Analysis
-
max time kernel
121s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 10:19
Static task
static1
Behavioral task
behavioral1
Sample
libgrey_yuv_plugin.dll?id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
libgrey_yuv_plugin.dll?id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html
Resource
win10v2004-20240412-en
General
-
Target
libgrey_yuv_plugin.dll?id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html
-
Size
199KB
-
MD5
c9a9908f69ad06e0f57fd24d368c7e53
-
SHA1
4c28112a1f2d9fac4c72785e37b385e7311c768a
-
SHA256
0e5346d008d85b557cc4431e4544af2d10631729d60fa14f5f00f4d98f902da1
-
SHA512
a8f058aaf05f0b44c12d46ecf681b2db0db85a09e1488adb7e39f6fe9aa90e7999f6b3d407ff85ed4c39ce988a37ad84a6ab3d5cd6814ebdb631dc0e97cf72d4
-
SSDEEP
1536:Eh/B4y+2sFgLmSF3JOksuMm29VpzJlIW3HOe8LLN2DgkPE8B:Eh/BDsFP9B5BfT+1LUskF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000003873a26ec5559af364ac6c813488a569f521c5170de9e8bceb772418c3e8e96000000000e8000000002000020000000d08aab463a05ccdc143a5494407db7ff952bf2cbda8f0b1e5f2966e74fc0672920000000189e850804a30858efc78ce868c84254c7e84b73c778a0546eae3fc8235dd91040000000434da161edd460fd184d02be6a6f0b3ef0356bb1121d8dd717bf00995ff605e9fd7ba3d16120ab52a8ad2fd62efca19689eea59e4587ab494b4f5ae88eb57670 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DCD381D1-FE36-11EE-8D50-4A4F109F65B0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 506e54b34392da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419684078" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2340 2240 iexplore.exe 30 PID 2240 wrote to memory of 2340 2240 iexplore.exe 30 PID 2240 wrote to memory of 2340 2240 iexplore.exe 30 PID 2240 wrote to memory of 2340 2240 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\libgrey_yuv_plugin.dll_id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537bd5ee82de764a9593229cf7c594424
SHA1bf7045a5f8d0add3f9421416fe8d7d03c3debfd8
SHA2566ce76e8c37f7a4cfd87afbf0333008e6469c93ff6074876e8165e5be5bd2902f
SHA51283e066391bfd07488ad7a5e14657c07ae60e699699c5ffbd25d228bce5b41e90c0ef564da7101c2ca44558e2b86df9bfa5c182fe0503b4713607666a1233bc3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e9dc43178c4ab3360009003c0a7323b
SHA1a8c8f809679a4cd4a993d3ddc7a0fe60c76bd788
SHA256f3150183fc40346ae82c4526fa1f0719a02b5f6d9a1cf345d641826b6f8d1fce
SHA5127f7c09dd70a3d446e648278263cba836a7c7bfbe6fbdd0f377acec498dcf4e6024cd9bc3b92ceb1c699f924e61c935efb7c15c6c2f166249f6d0a9af6d4dfa14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508bbd42d9d654dbb9c0e16561f94a09a
SHA1739b6656c028c8389ef4c0549d24a66c7d4e0133
SHA256774098c325835db4187a39cd05b82a682f52074a36270f8749d9fedd35a7c734
SHA512e532885a26205675897b7df7747cf8d6d84b7c0abe4d7e836262e17b6e2448739a97c4d389d26e371132358c4a07b983a2a4cc51f5cb64245c40e665973b157a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b62008b5e8625e1190efa74b2163f962
SHA1aa1210f9f482396cec70dc68306d2d8a4511f173
SHA256a7ebfeb0f97ab453c06574d13062d3132038f075c085c8f7e524845d2ea413f2
SHA51211e5e545586de35e250b9c7f245c52fc409605de88580e5d12cfe71e4ca4aeb902bd9117fe8a05ef18c2a892d5b211cd92d26ee2fe4cae2ff83aac7c5c895e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586a19fd4147ea5d3cc0d0414371f8cb8
SHA12f0f2ab6351149a92619997eae32d1761180662e
SHA256cbc724df7c30a1edac9df489b2ae51277dbf83ba0f229c0c3cc08ba602d13a29
SHA512adf3c2112602728d2296b4864e1ebf86eebc61eb2926afc6561f885aa4e365f73403f7d6c5b7cf3d0a5588554effb5d3e70b779661989d01b3b55a737d2de481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e03fc23bf6da453c9e39cf6beafe6e0
SHA149b4756bede8cca4c9376f2469098c078938f899
SHA256e5c4170d4bee5251fb790cb02e00dbd0b0878cec16b35428a25bdd301e7f105b
SHA512d2ccbf49f19b69bd7ed03feb12fb30f774df6f49b77b9b76ad3bf966b600dc2a4099094f1b09a12f0bfcaebfb807a9b868c769f7915a3d0d5671544a3476afca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50416186233d4eeb3523142686f712e3b
SHA1f5f01516ec4c215a22d80aabe7a3b7a3e9090c1b
SHA256a52e4b104640e7a1bcb591b5769b8e007bab10cc68645a08127f63283cf8ca33
SHA512afb48a478c8197fd0e9ec3fb684a887b5cfbf636d736bafdc71386b6a23733c3e1a932e28fd161897da1314a6106309a54a66be1a35258e2d4ef312b4ef0edc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5add9ec44adcbd01b83de46711afe9bf5
SHA143315645ee9aa5b284c4b6c8a148eb8bc20526c1
SHA25673e322e4f2c2e236c3fe9308b6127009db1d88c6bedc8656d72cc932c93d9970
SHA5121e4971f843b3d7331935ae3ad080117d5ba60d4bcc8eea88e611997ee6eaf2f039431e659c84e32492652a234947c63aed2566ec672bc3fd17c47a8fc3fc5872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5c50d9427af1ac972e3ff7f93240fc2
SHA12f598109b9e7f2af60864d693efc1dbdf93dd405
SHA256242cd56f19745eee1ff5ece71828d81426e5cf30ba53103ce45ca9ce69ebe1f5
SHA512a05d893d1ff6d949c56e4ce5289cf6342287b7e873364462c0b5cc9157e44629a6df30ab0904b2e80d25d1cc80a56f8bf1c3b7e8bea9e1f28a45cf28894ff9d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3727c93ed3bc3bffad9a291b3a2dacc
SHA1b17259f0bec66710ef6ab75d387cf3d6d18dd4a3
SHA2560dc9e210fdd6ad4bb32c1223962f96381d68e8eb993d8a876779f53f8c856d22
SHA5128afd0b1b9979fd09e3e1850a84695ba2a7f4bb964bd0f7148f986c970caf8d45c1966e8cf1627b471c9f110d0cf58382ee4c661a32b02d2ee17852e01e898251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561037cb2700ddd7d99964797d417ada8
SHA1692636a9175203352cb7b1a2bcf49230626be811
SHA256bfb581e09be28192287bafc9c2b5ff079c1fbf0d30e6209539a30ffb56b1446c
SHA512ee5e2dee0fe447ce31d8ccd56928476d9790ef7064f24904c510cd7a9f4281c2f4772267a015f6cb067135c9ac8099b18e31a3fb1b6cf89c50800411a9cd3945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4255b540b37372d132fb9a1747dd23f
SHA1f3b8adae89174b7c15e5f96c2d622d8cf717c17e
SHA256bec95353aee0c02c749a48e9b0fcce5343b8b257c911c69959fef389924209db
SHA51221be9bd6fc84975c591b99091cb420731f90f33dd22fb425f523411313e3648cba824c68ea26bfca7b3a316affebf9c56e11757f4628ac3e0a6523584d323781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7ee29e2ab5ffad91d6f18d9f78a73cf
SHA1b47237ffccde0f028419036491cba68808d74b33
SHA25618b8f087b674624add258470b99043c3aa0dcf828cac230b49c93c3a6b2dd04d
SHA5128611bb5e5e6552263027317408c01b50aa12c70ca44f64003e36ab142a775f0855e8679df5cf8d2bc3c57602f765fa55c16e83422b203f7eebce5817c86f17b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7ab666e2f9d3a48075cd09aaa291875
SHA1b364ec57cf892701f93de50f4f94e49b6684669e
SHA2560c0f9cf300f79634a224b6d71916950568d8edf28fb5e0c3f980fa59e8c2646e
SHA51264a634588b07d9c8ee15ec1ad5aef50963418ccd1936c99d2d7bd8c47468c2267d3a13f21113022cf7a1a5445f26676ca4154ada9b89dd31934eac8d93c3b524
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a