Overview
overview
7Static
static
7K-MeleonCC...al.dll
windows7-x64
1K-MeleonCC...al.dll
windows10-2004-x64
1K-MeleonCC...lt.exe
windows7-x64
7K-MeleonCC...lt.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3K-MeleonCC...icy.js
windows7-x64
1K-MeleonCC...icy.js
windows10-2004-x64
1K-MeleonCC...efs.js
windows7-x64
1K-MeleonCC...efs.js
windows10-2004-x64
1K-MeleonCC...col.js
windows7-x64
1K-MeleonCC...col.js
windows10-2004-x64
1K-MeleonCC...ils.js
windows7-x64
1K-MeleonCC...ils.js
windows10-2004-x64
1K-MeleonCC...g.html
windows7-x64
1K-MeleonCC...g.html
windows10-2004-x64
1K-MeleonCC...b.html
windows7-x64
1K-MeleonCC...b.html
windows10-2004-x64
1K-MeleonCC...s.html
windows7-x64
1K-MeleonCC...s.html
windows10-2004-x64
1K-MeleonCC...ty.dll
windows7-x64
1K-MeleonCC...ty.dll
windows10-2004-x64
1K-MeleonCC...ps.dll
windows7-x64
1K-MeleonCC...ps.dll
windows10-2004-x64
1K-MeleonCC...ll.dll
windows7-x64
1K-MeleonCC...ll.dll
windows10-2004-x64
1K-MeleonCC...ig.dll
windows7-x64
1K-MeleonCC...ig.dll
windows10-2004-x64
1Analysis
-
max time kernel
139s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 20:42
Behavioral task
behavioral1
Sample
K-MeleonCCFME0.089/AccessibleMarshal.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
K-MeleonCCFME0.089/AccessibleMarshal.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
K-MeleonCCFME0.089/SetDefault.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
K-MeleonCCFME0.089/SetDefault.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
K-MeleonCCFME0.089/chrome/adblockplus/policy.js
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
K-MeleonCCFME0.089/chrome/adblockplus/policy.js
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
K-MeleonCCFME0.089/chrome/adblockplus/prefs.js
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
K-MeleonCCFME0.089/chrome/adblockplus/prefs.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
K-MeleonCCFME0.089/chrome/adblockplus/protocol.js
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
K-MeleonCCFME0.089/chrome/adblockplus/protocol.js
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
K-MeleonCCFME0.089/chrome/adblockplus/utils.js
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
K-MeleonCCFME0.089/chrome/adblockplus/utils.js
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
K-MeleonCCFME0.089/chrome/buildconfig.html
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
K-MeleonCCFME0.089/chrome/buildconfig.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
K-MeleonCCFME0.089/chrome/ietab.html
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
K-MeleonCCFME0.089/chrome/ietab.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
K-MeleonCCFME0.089/chrome/plugins.html
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
K-MeleonCCFME0.089/chrome/plugins.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
K-MeleonCCFME0.089/components/accessibility.dll
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
K-MeleonCCFME0.089/components/accessibility.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
K-MeleonCCFME0.089/components/appcomps.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
K-MeleonCCFME0.089/components/appcomps.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
K-MeleonCCFME0.089/components/appshell.dll
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
K-MeleonCCFME0.089/components/appshell.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
K-MeleonCCFME0.089/components/autoconfig.dll
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
K-MeleonCCFME0.089/components/autoconfig.dll
Resource
win10v2004-20240412-en
General
-
Target
K-MeleonCCFME0.089/chrome/plugins.html
-
Size
5KB
-
MD5
3a1dd546acf9b302b3b0492a2b630c2a
-
SHA1
378e117a3aea6a68d782cbe41d5e0587e8f31827
-
SHA256
6d6c31dc91580bf5886f554d276fa3946a74a60f5cbd62d9fdcaef56a07d5d53
-
SHA512
0dccbfccf4b128bfbea1e46b8eea8b5f1c34338ccae02f9a022be5aa15bd8966922bd204fc88c4de45172bd8e1ee0a44d088f3fc038a9f2db7b9e22220636932
-
SSDEEP
48:cVmIAqyc6QXJZn3xpP+DUu8SKbp3XI/Fy6K6g5rUKQAAnog+ZS+SkT+dMYXob9Ip:IA0XJ13xp+8SQneFyVzEAAogWSyToXV
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 707d552c9a92da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419721223" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57BC8301-FE8D-11EE-9371-CAFA5A0A62FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000067afb9ca3bd34fa7b8a7ac10fdf07ef20af25bc43745c58653ac2c3f56b5caef000000000e80000000020000200000001b02ed239330ee16c43071c109a5d642f1e8241d5861b51f7688104d498e62472000000066949c4d8a17a22a6bea4716a225011363cd8ef998fc384f22dd5592ba185077400000002411303e4c815825472d968ab75d524eb20f9f2ce6562ce73355281a5dc1119050afd0fe4351d97215a69f8fee1084de8c29cd60ac33dc7c52452ef3ad29b2b8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 860 iexplore.exe 860 iexplore.exe 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 860 wrote to memory of 2192 860 iexplore.exe IEXPLORE.EXE PID 860 wrote to memory of 2192 860 iexplore.exe IEXPLORE.EXE PID 860 wrote to memory of 2192 860 iexplore.exe IEXPLORE.EXE PID 860 wrote to memory of 2192 860 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\K-MeleonCCFME0.089\chrome\plugins.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:860 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
304B
MD5fec86331fceae4af3abe25c1af2d3a96
SHA1e38467cd735a27c0707e4beda0d5505e93bdda70
SHA2561eedc4de73b0bc3617a659fa96814d0708e9a80ba06993a7b41a4aa4f7a938ab
SHA5120894f28cbf5773c774fc2c40ea2938543e56782d276d3f8535dec804be89d152027e41e2946c5a0ae25875219b194474253db05e7cfe96e02c8490e4b938ba9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
304B
MD535816876698b4001a0731058369ac5e8
SHA1cbc921152cffb7628422ab57d7e04ab456d6bec9
SHA256ff91c290fa5090b6233cb091868e6a6c5e72e1835c3e0800fff076418e1ea2e5
SHA512c860d3f6a14a0592404d49ddf4b8085be4c20a55c81b59d98873a3fea3e732eb4921a294660334a7be7d2735fc718ee705e3fe54e628119508ec987f7dc25331
-
C:\Users\Admin\AppData\Local\Temp\Tar9008.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a