Overview
overview
8Static
static
3IDM/!)ж.bat
windows7-x64
8IDM/!)ж.bat
windows10-2004-x64
8IDM/!)̻.bat
windows7-x64
8IDM/!)̻.bat
windows10-2004-x64
8background.js
windows7-x64
1background.js
windows10-2004-x64
1captured.html
windows7-x64
1captured.html
windows10-2004-x64
1captured.js
windows7-x64
1captured.js
windows10-2004-x64
1content.js
windows7-x64
1content.js
windows10-2004-x64
1document.js
windows7-x64
1document.js
windows10-2004-x64
1welcome.html
windows7-x64
1welcome.html
windows10-2004-x64
1welcome.js
windows7-x64
1welcome.js
windows10-2004-x64
1IDM/IDMFType64.dll
windows7-x64
1IDM/IDMFType64.dll
windows10-2004-x64
1background.js
windows7-x64
1background.js
windows10-2004-x64
1captured.html
windows7-x64
1captured.html
windows10-2004-x64
1captured.js
windows7-x64
1captured.js
windows10-2004-x64
1content.js
windows7-x64
1content.js
windows10-2004-x64
1document.js
windows7-x64
1document.js
windows10-2004-x64
1welcome.html
windows7-x64
1welcome.html
windows10-2004-x64
1Analysis
-
max time kernel
136s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-03-2024 16:59
Static task
static1
Behavioral task
behavioral1
Sample
IDM/!)ж.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
IDM/!)ж.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
IDM/!)̻.bat
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
IDM/!)̻.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
background.js
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
background.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
captured.html
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
captured.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
captured.js
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
captured.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
content.js
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
content.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
document.js
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
document.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
welcome.html
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
welcome.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
welcome.js
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
welcome.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
IDM/IDMFType64.dll
Resource
win7-20240319-en
Behavioral task
behavioral20
Sample
IDM/IDMFType64.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
background.js
Resource
win7-20240215-en
Behavioral task
behavioral22
Sample
background.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
captured.html
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
captured.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
captured.js
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
captured.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
content.js
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
content.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
document.js
Resource
win7-20240220-en
Behavioral task
behavioral30
Sample
document.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
welcome.html
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
welcome.html
Resource
win10v2004-20240226-en
General
-
Target
captured.html
-
Size
1KB
-
MD5
461955b3522967a8f6c0b81f064092e6
-
SHA1
1b24ba6a971800488cffc17b980181673196455a
-
SHA256
e040a22746d1d93bcc239e68885ac4475f9e18c5ad7edfc3501c2dabf1826920
-
SHA512
84221d2e55cfe02398e239a7d55b49e6dc22a0c206e3a3b817fdc621e3dabfd732c299ab9fae1d5f7d6f4f46a855ccb44e319f1040824c2b797e17f526c866da
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e03044f2d57eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1DC843F1-EAC9-11EE-9988-CEEE273A2359} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000bd7fbc6bd99ab0856fe6a24cbaab659514d6e23eae58372f5dbd9cc9a3d6d134000000000e8000000002000020000000c1104f1e272e115772afbcd22d5c3058591d832544e3d7fae565dbf971e46fe920000000bf819d67594904cf2fc518d7c68df553d53c1d2de0399d1febc691f637b0bea540000000de55d73a09893ce7337a062fcaa36f4f9ae6c9614e7bd4ac84d784b5c22d35bda71630af6f77df3d611e17febb9731b78db6955cbc2bac29bacbd8834bd8876c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417547870" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 996 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 996 iexplore.exe 996 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 996 wrote to memory of 3060 996 iexplore.exe 28 PID 996 wrote to memory of 3060 996 iexplore.exe 28 PID 996 wrote to memory of 3060 996 iexplore.exe 28 PID 996 wrote to memory of 3060 996 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\captured.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:996 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c6b1cfa2c7acd115ecb95a61e613927
SHA1da4c10ac0f35ba095d252bf765bfddbec9653ba2
SHA256753d3d0990c04085fc61a838a788d02d6f7d6777d8985672b5783788c3365340
SHA51227b55a73cb209e2e3f89b0c923b4d9483130874d1d09f054f8b1071459150c433f3834157bccf2d4035a72b3787c1bc27fda7b7410b04480823658bda4da8a46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bce4e45dcb457ed46b742503783e1dc4
SHA1aa71f9ae9714bc3b3bad06c99b325d3988e54b08
SHA2566a98642148dd47062634367599b6e91bb979823661c410d0fc598123f8cdb642
SHA512d0cb8fc88f2acdd220771481ca4bd227fc26c65e965dcda95adfbb770e047ea207bb6412865f6ce50654d4d329ae68f3985bb4fe99c042ab135ea0094997e74e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57544e96616d9ea24508eff3c46ac60ba
SHA17262557620405542085e1e6061ce4c22f649b4bd
SHA25691a174989bbaee7b1974d8fed99972d6e665651e1c4a472017f051bc424354d1
SHA5123b899f426a846bd3b8455d984ee8984a346284cfc0da0f07a01b73c412908f063c29ef927231dedbda59cb00bc83185cd6d0e28ca1e4d6dc474795c2a878469b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52007a8a228ce4b61eb97027eeb783236
SHA1c6391183af9eb73b1237450683b8643eca57afe2
SHA2564003bd32b51d32a3144a81fbc1f6cbdc96f632bbef12b43fe0773fe3eb64838c
SHA5127c3231c5ae412094a297c205ed74be41c6d0867afc38a0b255eb1df22fa3943d18bd3c34b6b34fa3bcf0a348b6898a5d69b98e6e9e124f14402d7d4a41d14f28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4d8addc27cb9b3bd711254a8567e320
SHA16a8223e722c1a3155563e9b37cce110d3f4b5cfa
SHA2565af8b666e49d71a71ae6ef333c51834dfeaf137c585f9e2149ff0aeb0b832877
SHA512341cbbab077f29dbddbbfa2634a8a3350f107f1b3bc2e440511f33e80580e472d016ec1d4aa4d3e6db71e2ad5dc61ee67902521f43fdb6a66b6b46e18cf2b809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54270d1be28a2370b39e3ddeced866202
SHA104312cd3f3be9b7643dbac356c7255278f8640dd
SHA256a9dc2e113042cd7adddc571e1d47ce92d8d13ef9c1c2221e568ad6d9177f84c5
SHA512ef613bd50557194978afaeaa84b0152a61a04371e542c7d8e417987484f53d80252a0495561929f98df247e98c2248a4848d50ccc6910405401ee072bbb0cff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54247ccecd5921b6509fe62c376e3e8eb
SHA126a9826e93098ecb1d101e71ca085f97b8d150c9
SHA256b27594c025e0db3ba87586f7471adac4887a68f0b0eedca9d936e5839d19a260
SHA5125279d1abd50f76575fa9167ec7236251d0551d024f9d8125018d0156ceb232adddc21502b012d2d0d97ac990afd1e2bf2d89dfcd83a8111bd55dea941ae649a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5042bdb06edaede292ec21662d13af579
SHA1cccfbf37e497a5a4122c2cc61cf6188db0d6c93d
SHA256e6703e5dea20431e4b46392483bd145ca2ce668be14e2817b55eede4a0158ed8
SHA512e2b6101a962173f6ddeeeae602e558f89804757be409496c351c8a9941af8dac817549ab217b1fba4a0ec62b86a35912af04bcf8e15fc49e0ae54f0950559c1f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63