Overview
overview
7Static
static
3d618921099...a0.exe
windows7-x64
7d618921099...a0.exe
windows10-2004-x64
7$APPDATA/�...�!.lnk
windows7-x64
3$APPDATA/�...�!.lnk
windows10-2004-x64
3$APPDATA/�...�!.lnk
windows7-x64
3$APPDATA/�...�!.lnk
windows10-2004-x64
3$DESKTOP/�...�!.lnk
windows7-x64
3$DESKTOP/�...�!.lnk
windows10-2004-x64
3$FAVORITES...�!.url
windows7-x64
1$FAVORITES...�!.url
windows10-2004-x64
1$PLUGINSDI...RL.dll
windows7-x64
3$PLUGINSDI...RL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$SMPROGRAM...վ.lnk
windows7-x64
3$SMPROGRAM...վ.lnk
windows10-2004-x64
3$SMPROGRAM...�!.lnk
windows7-x64
3$SMPROGRAM...�!.lnk
windows10-2004-x64
3$SMPROGRAM...�!.lnk
windows7-x64
3$SMPROGRAM...�!.lnk
windows10-2004-x64
3155�...վ.lnk
windows7-x64
3155�...վ.lnk
windows10-2004-x64
3CI4.exe
windows7-x64
1CI4.exe
windows10-2004-x64
1bass.dll
windows7-x64
1bass.dll
windows10-2004-x64
1gamedone.html
windows7-x64
1gamedone.html
windows10-2004-x64
1newgames.html
windows7-x64
1newgames.html
windows10-2004-x64
1order.html
windows7-x64
1order.html
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-03-2024 12:19
Static task
static1
Behavioral task
behavioral1
Sample
d618921099f3913b985beb1550eeb3a0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d618921099f3913b985beb1550eeb3a0.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$APPDATA/ȫַ!.lnk
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$APPDATA/ȫַ!.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$APPDATA/Ա-!.lnk
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$APPDATA/Ա-!.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$DESKTOP/Ա-!.lnk
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$DESKTOP/Ա-!.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$FAVORITES/Ա-!.url
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
$FAVORITES/Ա-!.url
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/BrandingURL.dll
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/BrandingURL.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$SMPROGRAMS/Chicken Invaders 4 Ultimate Omelette/155ɫվ.lnk
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$SMPROGRAMS/Chicken Invaders 4 Ultimate Omelette/155ɫվ.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
$SMPROGRAMS/ȫַ!.lnk
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
$SMPROGRAMS/ȫַ!.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
$SMPROGRAMS/Ա-!.lnk
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
$SMPROGRAMS/Ա-!.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
155ɫվ.lnk
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
155ɫվ.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
CI4.exe
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
CI4.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
bass.dll
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
bass.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
gamedone.html
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
gamedone.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
newgames.html
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
newgames.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
order.html
Resource
win7-20240220-en
Behavioral task
behavioral32
Sample
order.html
Resource
win10v2004-20231215-en
General
-
Target
155ɫվ.lnk
-
Size
350B
-
MD5
2eefc9c46f6597c7b8e425f8c2130e64
-
SHA1
4dbcb7c15a8624c9054debd1261963a35ccf8d74
-
SHA256
7756423e3de11499438968c53aeb575285995045b33832d601612512dc9e2424
-
SHA512
2226a924ccebfa75d3e6927d64c58917e27b57ae2af3fc658126902f511c3ea3c4f362306a7eeb6073445d3de48b125453756121d1ed3e694b5e44a5fdc23efc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F936FAF1-E5EA-11EE-B671-4AE872E97954} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417012656" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 300413d4f779da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000ea5ee66bb217c2c1e4eb7001473bf836cf619e6fdd0354f6e55d54d9c5726cf9000000000e8000000002000020000000f22096606cfe0c7a853db0aaeeca9127823145175775279f5f847d58a0b56edb200000004b7bfc6c466c18def93aa356b8e670ff299282c39b49298f132e58e9d2f920a6400000003cd73cac46bc74b3c6e0087de8de6ddcf46a115d0d5570ef466b42143dfc8c779c33256ea0953b718cceb6b33dfb52f2c0dd8244e853e483b67269d405ed2459 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2552 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2552 iexplore.exe 2552 iexplore.exe 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2552 2460 cmd.exe 29 PID 2460 wrote to memory of 2552 2460 cmd.exe 29 PID 2460 wrote to memory of 2552 2460 cmd.exe 29 PID 2552 wrote to memory of 2544 2552 iexplore.exe 30 PID 2552 wrote to memory of 2544 2552 iexplore.exe 30 PID 2552 wrote to memory of 2544 2552 iexplore.exe 30 PID 2552 wrote to memory of 2544 2552 iexplore.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\155ɫվ.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.soft155.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e679277eae8ac7fc70b7bd7cf0a31ca4
SHA1df710f68db9852f17657b451076e94917df3cdfd
SHA2568a9da3f1ba46da3806ba969a6a331619fc1c6776f034fd9fc17ba8e1793ed1af
SHA512c586a8482ad8507ff62be9cbf04fc5055dd56497668a6397a3364b0b63dd2072aec5b63ae52425680a05b878bffb409fdcc04aa76cd4dd539e6dc014b078fb4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510afa48f63d64f162ed80af48f3baa58
SHA13c2c6a156393f2509277130ab933338ec77a1ad2
SHA25665fc68a98186947cd2682460e1d7dfa7ec1b5d11b1e659da3f0aee415c79b9e2
SHA51250ca8b1f07561318acc70a71747f73eb51b13afcf387a7b8f6faedac642a78585e4f5c0b16803e10ae16dd7c6323e73551bdacdfffb60c3ae8eb466a14210239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a134616198f9e795ded96fa549eed861
SHA13b528aa8287d6c2250f52468fece2cf87e0e315b
SHA256f6ce338db15967ea40ec531e094fd8b34714789f13c89c2dde8eb3457e3d81bc
SHA512a5ec0b95810913de44bda44d74be2fb38ef08f3ce15062285666665fdb7bd255f6096a5b334962d72536a0cde8596b9c9cdc489316d066ae72d6079f1df1076f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c96ba2b23a1ad7929c66221153fa95bb
SHA1882ae21ac48abc449f5d3f28054c42300d6bfc01
SHA256c59780e5c89278b176071473ed9db48338910522cc88504bf6e84960e17fbb1e
SHA512497da80e7b0560c30067e6a4083036c79ddfde2977c79aa8a07b3853719b201057e729864cb15fb160dd08ce56ec8a8d1a1d73adcc0434077c299651dac5f8bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5581992dfee4435ed1064604bea15f673
SHA171cff60aca80d3c44f470c8ad2cfab11ae82cd2a
SHA256780bb074c0ef7659124b53efc5f10b0102804636c198c7c131fec61d7a79a447
SHA5122fc99c845d8d8bf85a706a28d16fb2638c31c7685982681deeff05c562fb9021d2d65d6c1ad3d42c2bb105c13d39d5e16097cf1d7b6d25f4239f2b0835778203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd5eed1ba133f82175c018a0bf4ecbec
SHA16cdccbddca6ab7fc7f71a5a4eaa5060a558d9981
SHA256750745dda324fa9588e43f84514d494f5c088c560ed8c6c87bdccd15dd1e6f37
SHA512b62436b3e963c057138f80ddfebbfe88a66427a982ad76fb3c95669c5cd5fc152afae90033bac61fe95c310e9cb72b54d4ec46a10249c4c8d2c05a758fca5fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595a2077d997702bbccdad4cdba68efd1
SHA1765a83237a652f096222b009255354b01163f0ad
SHA256e1c482e26c62c18ba2846e371b175103ead2dc364e6de0be6d84546877de40dd
SHA512924bd3a2796f4da6b7fd2b454dfe689bd142fa3c259647267d6ccc36e1128261e5dc569afcb7d68b0f2f2a3511dba3ea56ffaed75952157ba0871d5a3394db88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5407f2224612f9c94476b03a7daa3e467
SHA1c2b88667c698ab79e84cbcb0acea6b52557519b1
SHA2564ceb9c6dd927c810da62c8c4752454d81625723f4ef98c818b08ebacddc7085c
SHA5120fcffbd887805e8aeb282c05a0e434391214f84940708caaa44037eb0dd9a81c2b760aaeb38a8fa98a778cbb0b2bb12340626f27eec99c018fbcd391931063d5
-
Filesize
8KB
MD55f30748a4d513f6a64dc7224601131f1
SHA1e96a0744c8276890a2186ea32389ceabb1584c27
SHA2563d821b22fa67c758597d70614f25282a7b6ac8a98d299709f7f510af459a7e2f
SHA512c68768f9f3f61d69db6daf98fd70543e0dfce0643514c35c8ab9326867356e54d4613c49b8be293a70f27a92f2f6829f67fe424d66e4aaa20e6a3dcd1a6b1eec
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U8A9A2DI\favicon[1].ico
Filesize7KB
MD508fb0139e6adf41c8daa4d5781bd3bf9
SHA1c3402e3631daa7ffe5cc8fb70758ca16397d249e
SHA256d383f96417f493626b0414711d0b2b19430d87fb1c936a99fc76216e112b38fc
SHA5129902d967caaea37a2d40cfb800530cb778132db455d0fe2fd62c9e3e2636bff8ae66a33126d8246f962e006f6b3a968bd461f1b8077c504a79769130408c52dd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63