Overview
overview
4Static
static
3046d-uipak...1).exe
windows7-x64
4046d-uipak...1).exe
windows10-2004-x64
4$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3html/download.html
windows7-x64
1html/download.html
windows10-2004-x64
1html/finish.html
windows7-x64
1html/finish.html
windows10-2004-x64
1html/welcome.html
windows7-x64
1html/welcome.html
windows10-2004-x64
1js/IE9.js
windows7-x64
1js/IE9.js
windows10-2004-x64
1js/jquery-...min.js
windows7-x64
1js/jquery-...min.js
windows10-2004-x64
1js/jquery....min.js
windows7-x64
1js/jquery....min.js
windows10-2004-x64
1js/logi_helper.js
windows7-x64
1js/logi_helper.js
windows10-2004-x64
1js/logi_helper.vbs
windows7-x64
1js/logi_helper.vbs
windows10-2004-x64
1Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 05:47
Static task
static1
Behavioral task
behavioral1
Sample
046d-uipak_x32 (1).exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
046d-uipak_x32 (1).exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
html/download.html
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
html/download.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
html/finish.html
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
html/finish.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
html/welcome.html
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
html/welcome.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
js/IE9.js
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
js/IE9.js
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
js/jquery-1.3.2.min.js
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
js/jquery-1.3.2.min.js
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
js/jquery.quickflip.min.js
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
js/jquery.quickflip.min.js
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
js/logi_helper.js
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
js/logi_helper.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
js/logi_helper.vbs
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
js/logi_helper.vbs
Resource
win10v2004-20240412-en
General
-
Target
html/download.html
-
Size
5KB
-
MD5
8b9eb8db472ebe5f0433af26dc7d676f
-
SHA1
bc2720bd4ff07615f4811450045d0b3b7403f30e
-
SHA256
5b29978827b527001ede12d08281c36cdcdf7c3d228b91166893285fcf7b4634
-
SHA512
6d1fe1179743a99581171dc007d754c01ba7f516032d7e828dc6bf56d385538233095c30426175d84b5c1b77a08818afea116912d507e94192ff9b85f56c7c43
-
SSDEEP
96:x+ekouWbM2UiWy0ISeyvKJQweV6VgxRSyAjwImpKK+bpdC9Qit4H5vKjDltM4:0TouePn5BXJUV6gxUyAM3SPC9jt4HtKP
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000fc22ac3d6e80d07a31c972cb20cea68472cc07435b9a32c048eed38111037cea000000000e8000000002000020000000c67d9d19b4d7d8824d8c63523b4ca1e6ad2f889753e7139ab7fc797825cbe72b20000000c93503b7e4059136f635da872b22ed135b0aaddae25cb10f2f64a8b4ca246ecc40000000c6080f86e356cf5b8e0e9ca5f2d428ac592263ede1f3966dd9484a3fa815dc69f2ed1ed8b328488de137f8d41510f5331402d0b71e87b60cd342ac7f79d5ef64 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4022d990af93da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419840358" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BC491111-FFA2-11EE-9CE2-EAAAC4CFEF2E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2020 iexplore.exe 2020 iexplore.exe 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2020 wrote to memory of 2976 2020 iexplore.exe IEXPLORE.EXE PID 2020 wrote to memory of 2976 2020 iexplore.exe IEXPLORE.EXE PID 2020 wrote to memory of 2976 2020 iexplore.exe IEXPLORE.EXE PID 2020 wrote to memory of 2976 2020 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\html\download.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517e7880002c2efa457e8c2daba2cdbc0
SHA1c8ba9ac3ca09c9a8be7272ee91ec49426fdd9648
SHA2564c9532e246a5972ed77f17aa6d6c7662cf04a19974c613f9e2d82c69faa665f0
SHA5124c72deee8397e6cf75760cb0f313141d3707f38675fcc2a2496bd5c687cdb8087be037b068f4c85129fcf4e329be55df4b0f032bb8f3f8962d3fa5599daf4e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5686a6c02cb44b1d6783fef5bab7449b5
SHA14ce5debcb91599c1a85ff25fb66df53b61cea1fb
SHA256efd03971823b633f3d6e9a88a62a141a8363932c6111401d1cb3342a32b086d9
SHA5121c4febabd5081df4f8a44abcd5216cc9698f33630da8db970c1ab831a05cb6a01c018fe783a16522068b6a5bafd0db30535da5e121461a0df576d11ce32edcd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dca7de59e15ba96f3b5d22b5258ce9c9
SHA1c549fb00c835b1ec8697a8cff1b561d76e78a844
SHA2562d68d3dcd842e468ba9abf2667ffad0ddc418da5a739a9856c6f9b713b765961
SHA512a971a533b52416be62788615df004edca559c3c2848f6c3bd06905a73245cf21afa96460a88772e186209e0edec04808a27d2557edf5e6dcdf7d932c1dc1a5f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581612e3331d6a5ec7cd96d0ca73efd49
SHA162800349be2597c1c4daf78de5909f570dc5f46f
SHA256dae386362f55bbae9886086dac5bd8e34c0785e14aee3e90572bf570447901e7
SHA5126ef12f90f0e9905aaa1a06c71998cedbb75076eb7b8d5819ceb5dafc67d743c20d1a40c44f8ce907dbcda3ffc4d6095a766eaa5a27947992eeda26921f2469d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53572a63519bff5ed8d7805d4176c4464
SHA1fd8e4e3f4532ccb28a56336f8fe1e318a311a351
SHA2564eb0183f00436b7949a5b8ed58a8ccd4381163bed1f0c71462a0201fea7f27ae
SHA512ad5ce7ec8da326a9c8240518313815aebfa62cd25af5d4db23f8a91272a0abaf718f915348d53d8ab472e972bd3c45fbf8bb601fb0befa01f9de7a64fd15e22b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b6f66ce80057949a452506eba3d4875
SHA16e10407b0a2da4d5808c17cbad765c26dab73e98
SHA25686c1147a5ccae7609253cf85028697ab4a26c7028245ed4d27b1fe60ddc2ca47
SHA512477b951d162dc3147751ff6d5343c601ebee34bd9def71c90774a6b5107176575283a867d05a0000865fdc86526ef4a87dac8f45c233f0d578007a8f5ed30793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff6eaab01e6826424be5f5260991ff0c
SHA117e70f7189e14e14698567d76266886c58e714eb
SHA25653a73c9b5db0d95e0fb9db45c7e1987361727a27a7365143d0b3427df7dc1878
SHA512804d60eb8ae901cb8b91c9ae463b14444b1450f91b781a24dbc262a2de3ff06955b135a78eae1bafe17db0c2ad8fc91d963171e2cc41729a6219a01aa3a07598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514d5b3ac99d31391cb553ee939574f5d
SHA130ec9347eed104f7e0dd04def71a5c93fffe265e
SHA256f732052c3067f273c311e0c59ff8d2d5d6941c3024e61d2c9b3c7d9a72de30d6
SHA5129760a1975c4f80cbb7933717837a8245059a5dee607bc243cdacdd80145b975fa47650678d43f88a6d3bb78c5110e43795a49efea17959c80ddcb3eb9edc1302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570ecb529bda907676b1f3b56698e3ade
SHA15de5f20c11e6df6bff4b6be1637cee188814857f
SHA25693b7e702c61cfe99836d16083904c47ecf6e7de27537b852647be1754d4436dd
SHA512306f3d10baa7dfd91891f3a2b476a14a9f7562323a8beed143bd8b868b7bcc7fce38514db7fd6b72f04f9685363b19d202575e65a8a5cd0395c39717e3182e93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519e57551b2a2512af107159b6c1161ad
SHA1ceb0c0e71fc97f3ad73c05d7270692282624047f
SHA256bf501e9d72a4c4072cba13a026a9deb0cf18903271e2ffecdaf83fc6c4d6f149
SHA51274cee6abbff31c4db8864d656da27c47f9f5b6f36e905266d3469a6aac2bea6c361ba78061f409c70781b205a129e7cfdeeb53c3f7e52aaaa7cd5db0ac244e17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7cfc53fa0f24fe90e63511a73132476
SHA1d87d78199efd8a1efa32fc4b213e35e6de430d3f
SHA25680ae433e26cad84577842bda6fcdcc2c0f84838a412d0f2646cc8b54944fb906
SHA5122ab56d3683cdc0e79221b01ed83f605590dec91873dd208557873f1ca9068a64275de906e8f0354bacae4706ef223ea86d5cc3540b8c5b746a8c520605c3dd3a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a