Overview
overview
7Static
static
7K-MeleonCC...al.dll
windows7-x64
1K-MeleonCC...al.dll
windows10-2004-x64
1K-MeleonCC...lt.exe
windows7-x64
7K-MeleonCC...lt.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3K-MeleonCC...icy.js
windows7-x64
1K-MeleonCC...icy.js
windows10-2004-x64
1K-MeleonCC...efs.js
windows7-x64
1K-MeleonCC...efs.js
windows10-2004-x64
1K-MeleonCC...col.js
windows7-x64
1K-MeleonCC...col.js
windows10-2004-x64
1K-MeleonCC...ils.js
windows7-x64
1K-MeleonCC...ils.js
windows10-2004-x64
1K-MeleonCC...g.html
windows7-x64
1K-MeleonCC...g.html
windows10-2004-x64
1K-MeleonCC...b.html
windows7-x64
1K-MeleonCC...b.html
windows10-2004-x64
1K-MeleonCC...s.html
windows7-x64
1K-MeleonCC...s.html
windows10-2004-x64
1K-MeleonCC...ty.dll
windows7-x64
1K-MeleonCC...ty.dll
windows10-2004-x64
1K-MeleonCC...ps.dll
windows7-x64
1K-MeleonCC...ps.dll
windows10-2004-x64
1K-MeleonCC...ll.dll
windows7-x64
1K-MeleonCC...ll.dll
windows10-2004-x64
1K-MeleonCC...ig.dll
windows7-x64
1K-MeleonCC...ig.dll
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 20:42
Behavioral task
behavioral1
Sample
K-MeleonCCFME0.089/AccessibleMarshal.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
K-MeleonCCFME0.089/AccessibleMarshal.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
K-MeleonCCFME0.089/SetDefault.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
K-MeleonCCFME0.089/SetDefault.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
K-MeleonCCFME0.089/chrome/adblockplus/policy.js
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
K-MeleonCCFME0.089/chrome/adblockplus/policy.js
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
K-MeleonCCFME0.089/chrome/adblockplus/prefs.js
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
K-MeleonCCFME0.089/chrome/adblockplus/prefs.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
K-MeleonCCFME0.089/chrome/adblockplus/protocol.js
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
K-MeleonCCFME0.089/chrome/adblockplus/protocol.js
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
K-MeleonCCFME0.089/chrome/adblockplus/utils.js
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
K-MeleonCCFME0.089/chrome/adblockplus/utils.js
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
K-MeleonCCFME0.089/chrome/buildconfig.html
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
K-MeleonCCFME0.089/chrome/buildconfig.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
K-MeleonCCFME0.089/chrome/ietab.html
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
K-MeleonCCFME0.089/chrome/ietab.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
K-MeleonCCFME0.089/chrome/plugins.html
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
K-MeleonCCFME0.089/chrome/plugins.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
K-MeleonCCFME0.089/components/accessibility.dll
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
K-MeleonCCFME0.089/components/accessibility.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
K-MeleonCCFME0.089/components/appcomps.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
K-MeleonCCFME0.089/components/appcomps.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
K-MeleonCCFME0.089/components/appshell.dll
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
K-MeleonCCFME0.089/components/appshell.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
K-MeleonCCFME0.089/components/autoconfig.dll
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
K-MeleonCCFME0.089/components/autoconfig.dll
Resource
win10v2004-20240412-en
General
-
Target
K-MeleonCCFME0.089/chrome/ietab.html
-
Size
593B
-
MD5
f8ecf547827acb95cbca5429d773c247
-
SHA1
445837bc778bcb084f00e5edc0fa3a20dd221125
-
SHA256
7e8daba2a5d58b0de92f580e1add4e80156279b37f3c4d2718989e6aaa9ba542
-
SHA512
3249d9bb4c31054eb5e8fe7bb85f0e628a208991717fe429abc88b7be8e5f4fb8912be9c50b38bcedf08efed8f2afa6b7bc39071d5ffa6788b16e1537cc99abc
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30d12d2c9a92da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57B16F11-FE8D-11EE-8178-52C7B7C5B073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419721224" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000dc4834504f82e2b804cec230b8897ab186bb9487c07d5d07f753035852e60511000000000e8000000002000020000000337d8bb7839a361ea254402ef58b77c2eb081a77a7c753a6a44aea2b55842431200000008f35a58c3e637404dd5617fcc1b8741a80eddb3270acf1c051f93ce24c2d3da3400000005762a4ebdd8cc8f3b524a7ed3cb14a6e1f28762a5e2decf2ba73c25ad4b07b06f1900c452d7635ca878802012ec94d9cbf9e73b5802e547adb560798e2c35460 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2784 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2784 iexplore.exe 2784 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2784 wrote to memory of 2780 2784 iexplore.exe IEXPLORE.EXE PID 2784 wrote to memory of 2780 2784 iexplore.exe IEXPLORE.EXE PID 2784 wrote to memory of 2780 2784 iexplore.exe IEXPLORE.EXE PID 2784 wrote to memory of 2780 2784 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\K-MeleonCCFME0.089\chrome\ietab.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b797ed78a04556815109d822d6b3f7d5
SHA1aa7aad6aa54461fa613ea99409f62afa8ea8082c
SHA256b36d97370e6bdc3e1f1d87f4e10694c33b79932a13b3153d9acc6693edc2e34c
SHA512ab2f36571305c39382811180ff600519b781c26ac4a49b18641010ea3db2df8c28b1338e64fc0487f78792309589fc8b81815da29918984f7b5e7eb7706ccb39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e44ac2361633ff24de38883c07049eba
SHA10b1a8a9c9a4e7df51f55bf5bede3a9e1833a08d6
SHA25623c8a0e0eccb40cb587899ecf0c1f0c13955eb5bdc1296d63e0386fd06d5a80b
SHA5124c4b91dff6c1b431a9e9e7cf1ec4a428ac9895e84f8c7b7631530d3ff679da9cb85b4f47f7fd3cd29a54845670740e428fcb1eec84f781b0f435694c366b51d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD515ae361846d4916f2c9d68def967961b
SHA10a840b3978887824a4e76260b16301ac292a3ea5
SHA2560b35d80c4b84fb2acd3e78460945ad2ed9caad095528d680fc395ec1f1e91a7f
SHA512e3a855311373c2c4398d57da37877b570dc88ee68fcb867a57718829e34681a3a5bac6f5c70fc4e88354a4728ea6406e7277f8af96c6cbbf37d40aeeeaaaaea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5443f2cc61e793f6ddb28f6237baef31b
SHA17f9eddb4629cf42161ca40494846ed645c5c526b
SHA25688d9bfcea656ec8a7f4c69e2f9a660eabf6cecdaab32c7bccef8342e48d7570a
SHA512495727b1a596540a8a75e737fcbfc96c6b23c13a588abf18c9382cbedf691342ef9254fd3b7c320b94ccd122749d46268dc19957dc961af98fe6cf0f49eb6525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD574664e5000c9ab6493400d12249ee09d
SHA1e54d235fe0fec987896695159edc0cef7f7e4351
SHA256269443dac6e5ef757076a1b32972e0bc5b5d55f479f37c5ad470bd261664c820
SHA512178064a001d47b8af85ebea562022b21430e7ffb711502b715873426fa207badef7e8ae1a05fa24a627c81d94905a2927f9eb1df705759969fcdf94eb6cd755e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e7de91cb984c103217b2cdc071c2c5cd
SHA148b6414f0bb5cadc531c4989f490a888adc29ca0
SHA2565e86ac078e9341a3674e06cad86fad74b0158018ab46b9e3b51d627f5e90ccf0
SHA512ce9abd8f8400d9ab3c330e6c3181e01c594e16bfb351d984f4434367baa1ccdcb95365e4f7f2f3b6b614db5d94ebc16cb552b5a3838166d3730649b21cad1f2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD526bad6238ce457a5d3ac78b28df8dc85
SHA1f9241c125e452ffe969e40ab7c67e529dfb2e9e7
SHA256a68c13fdb704d76fca47d8ae127e8987a84c49067b1d5016d57de232eb1aebd6
SHA5128f6d02efcf9da10b804afdf03cf464a9a3a140c20cb8f3ba8567184e36af3736f49001746b58713e985847a95c924523d45ffebddb4ebaebaea853ed5c6e9f32
-
C:\Users\Admin\AppData\Local\Temp\Tar3D08.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a