dd494e390d91e8ad9f58f2
SHA11a699ec61c3cd2507c81f98de7e1b47850592086
SHA2568b008aac6fb7be8afa41bd6855d47240550eee159f4604b0e4f1cac1bed0646a
SHA5128640b5f7446dc16bd292db4129a1b04bac59a876430e1af1e67f5b5f787cfe84db9c58b4e71881be52e8f60da2f85ced3a9128ce1b05b37215c4fa700c275772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ec17e182fef763a7c6d212d3649ecd6
SHA153bd09624b5dded603e2a117195d238859003bfa
SHA256422e88688300b0eb8d50352b7c1071162e9d89be369def15d6184ceaecb69059
SHA512403bcef60648905e627a45be1b4212ab6c1c477951d21ab3f52606fbae7a6f091a4c85ae34bb3415ac4192252c038224b015087238762e96e2fd6b09c7bf9f42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e34c3e2f036d4fbb131f1de1db113a0
SHA1bd890ba6835e93dd9e83c5d26c10d12fd82b7d0c
SHA25640a9351647581b3993eb3446def16af6244700a81f357752823a7727fb29c3c6
SHA512e23be4d1b0d00840c6c2dfc44b7210c8875d24d5f6463d7a6082959e5d36d018258dcafc1f6c521010ee3358fb90774ed6a296d3f08daf830f3970878bd72d8c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63