Analysis
-
max time kernel
135s -
max time network
227s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 23:59
Static task
static1
Behavioral task
behavioral1
Sample
libaccess_bd_plugin.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
libaccess_bd_plugin.html
Resource
win10v2004-20240226-en
General
-
Target
libaccess_bd_plugin.html
-
Size
6KB
-
MD5
c365fccb2bd275527b740bc1d1b0888d
-
SHA1
2e51b49651a7dda4718309ddb8110f713914169f
-
SHA256
b6a00cf335429cac3141d55ec38dd3ea5eae4ac1271be8bb200b714513834acc
-
SHA512
f8c3694fb8fca0fdcee2bc1ef9885deb4635927cb7887112cf3685d63326bc64583e61729d2f9abd81f4758b82b2c7b70c1cbe6f60a9e9ee1b7816bb70ac4b4a
-
SSDEEP
192:ZMiPMcMHyDTeDCnNFXj6GB/lo30pMHS8MDUQE8uI:ZXPMcMHyEeXZ/NE8uI
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D42A7C30-FD16-11EE-8BFA-D2EFD46A7D0E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70c282aa2391da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419560366" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ffebb09deeb747419e902f1accea58f700000000020000000000106600000001000020000000a1894e52034f3ac5098691ab48378615650262c6951465eb12970ba6f4257e67000000000e80000000020000200000006f6231e734ac860faf84d664c5c570a411b73df975810edcf6ade28a8458166220000000b3f667e9fae0e183c5708d2c9a3cfcee848fc60299ed195a30b96abe88582c0340000000b6e404451620c6d57b2da32bf5a99521646b784acea20135a18f56789cfafcaa689122de0130e0ec7ae6d665f3aa814f0d1a08b9e8834bcdd5ff9922c20048b5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2228 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2228 iexplore.exe 2228 iexplore.exe 1832 IEXPLORE.EXE 1832 IEXPLORE.EXE 1832 IEXPLORE.EXE 1832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 1832 2228 iexplore.exe 30 PID 2228 wrote to memory of 1832 2228 iexplore.exe 30 PID 2228 wrote to memory of 1832 2228 iexplore.exe 30 PID 2228 wrote to memory of 1832 2228 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\libaccess_bd_plugin.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54062a841bfae8b297b32286d84df4467
SHA129818315a2d6c5328c60e59a8cf4061edeeec329
SHA256b6907d1475aecf711c1d2cd1b539cc627d5798b1b5c62196c0f65b8520316925
SHA5121f2fbfd0e63e10a0a6fb877c1c376536fcf7ad6441aba673854fe099bb5adc4ed2d9cc4f31a346f61339f957563bed13c9fa52fbcfb002dfe9d8958cc00c7d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdea4bc279ba1289e7060e8f3f714cf6
SHA1be8173580cdc4353116816c84561c49d9c4246ae
SHA2566c677fd23c9c06159d83f795192052ba273a1f1c3998c27342b4d665265da364
SHA512f04b5c7a3edb8d15b63acf14703476cfe0ea51030cb4fd7bf0fa4811f8bcc9aeb1ef5537708b05793e76654d0a5cab372e1ba35bb8f1fa43d786a8a411fa6bac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51885216bb3aaac70238741175f4c4ad2
SHA188df360ad4563167f808ca0b4fedeede42fc64f3
SHA2563e3ea06151d8e53efdeda44c91b19912b0b9bd965b4c86ec3bf421c9681bc6e9
SHA5127e2a0c99d79adde39e673b8d6cb0883742af7ec40a5a16c1a92f4c60da30bdc97c1b5c6dda4ee6ffab35cf84e3a16a4ea9fd6d15ef70970ab4ae7a0b406091b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c553d7a19638948d5a784f2e4353747
SHA14f87d5dfeadb0df9bab7229a451eb2c3e791d258
SHA256331aec77c323338dbc37526ab9946de1ba2dd233fcc9771f207faec042833346
SHA512d812aa02b2acbcb58f21c044ddc4c86b9133d29d949b2870bce31d86addf70a20cbbb0d1feb30538f6a69501742265aacc818f4cb51b708b465236bfb5be21ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b68bf12be063ed5d9523cc499f7c383c
SHA10c6d9f7f156f8fa6767a2c9c750c0d53182869a1
SHA256c8dd8f6d18436abc93b9d061da61f230abf862440a0a330eb0feba855ce5b6c8
SHA51236b269e6d6990977b54e88588ea5ab54ae208118893db4ad270a8fdb67f0f898bc46bb5b9da25343b2d73dcafd523b7a23397db827d990e26213691d704afd21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5202c9c553e66159b4835bcdf82c4403b
SHA1fcca8893cf7cc8134de17ebefe9e39cb8c583b10
SHA256eec507cf7f8c3ffa037532a61910c43eacb92c66c849ff72a716763dc4c79015
SHA51232e972e8cd66d4fa5cb2a830d5e711b4f7969dd1114624ea71f4f0be2f2211ecc31c9428caecb88610c3967cd8ec79c47f60313e4a5caf76191133561ae0ea02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59010b24527949414ee7b4e10c7508e80
SHA1e15cee18858b2a88ee8b8ade2083ab85e75b7c54
SHA256ddaccebb2500cf5375ca7317180e0e93ba779876e001d4a0ea53c9c7679287e4
SHA51284e287b40bd69a61c72abb28b1ba2a2947e0451dccf16a5fbed580f990c44a0378b3d9f78165c6dab382b70c9bf6e9d1aae5aa01c987007803c2fb1ae1a2b189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c57a014a4b7f3ad0bff111ed31fbbc1
SHA1849e74a862cfac7e6e1359f43a617da356b2a180
SHA256f1e53196e08308fc02bbee26cb6063461b4c306eb5705d94ead932c10f9a3b00
SHA512f3a6ddfde0a7afa113ef9b1e8ec4e3b60ad2331e830a99a753792944f237a44961cf161d18d80a890bba8349c051f242e01e93d4e8bfd6739e555408450cc1aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cdd9fa9dd7b7a9b141ff2d3d25b120e
SHA1d3d4cb787fa9cddd58ea29510dcd072db5297647
SHA256ef7a0675b9f0eccf4d9b70e203d13cb219c2482e2e65575b0a4014cae608d6d8
SHA512d0bb5f5ea089572f563d5688b633b4fc5a2ef406401aadf1b9e85145d902e0a97077671d53e91967c24916603e3acb7896a859343a39f8432d3673d431a0a363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548ac39e555206e06829bd6a669aeeef6
SHA1c75d1674af459bfae3abba052431324f6f9d109e
SHA2560d9f4f6513b502ccbad8138eb2344e94e18807f1f971588c4665bd591ce24e30
SHA51272a8b72a4e00ccaae79bea39df24a40ce3be0ed13a2d0030cf05060445b449161d072c7320529811588674cf7843bb0d29c75bb107c6628a0b13acec581f0e9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bf501460b74044fb33e4ac011defbf7
SHA17e56a168c447152b269c5a0e03b8b4533ec5e592
SHA256d4ea5603e872d464b99095bf0337e8f97502ae307d11bd47807360da0976d94b
SHA5128a233c3ccd14a8326015a2d301987ea09bb864263d5bc44e975a26ef7af14a1fb03d296ff21faac1171a5b694a53f80354bc1cc216b94cb87f27a5e2a9455198
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a