Analysis
-
max time kernel
122s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 00:56
Static task
static1
Behavioral task
behavioral1
Sample
libvlccore.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
libvlccore.html
Resource
win10v2004-20240412-en
General
-
Target
libvlccore.html
-
Size
6KB
-
MD5
a63dd4b758f011f330d4ae196b2a5e87
-
SHA1
860bc7d7c3ff9f7de4f45008843e506dabc829c4
-
SHA256
7fcf9ef484ac626e36bea70691d139fa97afb5836328874590c8ab2d5fd7184d
-
SHA512
d704d267a7e0bf929251f8dc66b2ea3a7c9d61637e365e99387f56093acbfe044afb448983e7a78c5ef8090035ff980b0c1b2196b0c0bde17125c86e390e7883
-
SSDEEP
96:ZRfPMcMHyF7MnH5+XpR9wleDrlFAnV34brbWbUtiES3uI:Z9PMcMHySUXNB/lo3HUQE8uI
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007823eddbcee3e149bc4db86b21295af6000000000200000000001066000000010000200000002317866f364c924c89f62bf255e1a5a2853645b884549d27abb6ca2516801fad000000000e80000000020000200000002164e89ba84ab6f6fbd4de550b469ab49b46b7e57818173c9ec9ea04852a1f20200000006302756c21aa0ebfa1ec422802883013d46a1d1e1527f991e2b8096346f7de6140000000a703666c078861e71de27783d509a5dfa3ab241637aede33aef4172e76ace71848e4c79c68f15326f7c49b32a648cb01ec95c06ad3cacea8d52a256fdf9dd00a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A85C7D81-FD1E-11EE-A531-E61A8C993A67} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419563730" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0b4fb7d2b91da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 340 iexplore.exe 340 iexplore.exe 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 340 wrote to memory of 2072 340 iexplore.exe 28 PID 340 wrote to memory of 2072 340 iexplore.exe 28 PID 340 wrote to memory of 2072 340 iexplore.exe 28 PID 340 wrote to memory of 2072 340 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\libvlccore.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:340 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563986717f9c6dd4b8689acfc220b489d
SHA175bfb89eadcc1800622e4b825631e3bcffb56aca
SHA256e88ecef988a2bd849fd501835c4c856e8c736460e861849f79aef140269acb19
SHA5126631cfced295e89dd9c44e4964c94de9a86f44a29c4d39c2d6ffd4045d82a2052a184605d525092def2c09230ea78abfcbd0342ceb29306b58bb538fece5ab25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55158f6ce75eb482e167b06046c77bd53
SHA1e560a302a3da2339727b6b4d16a35174a70defca
SHA25610566edfbd6fa242212c8cc8bd950ca7e438416940c0d8c8b2da1b04b4a55c68
SHA5122e71c7bbcca3f5b243f0a46284152104cf56b7f2409f26fe3d974be44e435ae3b3de2fe7726727a7c53928345b934f8c8bf68f2ee187c72560c362d1da4133d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e4cd35073318af149216c9f310dbddd
SHA15810c4f5bcc8090fef7532f1fe59910d3107d425
SHA2561c556178102e2332c737738ab4fc8d6d33bd8a8b90055dde666cca2663320f36
SHA5126ec8ef703a8bd971e55576f29e5f63ef7db985aae9d3d8c3350a8879aa804e3a677481173560d484a9319ad55ac29b48a33c48455c25c2c84ee034d2dedd23d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506860a2af10e579e75448b9c794d4cac
SHA1c512fa139f5b21acf57e1d8ce5a0aa87a04c5ac4
SHA256cf2607fa5696997b30ce063b0a4b363743f5256c8ae1061113b2c3a51112dd64
SHA512b40ad63594adde0d40458046adacc8ce82d78d0934bd8970b135ee0942b94def6abf4509c143b45f92f7194a2a3603573eee2bf48da97a443b236b00f31239e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55873afb09efa729bd71442773bd74db6
SHA112b2042c9c4e76e39a633288bdb24f669061674d
SHA25656edacf5467515e483504fbb741ebbdb75035402c21c58588265c1dd7da8391e
SHA51255cc0bbb3d36fd37b0420009eeb6c9c5b3ecadf72fbba46e8270e62c83bc711ada8169ce30211e569cd3c081c3a62b34e5e5efec9f567a92f31a1f3ea1cf07cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5567265e2d3a0b5ccb749de117bf0d968
SHA18d85687eae91f041f762fc19c411c972764febfc
SHA25659103acc7704b27a972d3938f8d9296f22d4bb6c793640b082b67a197507c8f7
SHA512d1bcfcb6c92aeac3d2247d4d9d009a6d6facab9dbeefc798ad364f46b4bc3f801c74be51a1b1c00bcbf6e0aed3a08fba57185c89f3d37c2055f02ca936ccc7e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569e9bb602d129e68a81810196dd4ae05
SHA1e92a326cf4c15c1d27d442dcc1c87176d31d19bc
SHA25630ba4eed56e8c32951f11a05ba88a9f7190e26bbac06dcdf82b656a25079a124
SHA512c4c99f4dc24b6249f6ca4aa9f0b05073c3db5d572e170df99d5c1b0defa8197e7a9c6a1476a8d8c843d4904c93a2a666f8860cf9ac551e6f08d4abfd1e3166bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d511283c49aa457f6f9425f163f9540a
SHA170c9a905fe855e718a144e21407abb5cb4ec860a
SHA256a8ae7832d068f8fa837bd0d251467f83b96126fda9af2183f208c21851732742
SHA512846bd07ed22550c9628e2114790360b1303db954e222fe5f4ebbead0451089b8a4682140c85976b40205a9b7b78e367f72981fad6fe72f05ad03a5656c6b8bdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c2faf12c08b793256995a5468e9897e
SHA13d71b448d80e5b428bba7f9c2004aa99af13bc09
SHA256bef098fdd09d32f26478b5d88522b61c78e4245bcb92f10fd573adfd5f445af8
SHA512cf8adaea7601ac95e18cea7566757e4a2b3945b08294ba4a13d7b8f77b1939d9207a05d9a2a887822c36f742dd3c60cb348f1070b16db849bc86d9bbd43963c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502684ee20d34755857524aff3fccd80b
SHA15232323b75b5f2b4a8941d2423f3e8bf2e2fcc19
SHA2562ac9a486b67c26854833d0e4cebe2c2be8d40e73d38232d881e77c955c6d194d
SHA512b8f56cd901f2e70d25043709d4299c85680ae89e0b391ef85045cc911ba7355345ef5f4b995cace0a4454805e72b13d4f370b439a9fc5581f1cfdaea3aed3cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c8fa99352e19bdc5f86c322629bd6af
SHA17c9bf56cb8ec810fbb91acd284c49a59873047f2
SHA256dd8321550c35e8cddb4e78d9ed22d5e7ec9aecb5e911ec6668851a75a680f944
SHA512e8e9967155e500f83d94ac483c1665a0705b65e3cf3d1b80e1531bad29d4320feb81dcbe64202a341829c3c35e50464caefe1a7e2648cb28c34c6ad60da480d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58adbdc1e3f93e7a5c383c1d0147c4c37
SHA1d8151a062fd7222ae342b47f210eaf2e8268a29e
SHA256575d572de8ac57648a20ec77f1cdf8a4bffc6e37298f7bb0723327bf79808ffb
SHA512403d453c42a5af6514159270396bc5d098e77409501296d919af38ee7dc3f4d8179ce48b275cbf79a6a57b7feb7c2f2434e6afa48d1dec8de78f82e141ee9f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52985af50b139e05681de104b09a002cb
SHA13dca45efd71247162429731f279660a17602ed7b
SHA256b088a44ee2d361da8b8c0a35031727d6156a9cdb53dbafcd119ba64f87eb90c7
SHA512b120db7b00f6ca5fa1b51d1fbefe431b2307390690cfda184d74bee8d2e924e7714fc519cc6ae99060bf208332441ec97a96f701c477a182624c9bfccd5eed45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a43e1ef0d2adecc92e402bad6440a7c
SHA151762750aba1778af5048d02504370451cb6af34
SHA25614b7d3c8979add3a170e60511b97218f13991054087d5b46707684e0f22e02ba
SHA5123831d0b3732c018aa98209633700332753abb01e8cde93a891f694d99208701921fd55b1d285bca434263e5a4961f0c43af1fd7eae1f87fd47168883475da45f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5594424db1e32e2643423192f5df7fd5f
SHA1419254377e7f53396f7717c006ae76bf25874e5c
SHA256263aeb3d867e1ac19addad0c4b16528a48b71739edf8feb9f51c19f30a9f66fe
SHA512a1224548dd8bbed5a1e4b0f89c64084c005381f423b38e11dca16782d78736801fff5c691c6abf13b499d3e28467f7101faebbcd7307b943cceac8c8043c964a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfaaad00ee9638f1fe8b1e5a58124a91
SHA11592b603e5af0849516a4b66c1a2870a21f3b0c3
SHA256980df75c7d19bb19945f51ee02043972617b081df5bb153814743c24a2a87743
SHA5120083be8eac7887472d0dfed14972d49d813a51922c9a068867947c0088f55296059199528b8ed8d6918fd5525e4ce5b2c4fe95bb0b6052a4207e9a495696eb80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577d4cc981e1892af6c466911dfd70fa5
SHA17e4acd85ba9cf6e85b131337ec17e888a71132a8
SHA256c2faab97b7e2b03f9dc062505f439b5aef1ac65417a4f060b71d4948e3a0ebae
SHA51273addf7e586bc1edeac540e8421e13f022f9d1826c0f4ec4699bfa850be6014fa90d82bef6409407ae3f8582593d77d08518ddb51c87d0adb292ffbab8832d8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d5bee05370e2066d1d9e9f784198e2b
SHA1f623ac3f31ec0966d74d7720b89312353c706f52
SHA2560de1637611b5411435da05551f586669de720f08ad6236ae07d1341ab64d56e9
SHA512c0cd17439b288e3aa5b1b13b101daa2cad79ed925d016f64b6fa14ab5eacb2c9fd218d905cf43a91ab93144e9f30a798ef27a91070a58447b497d2aa7ac7d5bf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a