Overview
overview
7Static
static
7StarWH.exe
windows7-x64
3StarWH.exe
windows10-2004-x64
3data/Metro.htm
windows7-x64
1data/Metro.htm
windows10-2004-x64
1data/Phone.htm
windows7-x64
1data/Phone.htm
windows10-2004-x64
1data/Timeex.htm
windows7-x64
1data/Timeex.htm
windows10-2004-x64
1data/Worlda.htm
windows7-x64
1data/Worlda.htm
windows10-2004-x64
1data/新云软件.url
windows7-x64
1data/新云软件.url
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-03-2024 18:03
Behavioral task
behavioral1
Sample
StarWH.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
StarWH.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
data/Metro.htm
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
data/Metro.htm
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
data/Phone.htm
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
data/Phone.htm
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
data/Timeex.htm
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
data/Timeex.htm
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
data/Worlda.htm
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
data/Worlda.htm
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
data/新云软件.url
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
data/新云软件.url
Resource
win10v2004-20240226-en
General
-
Target
data/Phone.htm
-
Size
15KB
-
MD5
995ab369666fa2f33baf93bf7af9590e
-
SHA1
e244609eda3ed992a0b900f9a489b9a617fb5504
-
SHA256
abaab8fabb6ba9de1a94946f1336e95917a54c73321c59a9fc26ea57950f5b64
-
SHA512
eeeca5c737af7b02a1ba50ac4f3341fec11a04b5b2ede21d16ae92ddcc4f5a288de9e46b670db097d3188570dcc86675fec0a766137fd16aef990e274ef23943
-
SSDEEP
384:A6fuJvrJH4OJ2La4b2Cwv4+2br284pJH8J+49JiqJg4eJxX94CfDK422DNu4fIUs:A2Z8E
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000003d629dd42c532c74d682769910b5612570a5550319c2aa59c53bb5a4baea6c6e000000000e80000000020000200000008f50d0c446bc9ee61b8e9942353b641833abc8ee92b3d22605dd6e1cf20f6f8890000000ba1939e9408681b83be5d2d7a7c2bcdd48443c028d32adf6f1d85a7226bdf387b2ff38f4449bc632794fed8f446e02e8e840893c2ecb53619e5aaaae4bad9a4635a5d0b466478332ee3a76afcf3e1512ac5741ed21859e9728db2952f97e67287d0d3d671d82f45f5a5b7489304b0307d045c9e8fb56751ae1fb719ed3a1836a03d691966533397bd7483fc6b93dedd440000000fde304ca9163be6eb7de80de03b3c1013bbd8d92213d0376c6f60d472cdf84dc5d26c248760e4b002325770ebd03f7216d0397941f9b031f22e1de0d28858733 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417033273" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000015d6c6fdc2f3846b5c768b37eb3d26c55f8d12632c77c556e9dd683c47a61ddf000000000e80000000020000200000004afab45cc06710b3c7e68905e6eb0540a7b631076b1f2ec50649675a4bd9682920000000eca045a77b4c730608d3e3d4f1c0ce85f6fb6ed61ff9d030c4d165222f2f495f40000000f4ad08b060159f4dfb53042e4a2e66369c52086719e98733f97432a88f1fa423ebae4b5987628ba82f08abd188fa69549b432eda49915159be6158a80f49f044 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a09f31cf277ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FAA3EFD1-E61A-11EE-8E7B-D20227E6D795} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2740 iexplore.exe 2740 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2388 2740 iexplore.exe 28 PID 2740 wrote to memory of 2388 2740 iexplore.exe 28 PID 2740 wrote to memory of 2388 2740 iexplore.exe 28 PID 2740 wrote to memory of 2388 2740 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\data\Phone.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508d9848f390436268139a0b039a58638
SHA156438e4566479e994385bdab0167d6e631891e90
SHA2567f46c82327d91c1c928db0b3e5096a5607f70a3492af10bf634258a722d23c5a
SHA51271ebc5b30b56047b16086d65c998aab6c94109ce7a1fd5a839884b443daf0a08f33215d0304bd2e6dbec7b05a28bdee5b94b03ad68e686c4b113cb486e3a4773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a056ddc5a16b84709bc81b0550ccf30
SHA1cbcf6a9ad1d16f0cf75489aa4e9fb7f6233edb3b
SHA2569146590ab6154a3bbe3b8b57c64525bdc8ddc3665b5001ef8ae4a327a163bf8f
SHA512c65318d1427225655cd1ff9e1a9873319ebe69cd0ad0719976642ccccc7c6483c5ebc5ca77c7ebd18a496631de2a67511f5c74ea4b5e87f5fe1d3b01d44cd0c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5361feb0f8e6f24cb008f974d70a92499
SHA12ddfb25906fc686115e9b6c5d7d2c13e4ff7f939
SHA2569993adbe2fcabdafb67093ca667c397dd2d6b10c0ff987d17661e7eedd080edb
SHA512fd2db2b7d982d53d830ef9a01fdd1052f58d08a2bb12f0f19bb04af0675b1d24c3ec54afe2636cfc27bfc94d47e1ea3a2a069cc5a69c40d618f4a959a2092761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcbffb238401c6c26dd498170d970ab4
SHA1b3413ae69a4a463444e3e6f448bc4966127f7859
SHA256dab9db08dfeb4c15929509362c92280a598c98b2af459a6fbc4bc445f2d0b6a4
SHA512eab5875d15d3395319d3923d3dc32a06ba5f16943ec85ad80510db9cb5767c75d424291628586172091d40eea2f892a010f666e7ae067141a6f9de52f2b1038f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc67d59f9a03a13aaf1f983db621e3be
SHA163476ff18ac9d467347ed8c60ea8dd2ffd9e68ce
SHA2565e69d7c5decf5cf6c87cd25e674bf8eb8728e258abe5405d2302c4c1bc5e5520
SHA5125d9aad7c5fe0432de26cab685a6b472c3f7d5406c45cf6d05c7f3acba08924cf8ec1378c01c93f4e991d57284f2bd0dee27dcfd3c922594798b9819e66eb5e32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d4813e9439588a67b586612d5ad02fd
SHA13079333b9da1667c26cbeaf23adf89a0cd3db151
SHA2568d9241061c105554bb07ed4d667b51802ac02a2fc96c442cf294da3b4ab12a71
SHA512940bcc547120ef11132e2280ee763eae66d5847c8f7325dd89f09d1fb13f534db7d3eda3056f0e3652d27282c6bd956e17491674f6a8312e4216e2d33bf63704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51640c8cc1e8e0e539180067aaef5c4ca
SHA1b01155b1dcaee1e98da9e410d3e79f60bc6863a1
SHA256981a3d00ee26f5974a843f6d15de52140dcfde95da78ed9f05efa3c5826367f2
SHA51251b9d027d84d08620579bd31056cb675a9f001e79f851791297c909cbdbe3953b916a52efd992af2e657a53442d4526fa87fe8ebbd4b76d4ad7c9f58715d5843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4fa387b008dd53c0a617fbfc9bfac82
SHA16af062ac14354257d3a325b3f12c3144b9afb05e
SHA256825255c2ec94e843d0457b0ac4bf21e3d83059ff9be2ff2c134af07c35c3296e
SHA5126d065bb274cca099ed437684c41b17a69f4da3fe2807869aa32c9b5c044e5045c3f7ad9443365f99cc05cea33436c85f825518f5268244e4cc6e38d552e4dd28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f01cb44f6040a3426a38176592ebbbb2
SHA10938a363081a213afd695ce2fa0e79a75ea6721d
SHA25672ce15b932264fa03629c4b81fc621efbd97f3ad5928dbe82d13eba8bb30a525
SHA512ca3795f0c8579bf59f4b130ad179be387a02466051019e8f72ace230a73c3808270188eef5185315dac5baa977902537a4eb39e867e222a26f9a7e79c774b3ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529a2947b3004021dea3d165400a7a684
SHA10ebb5c123139be60d2774a487864bbb4b57aaa92
SHA2564fff00b8a2d7646163b6e69868ad6ea5b8df576d7d4bb3256825c32e92005ba4
SHA51280296b47a729584f867dfd6c84d1ec9a27eeca106847a7826e44ba5274a8989d27c32f5729025c3de2afcf323b086c3414062df571a57b48793172699695ee2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5701b8c8173d122bc1f4aa6aee1859f54
SHA1ed5f3fe0b3afc75eb98f7187908f8f4ae343758f
SHA256b19e3e8f5ddab1d1a56a21cb5a2d3a892976bd38ee419b2de0ff188d327ce949
SHA512e785914f8b0403e99e0825782834e6361f788e1e6354c58e42aa29ce4b25ed116ffa58a9fa5d826a55c0ed0286e97961ef8b6afd6ea1f83465453f1436bb059e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54741ff393d47de11d21d9fe754ebcee0
SHA129094a461874bf429070ec82dacb6a739931e239
SHA25673efdded19ce7ffb0dd9fa47982dc17de4bcc7076f1574d36fc01eb2bbcc66db
SHA512d8c8e1212498d8d8053139aca281cebce8d14bb1189dce7f19137d781d77daf813243fc5cacc04cada59be90e276a4970834e889234cf515355e1811cee4c942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5128c71d4b5b5781cbde9ef2e25cb4a7e
SHA126787c23dbc8526ecf1a96a002c6d1df3624375b
SHA25677c26446be387b3c713ab469c01b079a803a1e979828b1bf884fc5cfc2e1bb2e
SHA5127a2d8416e8d08af3a9ea3aa6d7a2c5622bd87d372b78687e9023e576e3c2d305330d5c3abbcf2ccb38ccd1f45ebbbf2fbaef5a3e4d3755e721290c23f4db9920
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63