Overview
overview
7Static
static
3cd109c901e...56.exe
windows7-x64
3cd109c901e...56.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$SYSDIR/Gw...ni.scr
windows7-x64
1$SYSDIR/Gw...ni.scr
windows10-2004-x64
1$TEMP/dospop.exe
windows7-x64
7$TEMP/dospop.exe
windows10-2004-x64
7tbu03852/dospop.dll
windows7-x64
6tbu03852/dospop.dll
windows10-2004-x64
6tbu03852/options.html
windows7-x64
1tbu03852/options.html
windows10-2004-x64
1tbu03852/s...g.html
windows7-x64
1tbu03852/s...g.html
windows10-2004-x64
1tbu03852/s...b.html
windows7-x64
1tbu03852/s...b.html
windows10-2004-x64
1tbu03852/tbhelper.dll
windows7-x64
1tbu03852/tbhelper.dll
windows10-2004-x64
1tbu03852/t...091.js
windows7-x64
1tbu03852/t...091.js
windows10-2004-x64
1tbu03852/u...ll.exe
windows7-x64
1tbu03852/u...ll.exe
windows10-2004-x64
1tbu03852/update.exe
windows7-x64
1tbu03852/update.exe
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/03/2024, 04:07
Static task
static1
Behavioral task
behavioral1
Sample
cd109c901e0149d9fa176d2f8324fe56.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd109c901e0149d9fa176d2f8324fe56.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$SYSDIR/Gwen Stefani.scr
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$SYSDIR/Gwen Stefani.scr
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$TEMP/dospop.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$TEMP/dospop.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
tbu03852/dospop.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
tbu03852/dospop.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
tbu03852/options.html
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
tbu03852/options.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
tbu03852/static_img.html
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
tbu03852/static_img.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
tbu03852/static_pub.html
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
tbu03852/static_pub.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
tbu03852/tbhelper.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
tbu03852/tbhelper.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
tbu03852/tbs_include_script_008091.js
Resource
win7-20240220-en
Behavioral task
behavioral20
Sample
tbu03852/tbs_include_script_008091.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
tbu03852/uninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
tbu03852/uninstall.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
tbu03852/update.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
tbu03852/update.exe
Resource
win10v2004-20240226-en
General
-
Target
tbu03852/options.html
-
Size
6KB
-
MD5
adc6e16ce6e97bd1eb19d3a8dad7274f
-
SHA1
12b55eab3225b2250ba051803f7d791db59a46a1
-
SHA256
29e525a91d8ac4ec6bb2fa299a404d9f151b45400c7cab09675a23469373435b
-
SHA512
2c4bc233ae8741fe0a6995845aa88d707b347cfc78745fefac346ce27ddd5b799dd374bbba15516f6e61348f52720be3639cf0cd925a599250a9947a33ab7103
-
SSDEEP
96:BKQ/O9mOdYCQiLFyzNYs90Yi67mX9gPui39bnLNza7/OBgx4wTn:BFj1cFUYJYnV6Bm8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009d182698a4727943a65bc6c9ecfd0fc500000000020000000000106600000001000020000000dc9c5d3b8d3b0d47bd929be43ee33778c0003c54a30d75cbfaca4b22d41e94a0000000000e8000000002000020000000afb36a7f117c159384b3d1302a3c4e4fddd50c6a97b5e123a3d3c5f733088e24200000003090dde1650c50350df72ea92a55fc532947718bc8326592f1530244ba23a771400000005207122d0345d9c5b1cdb5b42a1f3604658b5c83623a230ab1e59672e51631a5c8ea59f4b295e7fdfde749949e96fca7d0079471d4cceb41096bee1078beb6d6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 805240925777da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416723936" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BD82D851-E34A-11EE-9921-5267BFD3BAD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1736 iexplore.exe 1736 iexplore.exe 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1740 1736 iexplore.exe 28 PID 1736 wrote to memory of 1740 1736 iexplore.exe 28 PID 1736 wrote to memory of 1740 1736 iexplore.exe 28 PID 1736 wrote to memory of 1740 1736 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\tbu03852\options.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2b0f2b892867f483f8f1983d26f89b6
SHA1075f281df1e171e31e7b5701adf13d7c31976179
SHA25674a2dae228432ee7a4ba889ba0d97384556107ea8748c10ca19672efbb18862d
SHA512d4e6926e6f99472976265f2b766ff651b62df793ec422d14308c730e7870d495ca85b5ae77145d287684e96095c236316664df600a097d127e8290d1908392ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d98b76ea5ad043eb97c41f20a1bc74fd
SHA19a22f37bf423ffc44af6b96de7f235f1c133bb6b
SHA2564b9e4f24018db4b6c4ce2c1d5f7c8b6cbb4fd4a863746e92c91485f7590dceac
SHA512dff0776ec7bc824998947b39a1b9a59d3526c2a2e408db61480afa4bdc6cca37ac3c3d3fa818ab33eafbdf725e589fe164a89aa4e58b3951325b9f3c9b2dbfb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e12c4cc4188347f04749b6d64daa4ac3
SHA1d7b5ec1ddb3180ac82f93d705db92840e42f11ae
SHA256ebe94f31efb7691a658ec7dc434964e8ca52459e8cde8067daa2c02fecd8082c
SHA512e4d88765f61e24b4d042e192abc83ba95120cf5747067bbeb5f93e337c12af56db3587726a9b51d4513eed54f0475c0030d441a8b2717990ececea9e7c603fa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55395ca499a3f592ea786635a85bba99c
SHA1f7d8b92a19766a74428c06c7cdd93da91cee26d2
SHA2563fe7455b1489f668c7b7fa039acdde6eed84451e62b666dcb8115a81738feb4c
SHA5123682bae4e311e5d5dc66de3721c62546e7b20f01e185691101380d022d35793581f3d4dc4b00ff2a27ec8cc75e2c0b3c934cdf52aacca8285945bd7927e5d885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579243d2455c927b521fea7e5f6da92ac
SHA13b322f2671ab608aaa98ae097fad1679dbfc4af1
SHA25641b5ea995bc711fa1734e7f6cb08d11394587059b27eef50157e56cccfa0b4f6
SHA5125f3dfffd2c0e532f96c2dcc1290a6267ed61969891a56e202d38138f23167e8df84b6c7fd9b0c25586db8d57196540102ab7a2a0dc34907320cc74db8a751bb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b26b2c33e23bb4a447e98a0393cbc78
SHA1d0524a6cee4d8eb9cd34e91645cde33177ae624f
SHA256c93cd06aaea54db5296c9933a7e7dc258719d8543927412f1fb7d90dc92af9b0
SHA512ac416bcbb2011f278da8a111c8948ad9e5a872ffe5bd2ccb4f166cfdd4853a00b42246abc6e18e7465b335ed6ed781ccbb67b2b05e72a059378260086f9d2d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da0092e2ef7cd9a7e04d46263c4fa49d
SHA1e2b1332387e5ab391120498ac83e4615e2f3fa12
SHA2567e29e1e480396371d2fd5781f1b73d00c08dfdc888cd89ac1cf7a4518b997a1e
SHA512c6cc5c9d8993d42122d01b46347ad294a952b42dc076e910524498090099b2c126007b4675d4a5bd21a69f8efd84e41ea0bcf0a03755a499cf2627cd80a97764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5369d1b1fb9135c5ca7949d58b81e3d31
SHA1325155ae740bde30794465b106e0c65a8f37dff4
SHA25602fccb0f3e53df722e9ce13e9b15834d754d90b283fc2f6f6359d3d7f42fef02
SHA512887e39f3f7a3eddf77b95268aeb8ea8ee39629fe715ce8c2d40d01a1b41a09b9bd4a32b77a7902241dbec7304447c787484bfd4023b0c7e209c231250f275dbe
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63