Overview
overview
7Static
static
3d6bf4b0581...8b.exe
windows7-x64
3d6bf4b0581...8b.exe
windows10-2004-x64
3$APPDATA/I...er.lnk
windows7-x64
3$APPDATA/I...er.lnk
windows10-2004-x64
3$DESKTOP/I...er.lnk
windows7-x64
3$DESKTOP/I...er.lnk
windows10-2004-x64
3$DESKTOP/�...Ʒ.lnk
windows7-x64
3$DESKTOP/�...Ʒ.lnk
windows10-2004-x64
3$FAVORITES...��.lnk
windows7-x64
3$FAVORITES...��.lnk
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$SMPROGRAM...er.lnk
windows7-x64
3$SMPROGRAM...er.lnk
windows10-2004-x64
3$SMPROGRAM...��.lnk
windows7-x64
3$SMPROGRAM...��.lnk
windows10-2004-x64
3$STARTMENU...er.lnk
windows7-x64
3$STARTMENU...er.lnk
windows10-2004-x64
3$STARTMENU...��.lnk
windows7-x64
3$STARTMENU...��.lnk
windows10-2004-x64
3$TEMP/remote.exe
windows7-x64
7$TEMP/remote.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$TEMP/sobar.exe
windows7-x64
3$TEMP/sobar.exe
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-03-2024 17:50
Static task
static1
Behavioral task
behavioral1
Sample
d6bf4b0581870019030af8295176158b.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d6bf4b0581870019030af8295176158b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$APPDATA/Internat Exp1orer.lnk
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$APPDATA/Internat Exp1orer.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$DESKTOP/Internat Exp1orer.lnk
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$DESKTOP/Internat Exp1orer.lnk
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$DESKTOP/ԱմƷ.lnk
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$DESKTOP/ԱմƷ.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$FAVORITES/Ա.lnk
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$FAVORITES/Ա.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$SMPROGRAMS/Internat Exp1orer.lnk
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$SMPROGRAMS/Internat Exp1orer.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
$SMPROGRAMS/Ա.lnk
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$SMPROGRAMS/Ա.lnk
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
$STARTMENU/Internat Exp1orer.lnk
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
$STARTMENU/Internat Exp1orer.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
$STARTMENU/Ա.lnk
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$STARTMENU/Ա.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
$TEMP/remote.exe
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
$TEMP/remote.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
$TEMP/sobar.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
$TEMP/sobar.exe
Resource
win10v2004-20240226-en
General
-
Target
$FAVORITES/Ա.lnk
-
Size
1KB
-
MD5
62d588bdb74e4e2e5d1689fa9272ce39
-
SHA1
9d0db515d8f65e57353381d707060f7343a74da7
-
SHA256
248402dd02a096f9721d61fe867fac5cacf4dc9001fa2aa6a50a59f7405606ef
-
SHA512
cbb47f7e4227177ad39a1c914e00e0ca13209fe0839d13819299ad203572b69026c541d71c5101e4cdddbcf7786c6adf339af3e4b0aab65cb188614f646a893e
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2D7EA731-E619-11EE-AB14-E299A69EE862} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000004872705056a56c4196ccb589f3a199c1be65a3f69c493fe5a7ae98a46d71ea5e000000000e8000000002000020000000e64e57e38909bdc15abd5f809f733a124047102fad87650c1ca0215c91e8e45090000000fa16cb152c7d0c44bffb328776bc6922c2f25822b5327b23d87a23fed708ae4079cf9c88d73de66b695cfbefd808c170ef7e4bf0f32430d09b023c08075f63af2df327c669063427acf7a410414a4c593cad3fd5a6aedefee9130d47bb8cb9a7a3b91812cfb6da56ab2cbb3c8ee0cba632421416fafc39c1a10dc7b3bc418ec643b96864eb8508907c6777e80c4935804000000032dbebbdf8c81fcb3dc85a4548b85c9c9ebe647a3f5a206ef6de2b154e77a89d83de92ede973e4aece4605bda768381936e7f038f2759db9462dcfd1fe6db91a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417032515" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90a55f1b267ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000035909633b827cfe6d9b1cce6e67420d5babf4515e4c7d3ab79178d19d9492d60000000000e80000000020000200000007dbbeadeec820969d8618fb208a7083b60c2cc14dacc86530862f9d1491508eb200000003b37f8f767000be21d7497c7b4b5807dcc26d746457da406d92c7d84674208b2400000004bc93f7091243b5b3deb771e8448b0de93d529b7302d5ae76a175df60181c66a64f51ff97c5d905c6b252cd5bc1be7726df783f0a20055f24a908ef30a3f9e80 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2996 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2996 iexplore.exe 2996 iexplore.exe 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2996 2612 cmd.exe 29 PID 2612 wrote to memory of 2996 2612 cmd.exe 29 PID 2612 wrote to memory of 2996 2612 cmd.exe 29 PID 2996 wrote to memory of 2960 2996 iexplore.exe 30 PID 2996 wrote to memory of 2960 2996 iexplore.exe 30 PID 2996 wrote to memory of 2960 2996 iexplore.exe 30 PID 2996 wrote to memory of 2960 2996 iexplore.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$FAVORITES\Ա.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.mai520.com/?taobao2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2996 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2960
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bdacae8901b3e92e47f2a15b3924960
SHA1358f9d3b164abcd6878622260e53b49dd935c2ca
SHA256a84cfc2eab0233ad20ddcc27509eb82e57fc769fefb9c499a6ae089865b4f4a4
SHA5122297812625b9479c042081c741f0b6bb4c8c962d02001f25070c6774ae9179007e9166a0c7b577aae4616bcb8f57e97ab939d4cf904c8d8b2a67ab412c8a703c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5288692450a1d019312684380d90632a7
SHA17353e0e108da9b536c4e56ae85cb26c33f448fa3
SHA2566e37eccc3b31f0458541a9792309dd10045f0d2c0c1924c87bb1c2e9edc0a8f2
SHA51284b741b1b83bf7a40c5f8305afa1b94daa35e357fdb8c9606220a59c575323b8234825332c6acc8b5a62f1b8b2e09749a12074176b70715bf72bf6ee27e55628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc799d01c61414a2fbac4e26f0334895
SHA1fdc9e0e8b2cb3de15469be8f793cef6b5e5f9263
SHA2564596c36522ba701d80f7e9198eeeb3ad18f8a221efadcc51e25b02ea84097ee3
SHA512257061151e5924f3d77eef7f3b8eec492b34d617a2a10ad4dfc62b70bb285e8df8b3542cdc42288f66cd31c7166e830f8e00774fdaf1ede1d5e5ea74a3fb7e96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586f66cd86c8be6e872006242c5424f41
SHA1eadb4db2fe21cfcb0eec2054b89c52b359745c6e
SHA25688d019961946c4c89a26279aaf8e400a103bab54eaf52ac800d56a96e53539f5
SHA5123734b1fc5a7fef75d0d5b5048358b130f826cc41bde45b407f53330155ea9c8a4baee57721179733cc8663ff99ae79a7cdeaa82688be75c6f7cd9ba6746cc37a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c6aa440df868051aa98da5de3b13960
SHA1c95ce14fd2181ed42d9cf076742637dc095c92d6
SHA256885dd3d5f3807fb0850538d6eb1fa30eaac6165201a207ef1c7f73901a8203c1
SHA512ff8adbea4ca7b59d7ed792389bb0e0181617545e8f6c3d9cd8727eae3ca6b302285bf900a7c7bacd8a7147aa29b2c5914568d7365800fc08396805e2a76decaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561d6643e67ded8d571532194c6a3ffe6
SHA19520f4729754e27823a618f0a4a102e0256f3265
SHA25638580db8a39f8bce482bdfede4255cb10fa1d27d6d70e3c159205562d1281848
SHA512295d7ff0b9a2929ebec9a90c278e2013dc03ce5d62bd9f96e17bca8da02f2f67ef15db8659f0489e2990b686432a7fa8ac4cfe6e815a85736b1c8a6b103fd0f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7840dc38742206960f22880decae655
SHA1878fa850de18d4eacf2a8a1d0fc3254a02f90e7d
SHA256042bdca6ba955fc8bc75a413199a0df8cb3306c6ab796defa74c8b5663391903
SHA51275d1bcc54d0f8ab80f60ac5524c5af91b54a5ce099967ddff0049527f9593645a37931a98305e85976df61a70b42ff94251db158ff46ea8d4049bb87b7c27fb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d28c9b38f412e4c816c09688bd65e3da
SHA1ca866be548d7450ae6118916a9bc874e4e95140f
SHA256f4a28a60cf84672453f989eb2098eb08fd31ac4b879d28c1bf26219814087bf5
SHA51220675699188d361932fd5b9d5305ba17549ae8922d5fc1603b4481b30df676c50a7213aa991e67f957f84ddde08ef5b2c0f95c1842f253dd156fa779cbe05f30
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63