Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
libpacketizer_mpeg4video_plugin.dll.svn-base?id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
libpacketizer_mpeg4video_plugin.dll.svn-base?id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html
Resource
win10v2004-20240226-en
General
-
Target
libpacketizer_mpeg4video_plugin.dll.svn-base?id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html
-
Size
7KB
-
MD5
b3543defc465b579257eb3bd36a17899
-
SHA1
ecd8da0d925691cd38b70933b6a892acbfab6969
-
SHA256
80bc2570f2e7e489d9840538cfdc098e94a70bb40cc2739300e3fe9be8674c26
-
SHA512
519829b379194ab62ab9e5efe22ec3ffca2e4d2c2334fd966f94dfd7e905ec17bd654db1bf27454ef33190c13953f852376c913971af288c7c8df37ff1ccdd1b
-
SSDEEP
192:ZevTPMcMHybvgvVviwvgvCLvMXpvpv5B/lo3WvGvHvfvXv9vHvYUQE8uI:ZiPMcMHyjZXn/xE8uI
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000cfff32f043acb1ad8c157ee28b6c09ed4a813015c54c02e13c8b262ae18424c5000000000e8000000002000020000000e119db9f59257a701c6fb12bbf4a9ba00bfd73af60654e24cdeae814870277b8200000008793944be32604e19fdecef3706bbaa9decdf953c779572a087dd170d041ce1a40000000e88cef20ca74286f9a117c91f7841b386123ed85439b48e23857d32aded3514cc923364feb1352fefa8fa91333e22b852f275e9baa4ea71ad58d41b6bb1fd3f3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419684967" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F002E7D1-FE38-11EE-822E-56D57A935C49} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e053dfc44592da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1504 iexplore.exe 1504 iexplore.exe 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2324 1504 iexplore.exe 28 PID 1504 wrote to memory of 2324 1504 iexplore.exe 28 PID 1504 wrote to memory of 2324 1504 iexplore.exe 28 PID 1504 wrote to memory of 2324 1504 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\libpacketizer_mpeg4video_plugin.dll.svn-base_id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1504 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8158a26d8af7c3464159bfdb79c7336
SHA1d47941ae9ce3d777a069017600a42b9f22718af2
SHA256d14e92352876334cd48ebd23771bedaf4a2123d1e695055f061843855d77e3ce
SHA5125883769c13922fb81a903f8cfb2acda6eb1146eb8937769cef93bd1e657a9bf076cfdfd488c0a1b6c7bb68d911df302a93efac5d0a2321d4eb5e98e09859b99f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e6f510b784aca7168f7b711f7f9a021
SHA159a2dca00a2c35abb8cb2c04e895dbdf3f09fb48
SHA256cf49ba0dbb670578246246ffbc2af0d942574c586de848493edc46485747aa1c
SHA512b8f8bdb889a729b0907a99b3d784c376a468c0e4e2893286d11233f357c7fd8bccc5c48b93502f2b318504634ef3be2018872fc27135022289164ea4e5bf75c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe59bf443b3db3ca2bc8ef6f15d1fcb7
SHA1874312959d1eecc6a4773a8a1906556958cbf89d
SHA25630a42e3deb7583fa65d2e0fa39633124ceadad327bc45065f5a9f1266ba4b957
SHA512014c6a558c6feb2a11e4f32f98c37ce9f12c7b1f1e7ac21ffec986cab074cd7a9b747b7196951d91cd823f71c17b1ba9b5bf699db203216aa260d2ac0172a5e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf1b840abbe837154396cd137035d55a
SHA15232deb7d8738466698780a3af9b3c8e31db8dcf
SHA25655ab0f80d057b526ea82cc8373d78497881fee94d06103edb717052ffe1e84b7
SHA512e6196960e4477216d42e52e5545f41bd83a4c1381ba9dae44c3d994598a3d434443fe67c5e8312ca53adc920fddf44dfa83d366658b8751aab933c8117354da2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2eab157968a8ef7d5219eea951809aa
SHA104f7bc79d95b39c8476958bd1ec66d4be2642321
SHA2562732b5a967acab097d698e2845d0145d62a77690f5f0d8fb2136f8daebfa8064
SHA51251032ed769600c9c39e63d1998676a6e7ed0c3eecbe37a224540cfe54b04a663bb9d4b7535b4288799737a48f5f9c8c9a05e86054525ae130b4604319239f32e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5faa1bba72ac9147e9867f2320ca85ce4
SHA11098f6b89c506ece03069aea2b945be9e1417439
SHA256b15979dd67cabaea6a0396446daea870181cb7693921fd33d1f47c9517aebc0f
SHA512deb4a537be38b36721fe3f06a45e74710d0b110544efaa9945e4593a19ac68be8d7fba3a873ef46609db615a3422f037b355a581c53da6271ab978de32726535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59aa9da28b12102dacad6da5b6ea9ed35
SHA16e78d07aa28af7182211e026d71eefd59a34c210
SHA256d2f3e0c327c7924d23721a754c91ab58bcbaa5a991e351efca0e2b14f59ddd5a
SHA5126eccc8f5f42ab9ebb348716d791deba046e0d25dee326cfa9019fbc1509bb0f288afb1664ed8e5b01873f8d3cbd627851d739b29890c864fe9accde96f7ddb8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f905d6142df33597d4027e0104c41e75
SHA1f66732796d878b707502409d182c6aabfda02c43
SHA256b8481f012d42405363ec3f7e4ce1bd82f46f269ad7f872f217c29f0e27bcc515
SHA5126ad5926ba62a751871f62bbf2c4f91913b73b11b8b45fd1f520bddde820aa292766f05fd44d531810aa203e31ae83a082bdb850f131b5a880591d2db6c5f06ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cc0ce425fadb2711c2a5185ee7abc91
SHA1cd47fdc175ae74b6cc341c031db7c84e4cc1bced
SHA2567bfc9fc5c49388322f5860f177e9a0cd332c0ee12f682c6eb9dbf3ea0db4c5d6
SHA5122f50dbe11441c72c2e13f193bd592ef2a6afc25117a796e76af8ca97b08d996a892ebbcc77c428bc865b412baf29d173ba6cb25078f4978a580bd23b675a5b15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5628d7b0af508816984399311f287d804
SHA1f5a9586bff634504bade9baab6725375c033da6a
SHA25670d5863394004e91980e1139bf05c18aea5a4d1b27f9e6ed62d4138cc62d55bd
SHA512b4e0cf4c25e4bc69678b5eee7c4024550c009bfb5d802984efdc0793657fc8915060e1a7e7ecdb98966a9babe91a6fccc20469b3e5c375fd3a651b7bca649a41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542ae812f375d30ab39d2de41b24a057e
SHA1b2e2716ce05779da5296498d5473d34baad3ad5b
SHA2563ea34fec7956c6a389ae27e094e043575cf3a479955b8eaba290f316a1ec9813
SHA5124cb7bcc1b4008a933c224e0c5674a73b2528eac43228a5f7a2e2633e1a22203b3f984c77f60902c910fc6752efd3baf1b78fc8c2d36f33c108ea1a5bf65270cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562f9e44d529688ce34f542b5ec6606e4
SHA19b00cfacd9dd80cae73cdf472462927cb660523a
SHA256fced3dea995add56c0c38622fad04bffb6792c1d92c0d2720f83d56bd9f987a0
SHA512cadb3b1cc6109880c2b9328e904a523f89fa074fbd2bd121e507fe5615f2059cb567d4a3021b1aa8e7a32b80eb1761f247633b21cfaa628b7bae4f64c9daf061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fac4552eb4e549d48e5577febda74544
SHA1f4c47f0775ac7ea24d47986b578b49f34a98533b
SHA256cfb731814a2a83cc896637b572816fc21d6df425f4c24c4129a3400369d8a5ee
SHA51223b7aad23e4b7baced19a95219c5180939be9eed6b0dd1e8e86342b9913c09dfb84cd533cc397c29eca78cef9bcc82f4af211d1668786220ee4098e8fac4c222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5603f186261ba876902b4ce8270ab48db
SHA10a51e8ca83c3f0eb1523ba36fc1d9a57b3f7077e
SHA2566a3f44146d7b76d1848eb605e0f6bbc73b596ebc4fd66a1def6ef85209d1b558
SHA512c084a0f8295a824b6512ff4ab35d6ebb605ccb910a6550b8b751500fdf26c668924db6dcaa4716734c772313697a4f930f783eb6f12ca3440b0a8c87458aeacb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514054807f64ca14168e9f7f49bda60f0
SHA16d686d3d3459afc9905ac847f5d987a1dd00b87b
SHA25601e095aa1039db0edafd7651de3dcbf538b127ce81b5e64c835fa37cf8858f22
SHA512c4081bc162720dc1c2200debad009c5fc6bb161e51bff018a85665dfbdc19b28798912152533ad6dc91363bf0dd28cd6dddbdf9eb46890c2fbf91136db15443a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed0044da49ee15d9a1f11b52bc2b65be
SHA15a0976feb97537b6e5345c8f3a0018ed9c709456
SHA256da2095622be66537239e156eaa10b12d70adb69c974af1b3ed8f3e3b5a09da26
SHA5124f3ead3172871bf71eed8d3c7592273c336721dc3ea97831489a9e60adcf16de816b630c6c7d68f60adfbbe834846e62d96e763c544470c9b0a5b23f3d85120d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db7782a2fdfae4b20fb66ab95a2ce1aa
SHA177ab0fd2d612a9f4319e34490d897e13448f2d12
SHA25609f9d6a02479b5cf44e28508d049679256bb358681d4889e57cb3ba516396581
SHA5128bddc5f70fac763a0eca004114d39fc4673a0ef34080b9b696cb951cee1449a66b0b1280f2eff01e38efa6b14d68c382d9760b0d67c093cbc40015c16514d263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55dbe094aad0b4bbad1aee4c9429e9a58
SHA1fff3fe0782563926ccd6fc68f4f18931016e78c5
SHA2563af6313e5dab791cad4cf4f3c8f08dd4640813b968865eb6a3c24531e0689011
SHA51247c73fdf0c0847dcbead11cd02541312432cd466a8746b5f46738a6c20bfd38c2b93fda77cb80b024bee00fabe4f9bb5e247f26a6012c72bdd01064e080f98a5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a