Overview
overview
3Static
static
1ad.asp
windows7-x64
3ad.asp
windows10-2004-x64
3add.vbs
windows7-x64
1add.vbs
windows10-2004-x64
1add_bclass.asp
windows7-x64
3add_bclass.asp
windows10-2004-x64
3add_bclass_save.asp
windows7-x64
3add_bclass_save.asp
windows10-2004-x64
3add_sclass.asp
windows7-x64
3add_sclass.asp
windows10-2004-x64
3add_sclass_save.asp
windows7-x64
3add_sclass_save.asp
windows10-2004-x64
3admin.vbs
windows7-x64
1admin.vbs
windows10-2004-x64
1ajax_select.vbs
windows7-x64
1ajax_select.vbs
windows10-2004-x64
1axingweb_z....0.asp
windows7-x64
3axingweb_z....0.asp
windows10-2004-x64
3by.asp
windows7-x64
3by.asp
windows10-2004-x64
3class.asp
windows7-x64
3class.asp
windows10-2004-x64
3class_co.vbs
windows7-x64
1class_co.vbs
windows10-2004-x64
1class_more.vbs
windows7-x64
1class_more.vbs
windows10-2004-x64
1class_url.vbs
windows7-x64
1class_url.vbs
windows10-2004-x64
1class_url.htm
windows7-x64
1class_url.htm
windows10-2004-x64
1dig.vbs
windows7-x64
1dig.vbs
windows10-2004-x64
1Analysis
-
max time kernel
137s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
25-03-2024 18:09
Static task
static1
Behavioral task
behavioral1
Sample
ad.asp
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad.asp
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
add.vbs
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
add.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
add_bclass.asp
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
add_bclass.asp
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
add_bclass_save.asp
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
add_bclass_save.asp
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
add_sclass.asp
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
add_sclass.asp
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
add_sclass_save.asp
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
add_sclass_save.asp
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
admin.vbs
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
admin.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
ajax_select.vbs
Resource
win7-20240319-en
Behavioral task
behavioral16
Sample
ajax_select.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
axingweb_zidonglian_2.0.asp
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
axingweb_zidonglian_2.0.asp
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
by.asp
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
by.asp
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
class.asp
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
class.asp
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
class_co.vbs
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
class_co.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
class_more.vbs
Resource
win7-20240215-en
Behavioral task
behavioral26
Sample
class_more.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
class_url.vbs
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
class_url.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
class_url.htm
Resource
win7-20240319-en
Behavioral task
behavioral30
Sample
class_url.htm
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
dig.vbs
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
dig.vbs
Resource
win10v2004-20240226-en
General
-
Target
class_url.htm
-
Size
2B
-
MD5
81051bcc2cf1bedf378224b0a93e2877
-
SHA1
ba8ab5a0280b953aa97435ff8946cbcbb2755a27
-
SHA256
7eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6
-
SHA512
1b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80d4039adf7eda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C51D3EE1-EAD2-11EE-B2B9-F2E0C23F7503} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417552019" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a529a2e22ae42f4084bf8a2f7b0415b200000000020000000000106600000001000020000000fa5c048a7c51ddf85d91f65128e0277560474b5e212fa3d5b9bfe0830e2735ea000000000e8000000002000020000000ff60b39e86e77a212178d30764323c3fbbfdf210a7cf246ced979076901ddb4c200000007f54943344c96b76f918edcc668e4d5db71462779e69182572da5ce86b9356e940000000d510f9ff032e947069de7b534ed45e84943135cedff48fb65fac3c9df2e0655bcb160ff3c822ca4a8855302bdc6ecf40000d0edab2fcca3b324a6ded71328e8a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2208 2112 iexplore.exe 28 PID 2112 wrote to memory of 2208 2112 iexplore.exe 28 PID 2112 wrote to memory of 2208 2112 iexplore.exe 28 PID 2112 wrote to memory of 2208 2112 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\class_url.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565ba3a8af57f109d4caa05bcb1379fc6
SHA146bad937945bc6cdca0d45512aeabd157bbedb90
SHA2562793497c3db327edb6008bc3f19f065b5efe62e0c345d2aeef95a8bdeab327cd
SHA512a44c787b83da380692b51ce60bf3e215c4da9303a412255bcce6de9aa3dd2c9d4cb1057d728be8e6bba5a50e20de11bb6e2e31ea0e4e857b98380142124d8273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9c8f21f3115d0feed2081c13c33f475
SHA1e50f81ae9031f4357e043b019a66cbf5fce3f00b
SHA256aec6eb919fdd997d2723ab6457f02c906730f1708f40bc43b7240b40575ccbdc
SHA512b92de6aa2692a7f771bd838d288b6781833d1b11da6befa6ef8a3dc55608550bdd65bdc940ac3d9e90421042481108a13e0c802a5ee714128c2a698028b23a09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4ae8bc9a35a4799ab95f75d808e5475
SHA180d6748b5c0d098f87434120f63672840664d822
SHA2564568d1d7a95f9e9d0f9856df0c9babd24cb0439b6060e471c59740f53d00ceb0
SHA512734efa4350e89be861b91a81e3b2b1d36958bc7a06e17b01b46e77a6658b3623de8403202da1dbaf54bf8c36d342722f328d9e6ea817763bb98f6de2ebe35614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f53df2cc2f95d69201a36863a7afd18
SHA17e5411f95b63a188471a30a3cef7a34678c449bf
SHA256c824654083f2627d2a51b5e979549ae6b2a6eaa121a59bbaee9c17940d68de78
SHA5122c4ee7697c75fdc28ebcba7053d6d6c6892419f628cc36cac7c5f8b835fd559601f47520255e9ed3faa70b8ec0daaaf987666fb89cbc4bc2bb27710e1225c4dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502acb3b33c7a8766fb3c96acaff051cb
SHA19bf1e57efac3f162aedbee5c2069c85609d78cc0
SHA25617b2d33c466d9fb8d3325e295c4d9b5a572dbb297719762592b3777dde9e954a
SHA51209da75654370ada2a3225e24e43fa123178dd2bbeb03201b08fc6d156849122f0fe90ed54962486840a6730187beffef8577e8779d24c14dce50424ab350ccfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffa0e1ddbadf54db56badf681bdfc06f
SHA10dac8cc552ec8fa2e2e437ec0ba30c138ad4c2bb
SHA2567df5759232cb24babc228f840744c331bef2707f887b8ac845003ce69cc91f43
SHA5129a86378fd0678f2e42e7dbb4be7dde9fb6b71765ff978ee4ed596f08bec3b4b66926901b1b73f4b5a6992e519d1c208cdcd1d00dc0890101e19f0af6dec8bac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b82bc6cdecb14980025fb14b3eb7855
SHA1fe0d0b2c84367d4f8d3573329c27a5343daac28b
SHA256cce1b90d7a45e3ca8488b763ea6b4a66d37f8bce9640177439ced532e736f2a0
SHA51228c5028c251379a1675ff51de9a661a8022ef32212616327c8387403cbc3e8e8afea01daa3f32b92ef309148eab4d9cb575cfee5ca958f61135c7774e78f0710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5863b952564fc51e46dae2ac49f45127d
SHA14d786ce6c44782d8d4ac67cb3d90fe0bdde4d0e0
SHA256cf4d0f1a306aa1502b15f081d6c58de76c0a12555e264fcdfab4d6209038909f
SHA512ad121bce62e08358050be897bbc01a3ee7d1bcc13d1826761d5a7ee09f5d48d6bdc92ea3c1837e57889ef651572ec45a79dfabd2ef486b73a977805fe4c9dbb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5198bc7085678c8f3434e0d90c8cddf30
SHA143d1843b621de2fd9a1b12d8ceb98908116c69fb
SHA256ac2796b200e23f5d0244edbe0ec713cac896dc1c776f64d1f44b837d10237745
SHA5128bc36a672e78f854a0aef25414629e3f81288f4b10c7b8938d67eb9ebad3c7363d753ecc32f6525d573abb2dd7459509b51ffba8dce5cc9ab7c41162f3f748d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580588fa51068ad43d70f8776bbcc3f10
SHA18bf21e819d623043b3023da4c1c69bd897a87d0d
SHA25616836c9f460f4ca623944f9bd8dcb6753f83cd9675e145c52f557eafeaee0f2a
SHA512b274cdd9993f0cc2bfad6f4c6bd6a646e2eeb5fda95fc60cac28d49971d583f2da5f0776190d77c00f5bc430ef0107887a1b4e47f55e4e2955e031a057c5cd66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bc7b8e43612edfbe91f06eef5b86a97
SHA1f45ca3f64d7060074aaa038be9efab11c4abbbf8
SHA256d7858c206705cf6447d35a034493ce0e30c3aa25d8d51b614d70b32eac99d021
SHA51234196a4360df67e061181a85602fdc9d7fc9e0c6aa6c0d966c1560ffc488e423c5151fa01b27e1ac917fd456884cac52df96783ae3d515cd0d137f20d57e97ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b0897cc581a9f66d0d6329420d149d3
SHA1ca1366b221c67a2fa66b9ccd70e460a8f1db0342
SHA256e69b9f2416a4acf017f9295ef6b85813d8377f674d6cc14142f3740393b48b25
SHA512faebb1318d391472afe328ec28632fd4c00961cb4150599cab8208e87439ac72eaf7baf42a9848529f1ec1044d11b4ab19339ce0186a8f410c4b34625cfab2cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568cda33899efd8d94df8f818f004a434
SHA156053a303a6e7f25d558ee5519f3367e7b236639
SHA256e8f30672e98241323eb87b48ef036789579e8a0ded631eb0878b32a07fffabd2
SHA51272cb8ccdf059a28008eda65d9e9b3b2ac6b0c388b90d3ff7d8e3b35261e1084b85405faba1cd6e9c67cd809e9ffc5cb80e22089ae56e6ea7f747ba0eb59301cf
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63