Analysis
-
max time kernel
137s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 10:13
Static task
static1
Behavioral task
behavioral1
Sample
libdirect3d_plugin.dll?id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
libdirect3d_plugin.dll?id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html
Resource
win10v2004-20240412-en
General
-
Target
libdirect3d_plugin.dll?id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html
-
Size
6KB
-
MD5
cd734b5a2aae9bb9824ce93132feb6ee
-
SHA1
119d3bdbb867bc0bac2ec4efdd69ef9922387540
-
SHA256
f48f1dd59004eb3dd494346521021a74943ac966b8df3e34513f372c546a9a0b
-
SHA512
01dac7a2fa76589a38fdf323151459dbdac2864768fc43e933666626b9225bbde429de61282749905b65d1c863d446c5e00a3d82d47024e21321177a2be31f08
-
SSDEEP
192:ZBiPMcMHyE0bDv42FXk3GB/lo3ZCBadfZBDUQE8uI:Z8PMcMHyzhXf/c5E8uI
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419683623" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007823eddbcee3e149bc4db86b21295af600000000020000000000106600000001000020000000b1383d3825923335a3ebd25f56ceae98da56a8b191daaf6a22c1f4886d032b99000000000e80000000020000200000000d704d0dbe7e04b09f8c546ba7cfc0c55ef571eaf55a489f1a3970e5df45520d20000000b4e55b66ea270d8f5f0d3c1730ce507a768ed27150027dd33195db9f0405e39d400000009a4bd74adc8957961097623c3d3d6bf7e18019bf7d74fbc8fb778eae77ac20d7bb65466ea6807cc5c87b750018bf1765b9a2c57fe556b5fa74871d476ec545ed iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50897da74292da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007823eddbcee3e149bc4db86b21295af600000000020000000000106600000001000020000000a2ce14ab630837d1c168afd8b9520e8170462a5b76475c43a8c9586d874d4d93000000000e800000000200002000000097f46bd07a086adaa680e08a19fdd4c88f9c5de3b57f30971a6aff6a88f1dab990000000cfba30a264c0b30f7f13a1c0420b3c053b4ea2989708eeacd0c8f32afb0a20aea08156a0b7b0c0a81c749ac3e5702c6db3272a27f1e2fcf0a27a816d38ecc4e2a9b763a4770893d19e28a84700e1d8c5a81014a801c5fc405b86f02ad366be5eb45a5e6f2b1722469b34f62119854c4d8ba7bf888912831e21699c3833ecfd32d2520ca198fc6a3ab2d25c523ddd4f27400000006aa85c29aa9ba0e9d6029bc2899545689e976a85473371712be9c760478c640dce66eaa7a25407082af8879e396c6f2dcabaa66e00f2d6fd5ac953580318a6ff iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CDAE5C31-FE35-11EE-BE09-CEEE273A2359} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2288 iexplore.exe 2288 iexplore.exe 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2900 2288 iexplore.exe 28 PID 2288 wrote to memory of 2900 2288 iexplore.exe 28 PID 2288 wrote to memory of 2900 2288 iexplore.exe 28 PID 2288 wrote to memory of 2900 2288 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\libdirect3d_plugin.dll_id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522cbc1f2f3eaf628755f74fb60096ff1
SHA1621f4d16b814c21254f2745b74622d6515c2af58
SHA25699e1c3084119f5dfd50dcca677c208410c7afda5dde7265e9f9d4e6083acd42c
SHA512899130ea71aea2696a5d9c00188baa3ba069063f89dd16becc96394809382d86be5d2f6e729338b0d788ae1be1ca31ff3d5f44da7396896c2a7877d6ef7f78be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fde53a19f7d35b18ff78573318ebe838
SHA1da2040f9268138cc554597fac0f0fa321d786ca0
SHA256e7a87d2f9484c87f1dc5b79abc84bef821ce4cc24955d5e96b70331097a9fb01
SHA5129d9fe48fddc908bc71a8abb81dac467233066b2d1fb1003bd598c71b6a19dea2dd79fc9865dc27fd5a85229df2c30eb27d9b562036be90f748a05333294265d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524d10d4b429747031be1c29a83ea4977
SHA191be6a2c7c8fca5c1a323364e5883e6772ab8b81
SHA25627eaf2b8537441bb47a2cd9722df44756378cef040adb7cef3aef45c21054ec8
SHA512815ea67e87b48152d92a278c53ae065a0db662ce389c666c36a4288a9609fdf9114d9d5ec899aa0c17536278b9a4425b364c2ad354753b1bea699fb1eb7bd37c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5161fbd6bbc440543fb3920a678d5be3f
SHA1e23155f258413f69e05db851a30e966032a68516
SHA2560e96574280ea1da5b5c8c681a6dc9351b9678a8d213ceaf615ac119204dea632
SHA5123ede29af99cf6353ce016f49b85fe8d01bf210cc2b468828e38b7703f13149f446dbeed5d92fd5d9ab0bbf56d5d9ce5b2f0663cd803d89c354571c100b7227a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594a4847870c7868c25aae27d3350563c
SHA1d34d5eada91a5f98a3089accbeb5e31df9475d11
SHA2565b0db78e371eea6bae5cfdb0790f1d01df13231ec6ad448fe42a3f55416a564c
SHA512d840e3eef90eb66a6a2df26171609df97d9b9da0920e0de85f53a7723ea188ad690ccae137273a3d23133d6b65486f18738ee1b2b6142f1c263a9e4a06cb68cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533c6b6d304e30372953daacd53510337
SHA10230e2bf8b6a2a16e0d787729ee16f2e8afca08f
SHA256e165bb6e4c79d1138f9eaeb4c5394643d4666ace5279a23dd3e3883adb3a0ef0
SHA51265837413c9c37eb919fa168a40b5bf10e9de896f47c517b10df60f96befb4c04b3670a26e2c86c2ae322fed5c31df3f02a0808be262fc07b2d16d0d5a16397c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a37c1eaa5a6d6031ab09f9c4677c696a
SHA135a8e14b34246baa85b06b6d28ef3d71acbd7f82
SHA25697f0fb5a29a0609d96a89a4dcef0309c156c53116de72767a20bccfc83c17762
SHA512d7eaa25beb2281a0c18936a7f57817355e48a59b6d03238ae50056163863422abae9dde1e9b2d9970861abb53b37fad832d6bb5c94b91ca64008323454ab3475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514acac4ed788668886a88e2411a8665b
SHA197f3adc877f393d96b9bdf78a34391f290596d6b
SHA2565f682b7b05d6c22fb4b01311c32267ee369f2353ff97f4a5a3011f408be1b524
SHA5124cb518ff5b5a8d2de3ae40919868bdddc7eb4b10436c9c4b9ae606dd8dff38d9e6b3147ba1875e794bee701e415869c6e5300b4ef7990c2abe17cb9e91d3002c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54833a67a7f01ef07184d6782fac83540
SHA100ccd5affe7ae3bea6fd2d25da5ef6804c5e6a1a
SHA256522333bd5543882a1d4088d86a05b1d8f7f942463aa48080b9f12a65b117135c
SHA512f1f740052ab4aeebe736134562607e263e05c7595505ed625ae8f53227583e78e186d2b233aced60ad77eaf531ccbdbc7bd0bd634d4d62c4185d761e851e430f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fb1c2bf92ea8d675ef85bbef0b6ecb8
SHA1da06771c4a3ab7b2943d13dbc784e93543618737
SHA25688a3e3d9c9764b97e6da76ae24c0ae5740a316c7d743e3b606d0ecf70a8bf134
SHA512b604e721529dd8c57b1b62bf2647205a48defd9f8aa5442d60141e079599b146cb6cd33e223836a0abd04a35dc6bf9825d132e2389cd8b5a71d6b3125e31c2b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528d4151d96946af60f9c99716bc92798
SHA12830c16be2a6293a3ddf97533c6e95aef304fd07
SHA25672019a0688493944ebfdd136704e815698fb5df6ee54052d46da40ced8a9804a
SHA51238344731a600b5874a80e2a1a1ba0a1287d525b69701bd8001ab815413a52ba133277c58f0cb864d5c1e609857000566c3387df344bb3c01da5a0953991da73d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf9ab065684df5411080019418591465
SHA17ce3f4feb6bb2e63c5c68a768dbd1ed146162e5d
SHA256e4a929a8bbd697ec52137314010992d054c0fce58d433d602337597b2f6eb682
SHA51288fb68f50fcfd13e6f71c7f37121f809ceeeac543f5aa22263974183313c33622bc6f17eb97a4a2a8fa92c1a340abf76ab50938f851949ac3cbfab73badb80dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6dadec5cb072cb3ceb208fa43cd96b6
SHA13e369e2b100e19dee598a68ea23fac6dc1e5e004
SHA25604817b49728ffce4e3aa501f27e94c96535d2ac2c527d3496e2f7cb699c90b6a
SHA512262b469ff53afcba2d46386a89a35c19cc831fbfcc388da99c5a9a905ac0b4a3829932f30449eac878583aafb6c9c8966922f5c8b793d398ac8cddf719e80d72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ccbaed7c7dd26f4f59daf3f4ffdef7e
SHA1bcf1d2033b697f79aa5e0b14ecd3de5913a16e6d
SHA25617494d4f3bd1e2c08226257310c48c2a9926e94e71fc8fe139b0487bc2ac3e51
SHA5126d19089f7689949f9dbc02ab26704378a84fb3ea0cc868d632c42e6c040cb7b19e5b905bb2688e1500a1446211ff4e2a4e2f7d3a909c841a41c65730769f22f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563efe10bcb0a9dedfcc2bd9d09c3e462
SHA1f9c22796cc081effa8051e9baf616251def71870
SHA2567b4351757bf4ead736ff5c1d7a1cba689dcdb6f77995ae8fe4a2175e79c47b8d
SHA51232fbfe7860e59a1d58646fceedbabd4b3edfac236207be6453048cc806f9153a3e8f7d38d7f09f5f2278ba3e0414aa2c14c72ef9bba5fd25938ab43c59747901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577bc430d2c52c7461c5c4934e9276a9b
SHA142fa0d714b9bd773093724f00d2e7835994ad790
SHA25610fcc92bd9791395fde3a891d9df01fe0da1c7dc3df122b24d48139966eb7849
SHA512946cc451aa5329b883b984033a81e2ed44bf0722fca777f47f0a16ae2a79f95aa5b341e076ea9b168f869ab28881cdc5e317258a29d62c726ae3206024d769a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4230cff4e82d89e936b04308f255780
SHA1098a26e4f53b8987dd221818e0fc62e8c196f37b
SHA2569575941fe89d0d095ca3e5686e100a88dc3713342a69701b68056da17da229af
SHA51267ceb723aae9278f67464a029789f112cc28771c501443d014bfdf8bfb6d97c9a268d682008726ed9daf102106fad4eee0b2aad8c7a2a3d3e9a3d4e4d2f14984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d382ff29bca62a37c1ddd5b75de3c181
SHA1510d1368be029bdc4136382fd467047782591485
SHA2562a84a961b6f3f15378a6a8b7459a89a75ef6494bf8bc42f0ce23ae5f321abd07
SHA512232bee51f6990444aed493cc83adac24b76ec8fc3ac345611ba4a73e1d4d1649dac2f0cceaaff99d6f4a21965fdf7d7dd1cb1aef341439064569293633b84832
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a