Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 10:47
Static task
static1
Behavioral task
behavioral1
Sample
libscale_plugin.dll.svn-base?id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
libscale_plugin.dll.svn-base?id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html
Resource
win10v2004-20240226-en
General
-
Target
libscale_plugin.dll.svn-base?id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html
-
Size
196KB
-
MD5
254a2e19773b0cddefd05db5d686863b
-
SHA1
60d9eaaf40e947cb6ede43b8c5c46b82588f2886
-
SHA256
b40cb0300673822584791e124b5960d23f4216ef0efcf441448c3bb7a6349144
-
SHA512
6763a23e0a79cacceef7de22ad095bee8a98a9fbe51f2a4faf189090ded1ee8b62d9eb240806c38cc6c0ae9efac30c4d93429bc688fab081f8d60383a29a4779
-
SSDEEP
1536:qh/Zvh+u9UzacTWo+VKCYIqnMk5E5ruEDYxzGcxQ3tXFE8B:qh/Z4oQM5LFbSzGttXT
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d08c694c4792da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419685625" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c23067700000000020000000000106600000001000020000000a039eaf7d812d64a4a1456e29b901c5c966d251382141c723c179dcf3ad7702e000000000e80000000020000200000000c30a7265306e751e8be52112f4aa9ec2267dd38cd4deec3fec2049caa34c31520000000198ab6ed01eb79ca4fada7b93ad31d4ecfd6b84a7d9b5b956bca3744c830532640000000122e4552ff4078ae6592f5c3cb3f3db92ed0aa35ab225808629c7621ac8dc351ed58b88eb2818ce34a4cbaf79ee8cf850a3c4d690c74c430f5ed7b9bfb907f74 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{772805F1-FE3A-11EE-8884-E299A69EE862} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 1708 2172 iexplore.exe 28 PID 2172 wrote to memory of 1708 2172 iexplore.exe 28 PID 2172 wrote to memory of 1708 2172 iexplore.exe 28 PID 2172 wrote to memory of 1708 2172 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\libscale_plugin.dll.svn-base_id=8328c31dba7c71ee20ee32f1a735d639f9e43928.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d33e02e31ae4b761890e361d0b87e737
SHA13f9d5d80cd0934c3adb77224be2e565e222e3c19
SHA256b72aa76fce6e9d55f677934a323158711ad2849940ade9e6d13dc9cb75a00f44
SHA5128078a32f70e807bb2ffacc9d06d5c014f40e9ddb69b364b4d77a83d39b24a8a13d954bdb684eba58b17d2e35408d7f06af3d1ebafdb16fbb2d42d3d5cd0db259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9913ab2059a405d396f195dd603b092
SHA159d86d9bdfb7b5558ef1441468a8895adb11410c
SHA256c43622a687f3d65037e13dab5165db0f4f21eea03a389c962bc02171e6dab782
SHA5121b2329af6459e6dbcd048a5d36fad1a94180a114cd92a3028221f6dfc686916f5586b7410d0bf7636adb41dc470ff6c0c35cd82a5bdaaab47344dd54300acee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c4efc3840a475f5a415697e13dbf31a
SHA14ab98de949802ef58ede9c37d161a33e81fd95ec
SHA25680eadd232395d5689d4e81f1cf67a7cde3edb167a5a45fcfffb5fd13cb993830
SHA5126237bc0b31d93475ae96d090bef1cc3986817e607c19002b460ac4cb10973ab6e3294757725b838fa9d305154d38c21adb7f5bef3418391e1bf24ef706ab1886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0220851b87c50ccfd42edcaa87ed797
SHA17ce44e67fca9411c9dcb21ebd5a8c93fa71a1c3e
SHA25660833272409e8e60ad65dcc54eec4b2be80b7e62b2f557c37a1384033458e8eb
SHA51228271d2d2e80c6b7394335c3d5f8be4b443eb74761c8b7b409b5eb817231ec2c8d35f6b79d8eceb08ee3657c2691807d16f5a04637c1b77e607fc59ec2727c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6fb3e2b408ec2275367db39e66ed587
SHA1c054ce5426595b7d743e92478e8e4c9d842fdf94
SHA2566ddd13c218b2aee692f20c3d09228692f476d2ee791b1ec74f5ffafce2886dd0
SHA5127b4d57de7bcb7bc82fa9faf8614822691958ec45e2287edbeafedadda0899e5af9bb78aab3adc9a2db299d5232e10d25f20d1a11220a01a998db05011f7e07d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584f60ae4b5b44776d83d996e92e53d9f
SHA1a021c3ce7d7310c0a606e2fb522610214f2273fb
SHA256525a17dbf3974db4f0d8c76a17543953028636b86f8ca024c4542a84412f0b58
SHA512aac81ce01d82558c4e564441122b091b90f0522d7e603313e17a238922d6c4183811bacb55822d3ce66a54a95eb0da5a1ef8395f488eb9640a9f9532780e8bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b34c6e9c7e06e1f17d66b40dbdc16ee
SHA136a2144d8897f60e238f5088d2ddb3d76b3b6962
SHA256142e44c9d969fd5d8ad5d0a4b85e201396e7c96b6efeddf8b86175f6144fdc73
SHA5123a37c78a907bbf69813150b1ec0e9a81cdd2891e69987e630b92e89e4726e712c446454e2293ada2c0413cd0454c85ed7a6bedbf2250d4280d58727f5b9e4896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab243439abe8a3e023ddc96f6e311a5c
SHA14a45211cbb0e5822db7c1697a76333a248ff7352
SHA256b704fd3d1b4d1b6258d309e02c9d7273819c584212d90b09d1cc607d3e057d4a
SHA5121a4dba4d9ca7db6ab7bb6912607777b630304ed8eb01d32b2c61fe1e9e769c6e3459e80d5b3a9400a452b62998b3931be1e4858f52a823f1287665029f2b36ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9b2640090cbdcbaa3ea3e90004c66c6
SHA1401227644d58c1e02e14c3b9c2d7acdedffe247b
SHA2563a0e6a34920c26277270d55893aa21fb06717f45ea17511d0758d9c70768898f
SHA512bea432e68b05b3e75e3c224b588c21682c05621a1014ed1eee25d35131466fb174e6882c87b0b8b7a3cc00f028344f9b772ca2abf70b4215fa75bf3bffd1a202
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0936309b12661f49111d32224d0415b
SHA1644570ae0a281c0cfb0e50c503925e2d3bac3363
SHA2564235655fbc3e088b4347a88327ce51932923003a87474187993a80df56bf42d3
SHA5123a1ce14b51427264e0e4c02707aba6852722a3b27a79528be5ceb5c058d03db3d65199147b74985ef8ec0ff68b82e38bffb613860a7ac546952ab4fe14408534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58106c5bbd9621456f7815473d8056602
SHA1aea69590ec8c83fcbea1fe78d4f7fc34e55ac385
SHA256712414757b61276ee8e5f8a2b4cdd0119cf5249af253e03f1c027765246a5c52
SHA51206358bfecf408c48d8fea451a085e0bed5d342fde842f2aff0ea70304fe0b6bbf71f1db23f7c958de326dbe2d94ef4ae4cfa9c13c88c5d9130d9ec8875985c33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b08d5421a4bcd3b94c5ccd2c5f8040e
SHA1104baaa7e1107fcc7aa2362b244b65ef7b6f4540
SHA25671aa2bfa4a331ba4b1b28217b32c3a319392e03f6a2f48b4b5cd96cfd7f897bb
SHA512c6627ff14afdde6e2b7d80e07b05f7e95c4e14a06b07ec022c138104539cd98eea646c64e2516e95dfd219b5075d1c77e1841d2a69687aea75ddbe752d0e4bea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547e5a72ae00fbb3c8de658614a82693c
SHA1ab59e76274a99e7699623016dc73e4aaf9c68737
SHA25611761007a444a9d8c3ca2afbf86631ce3486ae10a928d837025d438259d76a06
SHA512e20bd62c21e6fa5e3055022dbeff9f921787dc3ab54ac4ed4e597e12155799127557591dd6e1c5a4660e862075b33bdcb174ff17f7a47097d97e23c84868d34b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e74f72add731a7a7774c859ae91dadb
SHA16d51eae43d360ab0d0234a68d14bd6b652cff8ac
SHA256171e004ae98b27445cfc87b749f1dc229a07cc247b742e6d3e4e2679759222f3
SHA512a844bf11a5b818ed7f2b2348024ce0cef20d94720281e6f70c93d7c5af08e10af158ead1b223c5b35ee9a3675d47bcd9fd4698a53ff0e9394e2d1b564c410478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac64204c96d3ed7dbb85410f97faa9e9
SHA14edfd31133a5ce836ddc9941d94336fe9882d211
SHA2566bd4f994f3da963690d70e6f1ffb7837718ef18990f47a4542a7520be888e1be
SHA51260e556b870f22cff393d28abbab1af526d4994ca336fefca712e183aeb5caafd7de725f8e66e895739f61d0207c72e35a5aa9e63c41a5c4529fe60df4cc31ca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d72175a3fed77b64bab332a0bd168ced
SHA1e94d5be76635bbbbbdeff6061ee7cea0977d0156
SHA25604be184948ceb0fd0b12ccc55b152d3e438111a35fb322cbb40d0f673b677524
SHA512f45fdca8f7a1e99910472d2998a3c677932a07670d36e2cdf16033abe93f22b8370684966911c5c07e5e661292f83aa0512b8f634ad35355c10805e5a090d6a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cb170a59bcb2eb699b8140e54ef4170
SHA1215263b9f549647bba93988c85be96ae0bfe0373
SHA256ea63ceeb612b51f88c9159c7c8e09c3f7d6c2881f60eaab4b054e71cfb09147e
SHA512a7db29565464a387652a12c4fa0b3e1aa89dfb41bcaf12bf293517532ab68fc3acadaed2aee7a77681526f7f62d073534a969114ce769002ddc4a8d54ba34e82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc9d7105929d621ac8b48dee8ee6d8b2
SHA1ba2f67873ea7c064f24f9c847d9b1cc6355dea56
SHA256ae75b26d5be9a3b5bad50ab15a1572f868212ded69859e482cd077914f91414b
SHA512e7ecf3360cf95ff0dfb60561138622a0bcd97e8f53ba9816e7cbe8e3894c4c407409be832ad2611f1d7b525596fbe8acf0c715638eb8084c6a72bcba46e54f31
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a