Overview
overview
10Static
static
31408_cn_V8...er.exe
windows7-x64
31408_cn_V8...er.exe
windows10-2004-x64
101408_cn_V8...er.exe
windows7-x64
31408_cn_V8...er.exe
windows10-2004-x64
101408_cn_V8...VR.exe
windows7-x64
31408_cn_V8...VR.exe
windows10-2004-x64
101408_cn_V8...lt.htm
windows7-x64
71408_cn_V8...lt.htm
windows10-2004-x64
11408_cn_V8...de.exe
windows7-x64
31408_cn_V8...de.exe
windows10-2004-x64
31408_cn_V8...ew.dll
windows7-x64
11408_cn_V8...ew.dll
windows10-2004-x64
11408_cn_V8...ew.exe
windows7-x64
31408_cn_V8...ew.exe
windows10-2004-x64
101408_cn_V8...rs.exe
windows7-x64
31408_cn_V8...rs.exe
windows10-2004-x64
101408_cn_V8...up.exe
windows7-x64
31408_cn_V8...up.exe
windows10-2004-x64
101408_cn_V8...20.sys
windows7-x64
11408_cn_V8...20.sys
windows10-2004-x64
11408_cn_V8...oo.exe
windows7-x64
31408_cn_V8...oo.exe
windows10-2004-x64
101408_cn_V8...lp.chm
windows7-x64
11408_cn_V8...lp.chm
windows10-2004-x64
11408_cn_V8...er.exe
windows7-x64
11408_cn_V8...er.exe
windows10-2004-x64
101408_cn_V8...��.doc
windows7-x64
41408_cn_V8...��.doc
windows10-2004-x64
1Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
18-05-2024 08:45
Static task
static1
Behavioral task
behavioral1
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVP/Net Player.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVP/Net Player.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR Player.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR Player.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/DVR.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/DVR.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/default.htm
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/default.htm
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/encode.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/encode.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/webview.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/webview.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/webview.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/webview.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/InstallDrivers.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/InstallDrivers.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/Setup.exe
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/Setup.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/driver/cx25820.sys
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/driver/cx25820.sys
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/foo.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/foo.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/help.chm
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/help.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/merger.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/merger.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/常见问题解决方法.doc
Resource
win7-20240419-en
Behavioral task
behavioral28
Sample
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/常见问题解决方法.doc
Resource
win10v2004-20240508-en
General
-
Target
1408_cn_V8.3.0.0/1408_cn_8.3.0.0/DVR/default.htm
-
Size
687B
-
MD5
20b2ec88b2dc1a322630f41819597573
-
SHA1
4516e2efdb502c59f50fcf931880c4501cff7341
-
SHA256
eb38f066a2d6cfb8b816f48a40d11f2c7f7be6fcba26612bfcb537293a791544
-
SHA512
86fc3cdae92a6e44bcabb1cf8af43b2a6b018adef8ba1eb311fac8d8b32e6d2e4fec266aa1819bb19f7f3e8ececb5f93f4e1aa9eb2dd2dca28c429972c437f67
Malware Config
Signatures
-
Loads dropped DLL 9 IoCs
Processes:
IEXPLORE.EXEWerFault.exepid process 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2692 WerFault.exe 2692 WerFault.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2692 2156 WerFault.exe IEXPLORE.EXE -
Drops file in Windows directory 5 IoCs
Processes:
IEXPLORE.EXEdescription ioc process File opened for modification C:\Windows\dvrnet.ini IEXPLORE.EXE File opened for modification C:\Windows\INF\setupapi.app.log IEXPLORE.EXE File opened for modification C:\Windows\Downloaded Program Files\SET1BAB.tmp IEXPLORE.EXE File created C:\Windows\Downloaded Program Files\SET1BAB.tmp IEXPLORE.EXE File opened for modification C:\Windows\Downloaded Program Files\webview.dll IEXPLORE.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0DD51EB1-14F3-11EF-8EEA-EE2F313809B4} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422183829" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Modifies registry class 56 IoCs
Processes:
IEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FC850FC9-85F6-4A47-938A-25BC8EF6A154}\ = "IWebView2" IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FC850FC9-85F6-4A47-938A-25BC8EF6A154}\TypeLib IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8CF6E9E0-4FC0-48F6-A744-800A09D79D6B}\VersionIndependentProgID IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8CF6E9E0-4FC0-48F6-A744-800A09D79D6B}\MiscStatus\ = "0" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8CF6E9E0-4FC0-48F6-A744-800A09D79D6B}\MiscStatus\1\ = "131473" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8CF6E9E0-4FC0-48F6-A744-800A09D79D6B}\TypeLib\ = "{D0B34E76-260E-4355-B391-6963F242D13D}" IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FC850FC9-85F6-4A47-938A-25BC8EF6A154} IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FC850FC9-85F6-4A47-938A-25BC8EF6A154}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8CF6E9E0-4FC0-48F6-A744-800A09D79D6B}\Version IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D0B34E76-260E-4355-B391-6963F242D13D}\1.0\0 IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ATLFire.WebView2.1\ = "WebView2 Class" IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8CF6E9E0-4FC0-48F6-A744-800A09D79D6B}\InprocServer32 IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D0B34E76-260E-4355-B391-6963F242D13D}\1.0\0\win32 IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8CF6E9E0-4FC0-48F6-A744-800A09D79D6B}\TypeLib IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D0B34E76-260E-4355-B391-6963F242D13D}\1.0\0\win32\ = "C:\\Windows\\Downloaded Program Files\\webview.dll" IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ATLFire.WebView2\CLSID IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ATLFire.WebView2\CurVer\ = "ATLFire.WebView2.1" IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8CF6E9E0-4FC0-48F6-A744-800A09D79D6B}\MiscStatus\1 IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FC850FC9-85F6-4A47-938A-25BC8EF6A154} IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FC850FC9-85F6-4A47-938A-25BC8EF6A154}\TypeLib\ = "{D0B34E76-260E-4355-B391-6963F242D13D}" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FC850FC9-85F6-4A47-938A-25BC8EF6A154}\TypeLib\ = "{D0B34E76-260E-4355-B391-6963F242D13D}" IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FC850FC9-85F6-4A47-938A-25BC8EF6A154}\TypeLib IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FC850FC9-85F6-4A47-938A-25BC8EF6A154}\TypeLib\Version = "1.0" IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ATLFire.WebView2\CurVer IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8CF6E9E0-4FC0-48F6-A744-800A09D79D6B}\Version\ = "1.0" IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D0B34E76-260E-4355-B391-6963F242D13D}\1.0\HELPDIR IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ATLFire.WebView2\ = "WebView2 Class" IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8CF6E9E0-4FC0-48F6-A744-800A09D79D6B}\Programmable IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8CF6E9E0-4FC0-48F6-A744-800A09D79D6B}\MiscStatus IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8CF6E9E0-4FC0-48F6-A744-800A09D79D6B}\ProgID IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8CF6E9E0-4FC0-48F6-A744-800A09D79D6B}\Insertable IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D0B34E76-260E-4355-B391-6963F242D13D} IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ATLFire.WebView2.1 IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ATLFire.WebView2.1\CLSID IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ATLFire.WebView2 IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D0B34E76-260E-4355-B391-6963F242D13D}\1.0 IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FC850FC9-85F6-4A47-938A-25BC8EF6A154}\ProxyStubClsid32 IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8CF6E9E0-4FC0-48F6-A744-800A09D79D6B}\ = "WebView2 Class" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8CF6E9E0-4FC0-48F6-A744-800A09D79D6B}\InprocServer32\ThreadingModel = "Apartment" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8CF6E9E0-4FC0-48F6-A744-800A09D79D6B}\ToolboxBitmap32\ = "C:\\Windows\\Downloaded Program Files\\webview.dll, 101" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8CF6E9E0-4FC0-48F6-A744-800A09D79D6B}\ProgID\ = "ATLFire.WebView2.1" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FC850FC9-85F6-4A47-938A-25BC8EF6A154}\ = "IWebView2" IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8CF6E9E0-4FC0-48F6-A744-800A09D79D6B} IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D0B34E76-260E-4355-B391-6963F242D13D}\1.0\FLAGS\ = "0" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FC850FC9-85F6-4A47-938A-25BC8EF6A154}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D0B34E76-260E-4355-B391-6963F242D13D}\1.0\FLAGS IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8CF6E9E0-4FC0-48F6-A744-800A09D79D6B}\InprocServer32\ = "C:\\Windows\\Downloaded Program Files\\webview.dll" IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8CF6E9E0-4FC0-48F6-A744-800A09D79D6B}\Control IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8CF6E9E0-4FC0-48F6-A744-800A09D79D6B}\ToolboxBitmap32 IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D0B34E76-260E-4355-B391-6963F242D13D}\1.0\ = "ATLFire 3.0 Type Library" IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FC850FC9-85F6-4A47-938A-25BC8EF6A154}\ProxyStubClsid32 IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ATLFire.WebView2.1\CLSID\ = "{8CF6E9E0-4FC0-48F6-A744-800A09D79D6B}" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ATLFire.WebView2\CLSID\ = "{8CF6E9E0-4FC0-48F6-A744-800A09D79D6B}" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8CF6E9E0-4FC0-48F6-A744-800A09D79D6B}\VersionIndependentProgID\ = "ATLFire.WebView2" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FC850FC9-85F6-4A47-938A-25BC8EF6A154}\TypeLib\Version = "1.0" IEXPLORE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D0B34E76-260E-4355-B391-6963F242D13D}\1.0\HELPDIR\ = "C:\\Windows\\Downloaded Program Files" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1364 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1364 iexplore.exe 1364 iexplore.exe 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
iexplore.exeIEXPLORE.EXEdescription pid process target process PID 1364 wrote to memory of 2156 1364 iexplore.exe IEXPLORE.EXE PID 1364 wrote to memory of 2156 1364 iexplore.exe IEXPLORE.EXE PID 1364 wrote to memory of 2156 1364 iexplore.exe IEXPLORE.EXE PID 1364 wrote to memory of 2156 1364 iexplore.exe IEXPLORE.EXE PID 2156 wrote to memory of 2692 2156 IEXPLORE.EXE WerFault.exe PID 2156 wrote to memory of 2692 2156 IEXPLORE.EXE WerFault.exe PID 2156 wrote to memory of 2692 2156 IEXPLORE.EXE WerFault.exe PID 2156 wrote to memory of 2692 2156 IEXPLORE.EXE WerFault.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1408_cn_V8.3.0.0\1408_cn_8.3.0.0\DVR\default.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1364 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 15243⤵
- Loads dropped DLL
- Program crash
PID:2692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5e1372ed6ac4e007e76704bacf4df0050
SHA1dfdcf9ab12df60c662fd3bfe28f4251eddb0a453
SHA2569c313107854e5aa0d623329ef260bb213e9772d5c93306be255c612a8af17422
SHA5120ae767684cf87c5284e1e90410916e65d623d8536132ec88742854ae1803d13c6f3b7c3b83215d7cbe3bc5227a0a86bb858e088128d7ed74a1b8510f8a801e7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5031c358a96c86b7299afc336c482c6af
SHA13cc43621e6890457f7b4da6618c8d6d4c58e10c3
SHA256812f7728b1b0ba41e036579a1ebeb842c1ce0574437c8673867ec2aa4579091c
SHA512a7948ed374186c6cbc9a2c23bb5967c0123ee356712167510fafd6b1e010957f51027834f090d9b5dae537ffa994e06fea07ad8c2b6d53fc530187f827817cab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56af93ed92438b7d31bd64dcbda3a34d1
SHA123cc394f7dfde21d77b838c0042bd09c0533676e
SHA256b25387a8d806dbe485b5bca2c9dea9e42720e0b57e749bee0d44d6835d11e07a
SHA512b8b4c5eb01801e09f48a4d616fffa7bb0c3c2f5234995cedd8f8b5aef1a0a0862c59e4da5812172ae8a60986b7a66453b0991dc2d3e7590f73e468079839d90f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f789cb40e1673f7b3227cd22d7fecb86
SHA126f04754ebdc986ae1cc64d591478eb5c86aaa3b
SHA256a47f3cd5470b5978fc68b76c38fc1d7070e0161c0b817f67d36ec163f3f6a3a3
SHA512215a1e259db03442156729bef7abe823aedc806f31930b11e3c1b6cd87b00e876599a3464e43cfd8ec98b717c5a73385645aa596b3fabd7bf9b8c826a1b975a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da1b9503299d07c8b0512c3709aa9fb2
SHA152d0bb9e298722f68b27cdad1669c1c76d36c15f
SHA256546350fbb9324ff4bf328b40eafc0a21919a17639ea2138fd450c77bb211f71a
SHA512aa6255507682410f836109ec7e84867f1c976796e3d7dac54771e98e54d6d35cbe429899f53de4be88deb8643e80443994abdd2c095d8a473e4fb5206c402ba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58eb5508c56cb01bc332fb7cf5bd94967
SHA16d943e1c719c1d5418f82f2f97f427b32973bc52
SHA2569c94211951462300dee5f0534399c431bc5492322a9c36efaade642fc2bca6cf
SHA512dabcd0d09e28ced91d08e3ae049b1525fe95a52f47ed45f9a704bc75f22c4dfd7732588ccf67baca735773a7f2265d66b23adcd7c3f99bc34ddb91d212870cd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adea5aafddfe3bc39726f12e8c4f3f5e
SHA1d48c783a857ffdc0e6216c170aae679d7a47966f
SHA256c4f09336dc355b0b04cb49a8560303e8034661a92d432c419a03228293a95b64
SHA512f2ab0d975145cbc9bb86cc4feee8cdb46e5d0258ffd692d710527efdf8d3a016dafb65687ddbf7c98840b076ffacd19a369177d5f765b80364828f0c7a6aab89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55560c48a00e09a33bd96918d3dd474d9
SHA176e6679cf74c32d7c782ec2e5cfe5abeec190f83
SHA256822189a33aa5704156fb3115278efdda5b524bd1466577af879004d10e19fa8d
SHA512d20419890542318a628a38deae8e525cb00a785a858c373eb2371984595c41d85a826c696356a13e66eca6522c346775276b44739b3414612d8cb86981794e02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549626b49194d0a043d60247a493d75f0
SHA1a6362f33a3eb643bbcb53136b78b7596fe528df8
SHA256385e86c3a5798abe0a46513221f3fc60ad361773e935901fe4d2f60c0f391060
SHA5121691b7578a409aaecf9e4bb9ec221c3c5c894bd7fee1a20fcea01ad4702ecb5c545058c2731a2855060c43095e36856888b5bd26c1183fea3bdaa95fd3074541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e8c7fef8698efa316195b2f15de6253
SHA1b4c7d50a2f2fce0c52ca47b93b9f3f70fbba3f07
SHA256849405e91514a8c8dfc71c48d209ed5d6f9c30e93cbe27e4911c2d5446513375
SHA5124760984dbd9ee7d0d7d120c701f5c56d968d68a778818e460c104227d12ca5b08aad583a63259cdb3f9aed5cc1b0764f9ae2366a33c4fddd1cd9662822800a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5f69ffeed116ce3743bce3c85cd21faf1
SHA1e14e11bfff493eb89cbeab0273ffab385fab248c
SHA256bdba89574caa27ae23b289ecb2261588fff0af84ce484e0f2bbb1bba4e539b10
SHA5129c53ee9cf10e45702ba7371cb14d9ada80f8ad13b91a27043aab10e435cd813ee8bbf1f668829d16008451bec9567100cf560d27a38a49abcb2afc0ddbae5213
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
736KB
MD56d50265fe4d14e0ddae1b73aed37e864
SHA12505ef562b6861bc1189967c88e0453797a88df8
SHA25668da49bcd3c1105405297b5420ae86529aec7067d6cd8427d30be577cb6b9ced
SHA51261a6e63c20b10a8b9877f3d3590e06cf0f3f1d25ddd708fc5c4f135c899f212216612ef80b95c8d600d224ab080f50032a34db1281e34d2221f580db9d4949c9