Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 00:55
Static task
static1
Behavioral task
behavioral1
Sample
libty_plugin.dll.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
libty_plugin.dll.html
Resource
win10v2004-20240412-en
General
-
Target
libty_plugin.dll.html
-
Size
15KB
-
MD5
da906a04c1f4b3a8ade208c6460f69bb
-
SHA1
71af1404d863d397aa6fad5ffd05def98f94ee20
-
SHA256
d0e626b05c53678be531d4de5003fc7e80c3a54324be7376ce2f9a3a7a4c4698
-
SHA512
441b28a0f56a157111df7ef79d1db04090723836df8e78acfa137832f7ccdfc8291587d9d8ff56a706db8a5e962a2e32bc78f0f14b08c90630cc72c7556c3551
-
SSDEEP
384:XePMcMHyAca8HzwlcvXkvDZ3eCtCLJzl+Cq124kbrBZFE8uI:OPMcMHyAca8HzwlcvUvDZ3eCtCLtFE8B
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c2306770000000002000000000010660000000100002000000089b804df4389aa3f59b306afb1a385d77cb5c85b6bc283ef20d20666ca14e60d000000000e80000000020000200000009b0a89843207738d78b2c122efef3e5b063b5275e490dd9eed3f08e6683dd4be20000000619a380e959d594ede94cb2845319708167364b56c3e007d565d671bc83ee2c840000000b2c2ea5f4e960c29db7f5a6ac6a9d024cfde691132cead713dd803c7c805ef8d8bbeb7bc39c51119724232f4dd03254e450f3bab8f099773d438f76b53a9911a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80e3b9712b91da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9C348D41-FD1E-11EE-9E49-E25BC60B6402} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419563710" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1880 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1880 iexplore.exe 1880 iexplore.exe 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1880 wrote to memory of 2308 1880 iexplore.exe 28 PID 1880 wrote to memory of 2308 1880 iexplore.exe 28 PID 1880 wrote to memory of 2308 1880 iexplore.exe 28 PID 1880 wrote to memory of 2308 1880 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\libty_plugin.dll.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1880 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8a8db898936ee56d1f19b1eab3e640a
SHA11080fb4c1b0b663d4733f26ba3fc88ef8ebc708a
SHA2569f7993d21d56f3f1cabdcbe1777c1abd24e5b7fd0c3be312bb5e9cf9e64df648
SHA5127f1457635581591efefb2b1c865d826456aaca444aefcf84fb40f5f5d31937ff48aa6ca299b314fc260335b4bf71d5e751857c5bbcb05424af5f522d392c1bd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567075bdef6390a0ef0bc4aa334877e5e
SHA193a6b0b8e6850643aa1994caea7667a4ba3c7ace
SHA2561f9409f44489552324df789e390dc9711ccd83c18e5ac94d13fd6dd3392149df
SHA51299af71952c49dc8d37fc4c92643b7b65a6c73020b051d52bd7a609f69f305694b5ba33d8c37230951440ff366f22ed9425435ab75ca44f392270caac707757fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a68a09659568ed43036edf2eaf3b3781
SHA149a271d0815d00975e07c588576f08f33bd8014b
SHA256ca7afed4a20e41699d9669e877a714416249c4f557aad92c2b20e54e79649d01
SHA5124e8a907a684df16ce6e290d45a7fb05634a835a926b31055a2bdd199a7adc9809166e79bfe716a9f264afd6807ceb1f42fd8945ee2115a086c9cee43488cdf29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c86ae89a4404515716b51c4f888dcb1
SHA19b94ae79dc233cf529bbbc30e70c0eec3cab369c
SHA2560d835e3e2eb15d8617e4df52a0c7a1091a1fb2c0a4b5e924d9e5ef04e5990b3f
SHA5120c3398dfb82928e8633e18ed674b125f53be7e1784dc1502eaeed81f227df9ece7035e963c0e2c87c2efb012fab5de19d19c96488ec8c53f813bee1211fc1155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd5b9434a91d5119e24fc9dd0ab90efd
SHA1427d67a2e1189d1b8e52aaeac1c41d72555d1571
SHA25606a5a740731cfedba23d6de29a6b41c5595a6683bda1d5fea807fc6dd418ccb0
SHA512dd01ba01e436d09508ce9bc7a7ea64bb76c27a2fd1fb9def90377e8bee62447eb7787f4f7e78a1feda03b0f2de29d18a9830e1c8c8518bf2a81cf2ac9a893db0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0ce1e4fa3f32d0eb709f3afff6bffb5
SHA1a2a976f9bb7ce5d78fb0bfde0a07c8570c23011b
SHA256579f43c620082b12dbf315a7a931feaa7199631aa2eb8f4df694c090a2a09312
SHA5128dd03e6dd9a835a8e50b525ddf66886650709b686f9ee4217098c8372426ff3fb9bc2f542c4b93b0cd1e3848e633d1c51be6c24140392cda4514fc669930cb75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be63bce7950ab7d435d8aaa61976d551
SHA12fd45c752ee2a35d2f742d81c254d7a5108fab15
SHA256d52a06cd789e21487f2e8955933d0285b542bb4be187455b1acfa8dbff88b547
SHA512528ad090ed41f0f65f554cfa849223530fb333ef9ea17ee70d8e8ab1b286bc25818acdcc14fdbe4d4d52044c3a1ff58818ba6e1896162665f34730e2744d681a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c5ce3d150e317483b68f002c3d9d625
SHA1d7457221e4cc1f098e38e1c3bbd1b179f968c4a1
SHA25667c520205fac651a9ada38d40ef542c48228ab7b1ce558f1a31b22ad6b33a3b4
SHA51201b9aba56b6ae146f5768e7d4ba7f6a5ea1986af35425524253c54a1954625ab3973f1e8fbedcd0eecfaf73c801490c51d0b287709a941798998f85da38d48e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5875ded6896b9327ebb0516fd1d887753
SHA1329fcdee36b544de02df6bc7ce86f11dde221bef
SHA25638ec2cb3d392f4f6245cfcec2c684caeb85c157faf7aa998592d3f17af52361e
SHA5123d0c09d88f7087de3aa58161445818f4337354df8be296c6ff64cd7a4ba9174f4e02819275175d20815eab5e8900cfe30b5c691484c326776dcc198f5f113c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543f1c309c85301b8704737520eefc643
SHA1f9963480b1fed91f95f316dc725cf60b63301c88
SHA25659eb8da3a71d6a0a6747f9dfdb4bb132ebdc222376f4e1c1610b915466f0b7e6
SHA512b258c877b637080a475e851e57adea16b8ea35e0c5ea5da2071fd0b6fba864622e4c7b0792087e088dd04d8dac1f3b72939e3568180eb433069691bd8563eb25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55eea0c1a142fcc6e7933a76115450ed4
SHA11c3d0008dd5f0bd6b1a219898c8a35df6f0ee0d3
SHA2561f95ad2ae2c0596334f5bcb7b3f6ec0be2594c447a7d57d0f33c21c87ac35c3e
SHA51289439437051ec2445fb40118a8a86b93a1e1f8a901fe33b80826dd0801af8458780017011a90e2ed5926c964e0c2078a06f97f2a1c026f856f936dcf06fb025e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53222ef8c2bd78066d243b051fead4d83
SHA10c545f11beba4288f0a4644bc16bb3a9ea731db2
SHA256560a4b069f7ab26f0d17c63b1a586d331a88278d8e4a8b18c7ea9e424fc06821
SHA512826ec6c2b639f966667752413a709f33360eec5cdb38aff2a396497aa1e89ff98a2a43b1045b766f4f81540613441292bbb126633c869d6f9c396922b9da5d12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e674bd5eb4ae22a0cc6d1f332bf7cb82
SHA1200f3839549c324576fb96319a48c105cd23f647
SHA2567046f00fdb7434dc90190ce8e6745757f0f7b093df8651505b0c736f49c4262d
SHA5124012a607761b9c6956f06ec76448041d50e582515a3f68866595d51b927ea0303fe1e1c2270a8bc090680d50eca47ea83262764a74d20da84d619668747f137e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b33d34be9f23b583c8072033e4bcc76b
SHA164b2bd67625a83d08e8375c05c9824f796853f32
SHA25677dfa2ef907d61f6c49daa9efacda5dc21180b32073658309f7f4ecfd7ca34ca
SHA512c4485b2ab8fadad5f5bc96982cb21fcba047510d7fe4280812db66a3ad31a7c360899bb6273c28a67462cd9a69b7532f6c86cb3423b906c724b27000902be49d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c29229a1c9fa1b4a9c78672aa84536a2
SHA1ad27befe49e9dbf97278a1182d22a9387f0455dc
SHA2567855f6c469a5a2fea59f796c5f857059cf0d36dc06b54aa47a275b374e48e680
SHA512f353f86b48749acfd6bfaf63211a9a458c01fac33784f975e6a06aea2b87031ad927084b25ab3f28609a364dfd40de04cb0f1c2f16d83d6d3cb556c96074665a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573fe281b5bfa0a47e99335a5f6cdac31
SHA1dce824de872b8ed83bb614bc5841bbc7c366ef37
SHA2568a3bf7678764250d92569172086ca17513c202ead6f5b528b31b6d610c2439a6
SHA5128d2eda4e1dfbb1c4a3b642f549f04dee2fd75adcb929f9444c8da7277fb3b81e0cefbef7ebe31d246ec43704c39234f3a4e02935f6b37776819351d46750b4c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d97715f2e318573e8c618a2bd60a2875
SHA1bd4f22c49f9e7f0c369b8c8c274093f99eae9910
SHA256755b1b0562c4a23802fd3509a8f40679cf61f208bacae691acfb3bdac3cd2d66
SHA5123217fb1013faf1f0bcffd5fc414f9c5fb895656245e4e0324fe5b8be1bf3e6befc1d05ab2a5585fa1d28a7c3552607b614ee2992772cdc0cc8183c0b8839baa2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a