Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 10:45
Static task
static1
Behavioral task
behavioral1
Sample
libquicktime_plugin.dll.svn-base?id=e3b43bd36fd50840467669364014ee53553872c1.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
libquicktime_plugin.dll.svn-base?id=e3b43bd36fd50840467669364014ee53553872c1.html
Resource
win10v2004-20240412-en
General
-
Target
libquicktime_plugin.dll.svn-base?id=e3b43bd36fd50840467669364014ee53553872c1.html
-
Size
15KB
-
MD5
06bc23cf22e03ce20a78e3fac835c4af
-
SHA1
af62aad27768aeb98c169ce2bfe10b56319ee05f
-
SHA256
d9c7b7323db9811398e83bba40e987da66644ea0185590bc7ded6a5c374c9fdc
-
SHA512
fd00251931defcee2967ac534b6b494389ef13abef31bcecd492557b01540370fb94e3b4e3dcaabbb3e311b76342ed4535ec5bb715501804e4cb72165be92241
-
SSDEEP
384:ItPMcMHyAcaxUQtTcvXkvDZ3ebdbLJzl+Cq124kbrBZFE8uI:MPMcMHyAcaxUQtTcvUvDZ3ebdbLtFE8B
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FD6C2CA1-FE39-11EE-87AA-FA8378BF1C4A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000009ec9afc30d8ce1fa71c3533d4d1a1a880b86336c12bbf364441f1294e6ef2ce1000000000e80000000020000200000000f445aa8cda5a65845f602e057ac0ef814e82c83107899c7885aa38611962a892000000023708e31a5063a2d2481f7568dd391f7ec800f53f3adbbc1fd516cb21183931340000000711ca70f94e99b0d733d089be67b87cc3576434561c1ed173c1eceb440dc2d7421c2d66f2853415019359bb42998e7aa4e7830dc67546ad023e9f2e88e728aac iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00a613d24692da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419685419" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 832 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 832 iexplore.exe 832 iexplore.exe 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 832 wrote to memory of 2884 832 iexplore.exe 28 PID 832 wrote to memory of 2884 832 iexplore.exe 28 PID 832 wrote to memory of 2884 832 iexplore.exe 28 PID 832 wrote to memory of 2884 832 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\libquicktime_plugin.dll.svn-base_id=e3b43bd36fd50840467669364014ee53553872c1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:832 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5391696334d209f237e272827c2da4815
SHA1daf3754a94d14477b8ba4605fc09c35aab274c4c
SHA256e99fbf6a9552601309b11e53fd41a24843a64975cb8b6f927bf1967d4e131e2f
SHA51253a20a0062a6611f7e00702408222da951d9bffbfb7212e20055e1ff3838d236aeb1540bf8a53d4b564290daf591a5e8f6a521da74c7a3c37af3915474dde823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594334f1e8c7b37265d8fc6d0397d7d8f
SHA11f5eb553d2e8dbc7251dc96ba12cbba7569edb0c
SHA25630fa35d501477d999d5f272e1112c5145dca39af4bdc3df3d68701b7300fc1ca
SHA512c8da4eb18a1db285e59f2fe6d021db5fce53948e85247915899ba820ba2db7d641820e6d78efc30db7e331978bea69f935cfaf2998449736a7cbd3c3c8563dd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc001df582e95e9d7ed7c60ab10bc729
SHA170c38dc535fbf9090239de0cbce86c6874621dd2
SHA256f24ac978f5026397cec9d9c4978d266421310dfd73fb5673a876af12f5adfed6
SHA5123b83c47a92fea70c34cd8df4d6b88f6510f0759a0b937e22ccd400797fe7717dc7c5e6ffe282acca4a5c4fea96e815cddc3327f660ffb8e0104323a3358bccd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f850f19e45989f244f90a5a86ddf775
SHA1507fec64a0b5c0f4236ed835bd9513d1d38870ce
SHA256501c4069ead46840bb37756621c454865d2d1a48e9ece7b04f7692993c1f6ce2
SHA51215f888e6e9cfe8e947daec4d61c7a0f19499087451a716697b0976a6e7cf9b5c79a32377f9dbdc07b800fad5186638e4a00de0a592cd24759ad34a481e5122aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5692c3156f872edadc7dba0816e16988d
SHA13d08d564ab33b3e8a1e8bda0964b579cc4cd00c5
SHA25690b23a639de00d65e2332fc5e2297a41c900edc1ddb3ef27ab60f5dbc58759f9
SHA512922c03ea084e0b0bbd28721c2012619179cafa6d74748c6ba2754f1cd33c694b00407fe3e5f3623820280dbe37327c388151ab816e6f30edd3189d6e6e7119ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b73344a95777908604882c1f8d2058b
SHA1d1a3a5b12509cb9ae2ec4400bef655f0e6c9b014
SHA25629b6ec8fa9b5489a5d05dd3e48d59affcec423d0f4cf03d289faf03789256d63
SHA512965bba8b5cba8fa042dab9147fe1bb6a8a2d258c19bce1d446eb191c771fd17266d2a249743cbae191d335ddc017c6606214b147a1700bfbc5ac88796f8f2c40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b98b3c1fa5ce2376c5ddcefb937a68d1
SHA14c9b6f37d33d9bccfbb2914026d25d27205c1a5e
SHA2566a0be78757c60015c51fc360d7567c72cddc2c9b5b1531bb290ea1ddb1315f7c
SHA51280fb37f89473b39b9896ed8529d1357d9c9461e1fde4a8b64852bd7269bac1f7d81ea8d7d84c900bd02ad5f37de3f8c1ed4b1550577a1913abe301107a38d0ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5640ce0880e742e040503291b1b7eb66e
SHA1cb40b07eb5660d6dbca55bf6a5b5f206a6af9f85
SHA2563132077ca2c559d38ebd5d3332dd7e36b34405131faf1345c2001286649b70eb
SHA51270a084be1d5b5cb9ff9f1daee9d2ae72cea27d52735aa9fb7c24b6e466ccd9fcdd2c757c48857b04f03748e41cd8499a4b0ba64eb416bd48ca3714fb716d43f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e21c7b87a75f19a81e0962ad784aa9e1
SHA1af383b0f15fc4e00c9f2a4d8f1805e651818c6bd
SHA25620a95369a7bca4a85ceffe6dd9147a6128272b71a1a2ee7c88e7bae75b4712a7
SHA512f59f1f397f26e7c07bf8e68bf20d21c4673dd32c5f754b428fc958b1a1cee3641017e9378fac0ff230f5aa05950669980f29e0219060620139d61cd469bc8375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539ff1ea96555fdf34c7e4a6acc28512d
SHA13dd39387cb102f5d3f6837edd7a86d3af658c73a
SHA25639c5665d4461f402e4526b3b5a20732509a0ec3caa5c75f3d5652edfeba3588b
SHA512de9c47fbd825161589c2681cf834b7b9175024990752dabb8e3f5dc7c5fbaf61e06d72b397a794628fece0abfb55c258c7ea35fe0f3fa47f06691c4f9b0e231c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591d10bd7918d846dce4abf56182a072a
SHA18d1cda9e0630839bc258efc6e521bcc8d8a380d7
SHA25666042af23e6cf78f8eadf227cc5d56d09c9435c26433da257592ac5e5fe9ab46
SHA5123703afcba2cbe33a9775e5dc6bf46df8a3bafd93ce8da1c5cfd407b25ca5c73309950eb30a513806b08fb2c3a2b29db3670913d9ab15de098452c6d1b486b584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1168b0bbda4ade4754c3edfae1075c4
SHA10ad99cedbe5719115aefc2167c490f55245a3134
SHA256ee2805ecacedf102b822617395625ebc5ca94f364a6c0d85fd61727e96c288b5
SHA51275e416959a60398494135f40db83cc3ea2bdb23240bf38e10203050d38426bce946da56595acae3a7f4e9d38468561c0da705ac491f5831957ee00c4831ac64b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c6df412bacb29b6f47a724d1f6bddba
SHA10df21a1323c2ec963f6e541a68a4835ab19ba107
SHA256153bbd5c6ce16f9c9563743ba661154496f86feaac1205aff8e5175b3a6477f3
SHA512db680791eb7d254a1c2030922e949fcb6fe41c39e0fcdc0ffa3ab3a5b62ef70fa1e01afb697d44db96cfe17873a5c7304b9f6f8533341260fc95f9b6f284b593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc40fd0153709af07e9ab130a60adafb
SHA186a612933bb2cc8b7aa31ed96337e55befe40380
SHA256004aa9be909a60a00ff5b0f8d6502175f394c76972c87c6c81c5c02cdc20ad0c
SHA51246c15d4680217a7e701a5bc07ddad696c950bd2e6f8f4473b6270eb3ba99ab50cbb5ec80423b0380d12aef313378fb318ccf1c884ade9f3ff7a6bc041993644e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56533deaaa4c3f9b3fbc9aff9029c5b07
SHA1ccfa13cf13dad15e25f31630b4ce50af0b188df0
SHA256bd7140ebe3af15412f6707f79835bd146fe0fbe3100515dda06cf5e2ad725378
SHA5128bb6751a2f78be86d66d19690765dda91830736a344d4339a52fa70e88131ebb5e439ec772fe4c086e3c5c94aa7774bfc887b5b09f767c2cd809525a721e375b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5717e5287a67d92723c5f47441e268d66
SHA174e1dc1071d60856c35d602774810a943ed4b323
SHA256eee197fb6058e6d3a837d65b7be19c0c53d978b91480c561adadbf5d3b573de6
SHA5123a818d5abbd96429ef03529a73112d833499db563a6a9b07a4994b5a8ce47cf3e219e9ce56c38c3afa9924b9714be9248245c0622b9eb31efc1b3fa83a3c1e9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcdbe1322e15c7505b02c30838361055
SHA10b3b59fc665342c7f3997110672283bdb02cb2c3
SHA256c8e38bd40a44b7a9aaed640512dde5caa09c9b94713cc1be5c53c12498fed53a
SHA5124d2797f15f66727c4e03a246b8a40d5d856099a704331f11375c9a564ccf77792b5ead0d3172d0dc4899f286539600f1fbfa102a814da45aad3026ef10eacba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffac213b795774b67cd0347afb8d716e
SHA16849bc917980077e6f69dd68ee79a0903b660bfd
SHA25681b0a8919485fa293a57f451b26acd0f64db1878f82a8df9473e6049a30a576d
SHA512fb351320ecff9e763d10cdd8c170faca7c5e45eeaa43a0b79df74db8bf77eec18f3295422463787f3419549ec458a9c60659a367e939edcf28b35211bce1bb50
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a