Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 09:53
Static task
static1
Behavioral task
behavioral1
Sample
libaccess_realrtsp_plugin.dll.svn-base?id=e3b43bd36fd50840467669364014ee53553872c1.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
libaccess_realrtsp_plugin.dll.svn-base?id=e3b43bd36fd50840467669364014ee53553872c1.html
Resource
win10v2004-20240412-en
General
-
Target
libaccess_realrtsp_plugin.dll.svn-base?id=e3b43bd36fd50840467669364014ee53553872c1.html
-
Size
15KB
-
MD5
a67f135e26fcd9fe75cb440d1ef71b15
-
SHA1
389324ad1f53cf599bb272e6dc63a6e72d6624b3
-
SHA256
0bfdb07a592ec2bd180e0e5e6badb74a07b19e488c630fbb0eb5fcb979098511
-
SHA512
8652320e4bd53080a7640486560f619b7564ea2bddb6228be865f80b69df91b7c341fa34b9cf44e59d798d3b81a7e97d728bc3f71787ca7e52dfc28da81d50e2
-
SSDEEP
384:w9PMcMHyAcaJk4dLcvXkvDZ3e7l7LJzl+Cq124kbrBZFE8uI:cPMcMHyAcaJk4dLcvUvDZ3e7l7LtFE8B
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2079ecbc3f92da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000064675c42eb6ff00c3145bb87b050ac9ff2a00c27b791f010c0858f5e5d00a12b000000000e800000000200002000000085737dce16bc2f182fb4875374f2f12583689c8ea0c1e19d5087ee561cb4e5252000000016daada7d3ab8cf1c221d699330e66b030c05743b48e3ec967e8fe224cd605c540000000382d84462f2be9bfc2fc6163bd69b0e1c9cacf6eb69a861769148b04f5312556b91346610cd0b528160d1aedb1eaec7df9266bb1bcc4fcb09a9a3374e57669df iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419682377" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E83F0481-FE32-11EE-91A4-56D57A935C49} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2936 iexplore.exe 2936 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2172 2936 iexplore.exe 28 PID 2936 wrote to memory of 2172 2936 iexplore.exe 28 PID 2936 wrote to memory of 2172 2936 iexplore.exe 28 PID 2936 wrote to memory of 2172 2936 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\libaccess_realrtsp_plugin.dll.svn-base_id=e3b43bd36fd50840467669364014ee53553872c1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2936 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50492ddec3941d67192492723ba7a556d
SHA1ce657ace492ee784ddf79569f5c0ed206472152b
SHA25605e357fac3bf4c30a710ad2f8ef0e54a4b3cc8f73a145d50fb0589f04abf7aa1
SHA512063bc46993cc7290cce9adfe9cfcecb2f3b2a20aa71b71a14b2ed0fdabb15ed0ce2f37a6a6dbcc6b31d6e9c4f5e90a0d5625acf8a02f5040c47c1dc4caa29108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5304925dd2aafde11a3796921e7d01d9b
SHA13bfeb4e9296af07ea8ab7cb5ad65ae923a4c3f40
SHA256354e3ec2e6d6e196024478469d6f8666dccff4276e9494c11259effd9b7f047a
SHA5125c175204e7d35f638f281fea72a85fcb2d757d276e6dbe6a9523f63496bdb556c04e8ea7f6cbc846d2ba18816d19f8b149a7f51be652ea57bd8ab0be8b5fe640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f58b0f4bee11f6d69a6ef9ba16ee7d73
SHA13394f9b303784c4d283b2f2edd7db4b62fc5ccbb
SHA2562e865b335002b443672ab22f8857e90549208539b302d40a18516c66594cce04
SHA5121195095339110695110e3cf06d082639dabc3b78633d2f8eb3ad2a32b92e069cd16006dcec9e36b4db0acfe19e476f04d362922fd3e66fa5dd4c89d9c5ee1b7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7e69b5bf5a14464ea22451716832b67
SHA1823529961fcaa69acbc94ad4de19bba7c3749a80
SHA256337da9a3e6bc474372b1c02b19b57044e26b901f267a5322b96a45c2d9fb402e
SHA5121e27c3c80184c098d2f84e53b668e05c9740a52c7f01d73a60a15b3563a635f64abd9c90f1c511c6b0c2f0562e318c96bce2d03d0c034a7648368efdf68a0669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcfb1092baa325d4cc0be60da39f54c9
SHA1b139de9063a4d67b91fe28f641327a22fc38c18d
SHA256a15e438e485ea2a49bdb545ae26e4d554e521df206cc923df0db06233b7a12ed
SHA51264f9eb08530b4455fc5d46e921c47e532a3833b2ada01e462158c68ad9ff146c308719ef41c165b9a8ef12ebd5d6721a2cdc49666233249a36ed3d0d4ac112ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3e171d56bd71af8ab5d0d000f2c2803
SHA1c8bba75210816edc1797f94151476a8d54809781
SHA256a8b703aa5b81ebdfc45d9d731d2bc546c15c07c26b0b1bd2a3357e6b9551b787
SHA5125f24d539c27fd994c398a0ca77c9401c25ee19cb1b62e6c9195f7e80405c7d8d7f1756d79d168672a6cbc2e4a8bc6b0d31cfa2e1fcc3a3acd773cecd03a84d04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf1deeceb7e49b5fe00bb631578972d2
SHA13842e66fdbb130190a33e2d3e1fc382d6b4bb9e9
SHA256978c3b30e0c867c2ea6bfd0335b39cbc48344b6e4148691b52e3437bfd4b5e6d
SHA5125d308c72a5a903d7f930a8da4201a080a9b5e261a54afb3ce231697a6382464dd5c59dc82f901595d0b1e374ff9662800573234c0d71240f77a476e0e9e69929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2a09c77b03ac5b562bc15c98cb5a540
SHA121089a79aa38d4485ee96b3ec13275fdb8466833
SHA256fdd24fa9ab2c5a154a8dc878cbfa888c23ad89e46394406263656278b2004b60
SHA51275327bb74f67596d8e00a78c325f50d2dca90a5598ca8e31baa11d9c1adfae6e79f55ae7d3d1017551f1be7b0fe38618b479cf9bcb045c4bd915eb13527782b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501bcd312f3a3ab973aeab60688b433d0
SHA129cd2546693c9666817eafa6450654ad8fa67b95
SHA2565507fd40950e015a6985882b3dc01ae0fcbdf68ff585475a514654f9bb6596e8
SHA512b4dcceac4fb97fd30a2f0014a4e9f76067c1525fa4c86b9d51a4232b4d5bf829abf0e2ad545d5c39ad31e5a229650e0177caefa69ce1511c3b5dd01329c2eeef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5127b8b18639b4922a7d50f9087497118
SHA1eadcf8073f52582c3e2e2f2f6f55bee267cc8be2
SHA25635fc03e99b79c4e70a5c691f8035e22093485c28fee6e546e4ea6bf671ee4df2
SHA51212312569ef563356507f0264020b6badd535b7a7da6313bead5941b81750694b71457786e7304e4ea5427e452168e2b21e45de363a7ede25cd076bd9a545142e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510b106debd349e337b7df017f3ad516b
SHA1606f23cc8ebdfe79fd01c5065d6369bdc0506232
SHA25604ba041da33237b1ec76fac1a86822a408454fe507752205c201bf0373ab3d9f
SHA5124be9f4cefc6d1cc2deeae85ab54a172b12e1688a6a943901ab18b5a05c4c4484deff45eeff6171414a2b7132745f878d2cadf50b5bda51fe4ebd10e0ed1f69b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c3f04bec471530757d03e9388b103f2
SHA1a77795e12c71e6cc4bf083ac408f45a9c3807bf2
SHA256b84337a7925dfcf300b6b1475da867d8361ef38c98624156beacfbe4d4f7df4c
SHA51289a3a3b08c29119ae9d42c2c6de3bd568d15003c5f1903526886d4afbbc53e515233e7dfa1f84c4511407b0a1021909c874b43aa984c23dadd2ad310a7eb960d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5570edf05b2cc989af051211f1ef2ed5b
SHA1fd6f430d2f290ca70362a2a13cdb25dc91b532dc
SHA25628cfd15f9a46eac03eb922479e98aff718db267e858f8bbd578067bf6f9db672
SHA5125fa2358fde03e8d94d790a23fef73c06359cee9da21f89f20470d5962262bab9458c0d89a4b04056cb0fe94a8f9adb28cc5da12a0d1f40c58b1630eecbbfe3b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf8f41d44965e27d5505d38ab6cdc092
SHA19791a23bae8a8d07c0b7b85400028b8edd478d40
SHA256c1e95d0ec4fe7b16df9009d87d5a36b7d37472deef7bb79d249aded1be2f10a9
SHA51299d717237b69e71073956c6a43e2a59c240beb9ea5b0241acd5223d64b5257117d3c80bf23fe55be07d6af264cc2865e98100828ed3111a0f792c83c63a0d078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5389dfe8767fa5ac98ce90b4151971c46
SHA1ff62f552908d2278cac159f93f1764ae767ce63c
SHA2562f7f0874a108abf000da4f827bc8289a9c8101ee52f992e47629372e89023581
SHA5129ebcef97cceb805de9b59653405d689e2a1c49d0a94a1e7aecb9e070b9f91862c04b9a6597ff36ed2a7d6172bebd5508569007755240416cc0265839618bc8e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c0f61796ed3b55b32d603553e020eaa
SHA13968b5e623daccfe32c16ca50d8c48e9572b0cb1
SHA2566c0db5fea09016d403faa3c487bb53079abb1ccb17455587cf7e3136fcb5e7e6
SHA51237c55e27dc1f100f65f53ffc46647fac73fcf58bd36cda6995bb4f1280cabc99de16a7c8aa91ec44b335be22c0f6f81bc257e8054d64a30affe29d4f67e2fdc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519dc335840a822a313efb0e8ff0921d3
SHA1091c8de7a642d8b1592cd80456bf81848c233577
SHA2567fd321de10a1aa032814f861d0eb9c28ec74910a5fdde6e7ec28442c38557a43
SHA512b9af39b48838015a883fc808b25a9108d193cce6f9102e1b522771dcfb536130dcd0eeb178eb60150c009c48f5d0517cd0f39b5fdfe21b27e23b19fedea558fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560ea15f2455e7c6c09d77cbf94320458
SHA1b4c78612ff3cdbc0aa155c065f21f732290dda56
SHA256b370f89aa457599066c23685676311c416f20e833b00cd639b9a1850d97668e2
SHA5120b6120eb26e4111a89d92f3ba50ee9e6d378344c451253be42dbe23c53bb9b8b7ffef0821f6b16064ac967af0f9fac905e4adf3e3102d74e255d5ee695db4f41
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a