Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 00:20
Static task
static1
Behavioral task
behavioral1
Sample
libgnutls_plugin.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
libgnutls_plugin.html
Resource
win10v2004-20240412-en
General
-
Target
libgnutls_plugin.html
-
Size
6KB
-
MD5
f526ed3592ea3d6ca2daaae1634aebc2
-
SHA1
f66de725bb7adbae22a7fe1e0e7771ba38092792
-
SHA256
00a094b6b96580590eac9aa91c2306135f6abffc2aa80e947068878283efe4fc
-
SHA512
57800f04fc21f26682f0a4029062e57ce0e8292704d3ee7bcda7e3e37bde6116cdb786bcbc75b20a44f033e1fe49cf03282467cf33d939604bd4d3853dac6bd4
-
SSDEEP
192:ZqpiPMcMHyhpxpgpDcpNpfpFXBpEpGB/lo3ipzpqpBpspkpqpDUQE8uI:ZxPMcMHyCUXD/jE8uI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000005636bcd85ebcbc3ec66448fbb9ae5cb277361b2fc0b8d5e936a872fa66567307000000000e800000000200002000000014caf388fa37aa18534050fac941e765eb5611993df8d6cc2d6aefca24e7a74720000000341736037312dc3cf506ffb33637bbf2e6cefddd7f5e97bd1df4fff94d80e234400000000209a91982f0128df38fb95f89035263681cbf0d8e9b66bffb259712d3b2de2ba5f0db4c6791d6d9ca9370f431c2219f96cf34a3bb524418e731f9144c625ee1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{821F6791-FD19-11EE-87C3-6E6327E9C5D7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0fa33572691da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419561517" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 1664 2512 iexplore.exe 28 PID 2512 wrote to memory of 1664 2512 iexplore.exe 28 PID 2512 wrote to memory of 1664 2512 iexplore.exe 28 PID 2512 wrote to memory of 1664 2512 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\libgnutls_plugin.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5198fd66679a70ec8c11fd930adf00355
SHA1054244031c9e19d125eb5c142cacdaa382662833
SHA25688119676626f66a768026851c448ba331e7a6c85e293135aead7fd2dcac89246
SHA51261d3063045dd7e015e19cd7f6ba320c70acb29a85fa3b92f11df1646a09bdd39f01d93424d650e3c3d5865167a379305deebbd343c1fba00338bc3725b9bf880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcd4f3e7d581a6b3dec4f491e4e69236
SHA14df5389c3674484b6a6d1840eb96d688acf22968
SHA25643035e95e7ff3a8f2dc23601645dc82524bed2d8d08174f0995a0e937aaafd45
SHA512c203674c79b4a7af60d26d3bf1cfcaf183d67b3c4194715bffc3644fc505999be276d718cf27655a6a77bbb4eafad4b2061b46f8e7260fe9d0bf06ecb2570b2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5764031b3a94e5781a4a5bdf2d6d9336c
SHA1ff2e28bde15c1cf04625ff45af6d047547e7a31a
SHA25601a419c61ba353d90bcf4bc80408b1e5d12c9fc03006ed3ebaf727005751e0a5
SHA512716712f2f60f74df7210bbd1f65bca469cbae42e023d7b021ed68f5142689302c5d2675f40809343596f43f70bbb816d27874c59aa7f0715b688d71fa29235e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a5f2cde03208fc2924795768542ff35
SHA1920476c5600a310f1c79d781c3153a78f2df6e88
SHA256720185768d63c853b522ae7242fcdf95a585769740dd5547be11bb0dfcebb83a
SHA5128f22ccf6fbd4b07a554fc7c9d01187de805d81f569ed05973f840072392256625d8a2406e980ae14c66714adc9fa6106bf790d95cb69594bd9d6da78bdd6a4a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db618a3a32662518af4db87184c7f406
SHA112651b6596f786f5d50e1bb700dc396194918485
SHA256d2f69be877b8069d4ad007f74b590b5413fefedefb5af31155e6db46c36765bb
SHA51240ddab4cd7c7aa7b5dce7a2e264fe9bc15b5cfde4d367d4b91b4ff054f647641cb30ff6194c12f96b393f67c8d7eb0ad8342be9558a32c670cc2955b9c19068e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adf0afff2b55d80fbb80b877f2ccd88b
SHA1e757d2716159d26dcf03c89a866e5bf28accc834
SHA256cfc6b9ebe9a61f80e450bc518cb5ac1a9548699857ab933beb305c1bd5f491c3
SHA512a1ce053914d289892b046ba88e31a584b3ef5153b0dd6a486bb9bd8fba0ddf294a202d22ce38a6be0846baffb1888636ba0285dcba896b120ac7e7ed7ff297d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fe764bbb0b85451de7de6a180e83f58
SHA15a16dfc92d23dec02081b5141b7faf48716cc493
SHA256b92d97535568e82b32775c64191906d004490d10a0be80c9295c495de484d2e7
SHA512221e4d03255bb12f5df588d2ae6a1db0d87ee70118877f40309b5ecdfa59d3a014dcc5809e90118cbbcfed966e08c26bb32bedce19419b308a561bc0c46c6591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d49065613e174ae923ad1b35f9e40637
SHA160ebb5d03c27603c1f0232b5e6b3a8118f8bab0c
SHA256f60737b2698178c9f7663227c5e0957fda7f4bb5edcba9337b6162b817f3408e
SHA5122495c245ec26bb7f3b57fb1b3cf2cf291e59cca416d7ba5025bd1cfcedb2a0020c090d51bffe285cb643adfecf1d1ebf0256cfd5033434afc5d9259bb056323a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5327c0e394a346703d3cc45ce42f5e321
SHA12a2285833a9cecc3565543a5e53b608810867381
SHA256ed5f6e5b6f26aff83678df6577e4f1778d27ffe8ddfd293a9fdde45ee854d5d4
SHA512d548e5228fdaa68e617b074a8a26fe0f1a107b750ef79d84f0d4d6448c2ee8c9539abd477b12e3db533f013cccf2d23ba759f7b4210dc4b97ef7d3f32ef6ff81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f32278f99f8d9d646a60784f83a7411f
SHA18d798e7dd2bf8b358a1a1eadf8b5d905442b503c
SHA256c063cafa2ffd56abfc2618c56ea25967d08512eb31232ff0a60c164ba8fd4611
SHA512714b173a398ee456f5c67326bac74a00414be2e29a75a0b5f4f130a059f6beda2965438761fa6bf72d2dd3d51ba27e014612a93a16b323c092cac5dd9f099ef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5ed025a5151972f7ddd86b152331a33
SHA1b6fa3becb8b33b5273424d2ace73904e0a4ecbab
SHA256956eea72359e138c4b4a16a2ef13666aafc127768c5cac3fe9eff6e57728e3fd
SHA512705cee8031f1ded7a06f4a63969a5a6f0162008de34e6e282c6ffe2beb927c7fcc68ee1a373b24a4717a8822ab9ade7a0ab7af36a2735e6e9fc3dc11ba6fffb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56603a289f3ac6bd9fa969741ce26cff1
SHA13f0724340f5c56c8993f04a60e3ca8c7a07a0ee9
SHA256be4b207682b7cfad481522b859151b082ec1496df74b8a7c4b0a48d8c7346274
SHA5122bb185e217a9afaa8dc81fef1c44edef603f63955cf491954e1f2f02b532c48a3b5543f6a815eaa37fe384b18fd761a8dfacd9d5d8e1be992a87e0b944639e29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5404fff0d9af5132b28e292197f4942bb
SHA17b4e2ecae09a562b4cb4953ffdd18e4f2e643c06
SHA256b750a1dc13559df08c8ae2b6f1164fdcee7a7278ec5f80eb76b13f99e5af609d
SHA5124932821aef095618ea43d206d4042018c684ca1d7c3dc3c8fae81a86db7c7f7644f3243a2f507193c75496014cdc939c3bcce170c63dbe1f81fbf90e3c120077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eca8fd4f983faea60aea7303f4be7a20
SHA112b0081f633f1e2aff68f841ef4685228b2f9ba4
SHA2568f21c9d01e32b40d40b69857561bd49f38d52e83931621806f4362e22afdd78f
SHA5121a080604b45a68052d6a795e1d901b92a8161cc16c7ac91b1c7875a1ac086076eb5f3b069a6036e47fe343d16ce42e4157c10ec356f526b08c15e1193c552736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54675176ee92d3945bcbdc61fe469fe65
SHA199c1a36e44c66265a003590ae549d833e036579e
SHA256b3d71d513ae1fde9498324b4c71532898fe8bfec9f801d4b7fc9f592cc84373d
SHA5126dbaa0398bd8c33c6d88fe53a46f1d2e29a37cb443ba774874adbb5db184f71db5374f2576f30993c97794f717fd04ed6da4657bb205e2cea912297707f30510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b85fd244e96c8986404cd22caf5a5a96
SHA1f01941315cd7868c119f06a90aa17c65931229ae
SHA256fcfa2e4cf9332df56eea70d526f74bb1f98ec8cf74393d39af54dd0200021992
SHA5124f212f5b959818ea6ce443dee6b094c3df11fe9627746b3023624299bb93d6d2acc69049a235b4a9bb20de60bea737a56b9c705996c48579f571ef47ed2b93dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed04cb320f553fad4116d5391d3e9558
SHA1bc62736fbd6a59faaaf4628f6afb0938d6b2579c
SHA2569fadc2e59d46d596cd2701264d32f9d477fba28c7575e08c4cd40d0493b077ef
SHA51264a65f5846747d3b9950977f352db68cf34edae99bba043d2580015cf7c6c09615a085ecb45ef9ec9974925c9f3f53972bbc97c984275d6018187b0da6fac245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542747acb3f238274105234d3e4149d78
SHA161265bd13fbae751f1ba5f33a4a18ef6af741d2f
SHA256746d6fc1a555b0171b2e7c49233701a0b3830911380f2bce411bf4ca8550ef42
SHA5124cec35759ea363a811add947305b7aa2835da45ac52b3372fd6f6bd64a1ea6b46c4762a31c14be5cd9726fd2ed5c9015922cf3aeb2e00ad56e672b274410b7d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513a572a2fd428afc671593ef8a114cd8
SHA15bf6a194612a925ff3037ad8c7a934abbef5b7fe
SHA256f443002e16abd427cfe327f5afa255008483093f0cddaf0f477e4ad5cf3bc701
SHA512240efcecc91a5ea7e57daaeff1422e86ede57bbad0bdf24774bc9e0dd6b5210191678ca3b9b951744180f6dae87878b8ed4690841cd3ccf6435f66a73aabf3db
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a