Overview
overview
4Static
static
3AzSetup.exe
windows7-x64
4AzSetup.exe
windows10-2004-x64
4$PLUGINSDI...ML.dll
windows7-x64
3$PLUGINSDI...ML.dll
windows10-2004-x64
3$PLUGINSDIR/INetC.dll
windows7-x64
3$PLUGINSDIR/INetC.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...er.exe
windows7-x64
1$PLUGINSDI...er.exe
windows10-2004-x64
1vcamp140.dll
windows7-x64
3vcamp140.dll
windows10-2004-x64
3vccorlib140.dll
windows7-x64
1vccorlib140.dll
windows10-2004-x64
3vcomp140.dll
windows7-x64
1vcomp140.dll
windows10-2004-x64
3webControl...g.html
windows7-x64
1webControl...g.html
windows10-2004-x64
1webControl...x.html
windows7-x64
1webControl...x.html
windows10-2004-x64
1webControl...one.js
windows7-x64
1webControl...one.js
windows10-2004-x64
1webControl...min.js
windows7-x64
1webControl...min.js
windows10-2004-x64
1webControl...rap.js
windows7-x64
1webControl...rap.js
windows10-2004-x64
1webControl...min.js
windows7-x64
1webControl...min.js
windows10-2004-x64
1Analysis
-
max time kernel
144s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 19:31
Static task
static1
Behavioral task
behavioral1
Sample
AzSetup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
AzSetup.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/EmbedHTML.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/EmbedHTML.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/INetC.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/INetC.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/downloader.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/downloader.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
vcamp140.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
vcamp140.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
vccorlib140.dll
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
vccorlib140.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
vcomp140.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
vcomp140.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
webControll/index.debug.html
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
webControll/index.debug.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
webControll/index.html
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
webControll/index.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
webControll/js/backbone.js
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
webControll/js/backbone.js
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
webControll/js/backbone.min.js
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
webControll/js/backbone.min.js
Resource
win10v2004-20240412-en
Behavioral task
behavioral29
Sample
webControll/js/bootstrap.js
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
webControll/js/bootstrap.js
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
webControll/js/bootstrap.min.js
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
webControll/js/bootstrap.min.js
Resource
win10v2004-20240226-en
General
-
Target
webControll/index.html
-
Size
28KB
-
MD5
1c8d91ae52e8d5826a56d07c4344ace0
-
SHA1
bc0b0e5533eecd6f9d259b8018dd18892381d228
-
SHA256
f813414226b020ac17e60944966d96422873bb0024ba6d27a5004948ee440b58
-
SHA512
9596861e9a31291f5793f0758a85a3d2417e45cf0017dd2d01c01fb524551e1953db3b1b0f3bba283d9843faabb07646f2d7c0b3afa41ec115d792377dd56641
-
SSDEEP
384:tqcq0aWA2p7Ed822KIR+TQKCY/26mFkF9eMh5kuMk3IkrIkZIk/k34qsgtLIAwBn:UTWAld821IJFiFXHbjRnp+8Koz
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{914F5B61-FE83-11EE-9F3E-D2EFD46A7D0E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000066c1fb0796db5412f0863d316188408ff9c2f95c2b881a794afe76326948ffd4000000000e8000000002000020000000b07bcd802bbbb5706923e12eb103813835c84356f7bb20c4e115767b5dbaf34620000000cdbf67ed3ff6b5f55b4a86bf6844df51e19069af13ab483421c55662da6ed7eb400000000328fd274f0ad35aa9a0852c17734d3a92a54a38b8218a8dc959ba3fd3cd66fb07685bee1aa3b1f86ca7bd63bee7ba377c5cbef71bd0cf482220655b8ed7084b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80ae83679092da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419717027" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2440 2204 iexplore.exe 28 PID 2204 wrote to memory of 2440 2204 iexplore.exe 28 PID 2204 wrote to memory of 2440 2204 iexplore.exe 28 PID 2204 wrote to memory of 2440 2204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\webControll\index.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568e6b512d7b645c5168c5f74151b7917
SHA16bf877bdabd7e2dc9e005f1d1a80d987887e880c
SHA2568b44ffde6184f53815fd1b06ba8b5c3534f0fdfdde85e41a4fabb966b3d88cab
SHA512312d53ddde89ae2ed697980cb4918446221dd842b755cebddf7e029ef0625a4f0637c952ccd40e2fa255162d5324d5a2e346f1e3822a9374e6d18957a93f2a93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e10ea72dbe72d08e4d781922961304c6
SHA1fce3de671ed161686da5b2d182a0cb481d8f0438
SHA256d04221dbc4b8706529ff6212061a9275b190a429e73f6bffa0e5ee1e859ce747
SHA51239a9b7951d646a73c7f01399c32624ad1539aa439a9adf0823517ca12e4053f2ad2ddae9e4cb36f509eb580112baa079389608121e7b9f5028d333a0971f84ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3476115fd260750f2632c2ebd57d1e4
SHA1d9ab09f5d0b6ddd0b6f22fc0eeb71e9f60c2f90c
SHA2567bd693c5106379358ee94fa93bf02412927435b7f01deee94cd7c493af3f5bd8
SHA51235669179e34989334b5fa2490533423350cedde702f699add8afe1764ab53ef6ecc4e61b0576a2d75657fec0ee6b08ec35fcf622b3863cc90419037cc7a4c884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0c3eac8e019d787bdf58879d1618950
SHA108ad9d80fd472d917c111e3444a7a05c2784b29a
SHA256918326edee0464d47a8b305b00ed55f974de76395804c02cbcb33eb44c84ffe6
SHA512c20a129e6af6bc0e3c332d1479b52551345f04468633adcad2d039d797f14a6998aa21dd16226d1a51d671eb734235c657648943a7ef68a64f6a53e1572c5d60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513950e1e23fdb6f3dff0ea42dcd635ad
SHA1ffee552ffe43b412d35e31ad8631766e2427c45e
SHA2569c9c3415730cb80f8a60ceb64f1f2a335e8370a8fa72195cc31e05d23b22b48a
SHA5122ce1cf9115ee0497872dbd2a5e0f9081d977cf02ef0388883335f460652e5f81ada8e188f1f5517788736221b6d1333bde4bb620e6badd8a85a61885e03da17a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572f4bfa641c6ab42aa53101208d30792
SHA1dc198389c698ecb0f52da94b5247db3c88260c7f
SHA256f41aafe4f9f2cf87f9c7cc91f9b4aecdcc0224357ba5df330f0ee06a9e0211d6
SHA512f17cd8264947a4a727346e20a3eafe15798f7f4972480ad5eb4e19e67d5a9f00344e7d742b6fecfc2ed6c2d9cfcf74e9cdb94c46348c46bb81d55ae9d62875a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59da4a9c0875f2a493cf026b8661d21c3
SHA1de690874324878b1d942bea307fcbb3d28986a78
SHA256954efe791f66794b419bfb840c7337542430cfa222fa249a3204c3977c0bcbb9
SHA51214dbf74b02d97ea5a1167d9e1694403240372c82ca0d0066cd64ca869f4cc6f1449062226048671b71673c74256a78509091c6ca946368b1051c9e3c30303406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de33d7a3631d4017fc1e95b1dfbd49ff
SHA107c06536b791d43481a198d1c7ce19fc62db9325
SHA256ae31374af5ca36b32e4900d5b3695fbcd417504cad92d6169a2e24dcf0b7136b
SHA512fd41cd3cf8b8875bd7c74a411a92c41dc7e40c1a0fdb51dae3039a23281749a20caf259717362be0c90e9119c439bc8e127dd64df6b10fe58846485fecab3a15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549b9f60cd04d45454f198806c5de298d
SHA1d71d27a7dfd3c27babbaee39604497cf448f34e3
SHA256e2e542f22633c4d106626c87728713a698e9389d8aabef238b0ba82b5c039866
SHA512d17b9453845b845dea76abfed695c5b891270409f6f6fdd4558c22dc5c6d81165b347114f932ac514d532d5b9ef6ac9ab021c2b1ae72264b4eb8d552f344d640
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a