Overview
overview
7Static
static
7dc22ca48da...c5.exe
windows7-x64
7dc22ca48da...c5.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...le.exe
windows7-x64
7$PLUGINSDI...le.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3MainInstaller.exe
windows7-x64
7MainInstaller.exe
windows10-2004-x64
7PingMe.exe
windows7-x64
1PingMe.exe
windows10-2004-x64
1Setup.exe
windows7-x64
7Setup.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...oc.dll
windows7-x64
7$PLUGINSDI...oc.dll
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
32YourFace_Util.dll
windows7-x64
32YourFace_Util.dll
windows10-2004-x64
3AddInstall.js
windows7-x64
1AddInstall.js
windows10-2004-x64
1background.html
windows7-x64
1background.html
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-03-2024 16:55
Behavioral task
behavioral1
Sample
dc22ca48da9bee7b1a2b865df4d9a9c5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dc22ca48da9bee7b1a2b865df4d9a9c5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Banner.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Banner.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/bundle.exe
Resource
win7-20240319-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/bundle.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
MainInstaller.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
MainInstaller.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
PingMe.exe
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
PingMe.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
Setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Setup.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/KillProc.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/KillProc.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240215-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
2YourFace_Util.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
2YourFace_Util.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
AddInstall.js
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
AddInstall.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
background.html
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
background.html
Resource
win10v2004-20240226-en
General
-
Target
background.html
-
Size
1KB
-
MD5
765526318b49b078d35a1a736bb96eb5
-
SHA1
6dff92a26b1e1194f32ba3f55765d6f2c705ef29
-
SHA256
b14df17e9b5eda2f908d1a50d37bb287d4c7a42f9732d397323685bfce1ca2c3
-
SHA512
a948e1be69de00552772d81cecc62cb260e9deaa8821935abb94194a5a4f5f547e47c65dfe2fe156008aaf69064cbb08bf3a874003e31c4cd0a5c580ba1a8e75
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30a639c9b07bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F44AA451-E7A3-11EE-B54B-6E6327E9C5D7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c23067700000000020000000000106600000001000020000000ef3bb38a5950a011aac6a45f7f60585e9e1d58bf92ee584248940212d59c7f5a000000000e80000000020000200000006ccdf547a4670691ca95f0d5380667f3855164f40ecd17431da490b7512adb3820000000dbebf4b9470ed995c889944dbc4a028b74220b9d183e8a1259aeb1768959fb1a40000000ef1f54bb80251fbe51d66f7f6c33553e5480a7aa8552aac6f2a8504aa3202264585cf852c9ed8b0db8697b913fdf327fa573e6530bf4eea3853706e669f2322c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417202080" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2524 2204 iexplore.exe 28 PID 2204 wrote to memory of 2524 2204 iexplore.exe 28 PID 2204 wrote to memory of 2524 2204 iexplore.exe 28 PID 2204 wrote to memory of 2524 2204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\background.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5d2a71cfc2ff3a90c90ce16e3ba83bc10
SHA1f3ac9aa0ff3b4f946f90c5958e505ba8e6cd764b
SHA25634903f05513cb6f4a7f273bd060d68e9b93a0996b954337b5a8339ef1db47493
SHA51269e1a54071b36cd32e9487fb88508cb1fe244a6a35be467cac96ab527b24c2196eff741c987b9609527de55a610a39ecb560da780b7355474176cb1a7594afab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d01e8e50ee70ccac262cdc4ee4a030a
SHA1d47c8265629f7fd77184a5d93b8c5987ef8cb06d
SHA2560b4aa49c1c208553bc989ff20bd99bef170cc311553bf0509d8e4fcf43f3b384
SHA51213a642e9a45a0af8aebc4e2d43fba3f5c13929ad6b10ec1a99ea431d0f3fe3e5ed4e1acf0a940ca7008bf62efe0209528108d877ef1b1d82bbe35563cacba096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d608705a78961c6a847683e84365902d
SHA151907b2e89bed1e6644c7c78012862fff7459b5e
SHA25633328f766327ea6699b152e829f874abf1b10b8174d07285b8c5e21bcc62bb75
SHA51296b900c258e33a298710224bc3d7287c2b2c1b8e0ef2270e52acb486654f2994c7042a40fffbb5d94984c85a8960911f10c83dc190bdfda2eb9b771906f7e004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590141fbbd7c5a65bf11a0edd1af8a82d
SHA15c03bf4a3ed2202565061b59bc36ad78e2014a23
SHA256f95e98df8e92e0ca9b47c479139fb5591e138cd58873392d2286a5bb81db9abc
SHA51201e58bc60ee35220e17bde085ef927d8067bf2f175a8bbead218cd7f96d17616d634a53dce17c91cf28fcaea651bb87db765fd17e441c6c07ce7abe30edbbc6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5046809651039bcbd0e42e4e51d6d782e
SHA1ac954d24ef7f9dfcdbd959bc7b91dcdd8c17353d
SHA25637a19f0fb031fac44651d64a39ae64fc186abdc68814da4ac6d6e26b2281cc9f
SHA512d7c27d785db3d614a0bf973334134b5d21a4f0839dc9ec9762860c071855db9d8101ed38ee6028f0d3ca2b1d61c592e5ec2da35298a29ecb4b37ce8a7e9b2340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cea8efcb19022a253e1dd6407df87f2
SHA1c00a39ed0570d714b5df919be6a25d5737780a2c
SHA256fa1464a0b100dbac50dae0dba487441df2c657d03e08dbf11e8ab8ae600cd369
SHA512051095a0fa47c222a4398939129afc3ad2e4fa59b7db5117ca893c84f74249abe48923986b2463d40625f34589b30f03e1ca51611977bc18f96077a331d3635d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0896fec0c405a875aa8b4a7bf16e8d5
SHA1a5dd42f895911f6fad6a0054ae8773c6ca5b0981
SHA25685598e60ab347f0bb66b52ded7843d076a1fde46cce97fbd3300a31cbc82fdbe
SHA512ccc16815a23adec3878a2f2bbc487a7423f80b094bbe02bdeb7def74d82882aa7e22da658fcb2fe5982344d0e7c7cd5da568a7049fa793eb690093f71a4c30d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5325237d28c318b8f498838d975107eba
SHA159274793f80174e009d656007665ceacb42f95cc
SHA256f94482c33bbab1747a739174df26d0f2d3f0c8655415f3bdd88af5e5d6ce641a
SHA5128768ebfd0bb4a16e01021e4cfb555bbe39c7dab05d6712c42c8367080ed2b02cb669ab2c6e40c37e99e0529bd5c7834b83853404786a20ea966f04509366c20d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ce37efc82d490b2e5c436b979afb555b
SHA16dc0fd09256f734758ca4f57ae021c8a944f2e94
SHA2568f58fcfb6bb4fb15510e5c5044e339993f561b6daa798994b54b80cc5ed0889c
SHA512dbbf096e616acc118167b747c1ecc590fb01a14ca90af7570389ad18bd48e405d3eaa839a457e782248f9fd528e8869102bb496968e7b308178594ce1c9e592e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63