Overview
overview
7Static
static
3iLovePDF D...er.exe
windows7-x64
7iLovePDF D...er.exe
windows10-2004-x64
7$PLUGINSDI...to.dll
windows7-x64
3$PLUGINSDI...to.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDIR/INetC.dll
windows7-x64
3$PLUGINSDIR/INetC.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...te.dll
windows7-x64
3$PLUGINSDI...te.dll
windows10-2004-x64
3$PLUGINSDI...st.dll
windows7-x64
3$PLUGINSDI...st.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...al.ini
windows7-x64
1$PLUGINSDI...al.ini
windows10-2004-x64
1$PLUGINSDI...e.html
windows7-x64
1$PLUGINSDI...e.html
windows10-2004-x64
1$PLUGINSDI...er.bmp
windows7-x64
3$PLUGINSDI...er.bmp
windows10-2004-x64
7$PLUGINSDI...rd.bmp
windows7-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7$PLUGINSDI...ay.dll
windows7-x64
3$PLUGINSDI...ay.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Analysis
-
max time kernel
193s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-es -
resource tags
arch:x64arch:x86image:win7-20240221-eslocale:es-esos:windows7-x64systemwindows -
submitted
20-05-2024 19:34
Static task
static1
Behavioral task
behavioral1
Sample
iLovePDF Desktop Installer.exe
Resource
win7-20240221-es
Behavioral task
behavioral2
Sample
iLovePDF Desktop Installer.exe
Resource
win10v2004-20240508-es
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Crypto.dll
Resource
win7-20240220-es
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Crypto.dll
Resource
win10v2004-20240508-es
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Dialer.dll
Resource
win7-20240419-es
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Dialer.dll
Resource
win10v2004-20240426-es
Behavioral task
behavioral7
Sample
$PLUGINSDIR/INetC.dll
Resource
win7-20240508-es
Behavioral task
behavioral8
Sample
$PLUGINSDIR/INetC.dll
Resource
win10v2004-20240508-es
Behavioral task
behavioral9
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-es
Behavioral task
behavioral10
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240426-es
Behavioral task
behavioral11
Sample
$PLUGINSDIR/Locate.dll
Resource
win7-20240221-es
Behavioral task
behavioral12
Sample
$PLUGINSDIR/Locate.dll
Resource
win10v2004-20240508-es
Behavioral task
behavioral13
Sample
$PLUGINSDIR/LockedList.dll
Resource
win7-20240221-es
Behavioral task
behavioral14
Sample
$PLUGINSDIR/LockedList.dll
Resource
win10v2004-20240508-es
Behavioral task
behavioral15
Sample
$PLUGINSDIR/ShellExecAsUser.dll
Resource
win7-20240508-es
Behavioral task
behavioral16
Sample
$PLUGINSDIR/ShellExecAsUser.dll
Resource
win10v2004-20240508-es
Behavioral task
behavioral17
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-es
Behavioral task
behavioral18
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-es
Behavioral task
behavioral19
Sample
$PLUGINSDIR/ThreadTimer.dll
Resource
win7-20240221-es
Behavioral task
behavioral20
Sample
$PLUGINSDIR/ThreadTimer.dll
Resource
win10v2004-20240426-es
Behavioral task
behavioral21
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win7-20240508-es
Behavioral task
behavioral22
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win10v2004-20240426-es
Behavioral task
behavioral23
Sample
$PLUGINSDIR/license.html
Resource
win7-20240221-es
Behavioral task
behavioral24
Sample
$PLUGINSDIR/license.html
Resource
win10v2004-20240508-es
Behavioral task
behavioral25
Sample
$PLUGINSDIR/modern-header.bmp
Resource
win7-20240221-es
Behavioral task
behavioral26
Sample
$PLUGINSDIR/modern-header.bmp
Resource
win10v2004-20240508-es
Behavioral task
behavioral27
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20240419-es
Behavioral task
behavioral28
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20240508-es
Behavioral task
behavioral29
Sample
$PLUGINSDIR/nsArray.dll
Resource
win7-20240221-es
Behavioral task
behavioral30
Sample
$PLUGINSDIR/nsArray.dll
Resource
win10v2004-20240426-es
Behavioral task
behavioral31
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240508-es
Behavioral task
behavioral32
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240426-es
General
-
Target
$PLUGINSDIR/license.html
-
Size
31KB
-
MD5
e33df11e6a5eacdd2800341fe3c9c9c2
-
SHA1
b6d89f35c0b88f44b9bf21fb18c23e3ea24eed6d
-
SHA256
b9bbd98e5c986628e7106e3be0b539f4ff97b736444d3a1967cecd02faca4586
-
SHA512
b29525242bfa6c4be89cff7955799e0b031235147c9c1f5574e8b001292ccbde3ce3a54573940bb2a87d014b5c2504fae5e5bc29acdda7e16bfc3628336dac8a
-
SSDEEP
384:clzY1ZDRdwWdP1Q+Zh2kmgaEYwA7KSZNrFuB9a+coV/sS9TNvUqFl2yFjbCGOR+r:QYXDRdwW/QZGaJDEa+cH+/2y1un+uO
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{088B5891-16E0-11EF-8F76-4A8D624DCC1D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 909b14ddecaada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000a58c229ba071b28243cb5433b235a3f78f03ed7e542e7dff0f0983baac598443000000000e800000000200002000000052046852dc825f1764cc414a693d40091c7a208785a82b4a2ac90e39cadd7ac3200000000bd77346e867a098443a72bc508c39c5a55b3d8e1f2c0bee2ac388c86c83bf4140000000eb287827f97cf85fcdbc2922ff6061826dd154a903c973346736b554ebd89ff5b63736473b86cc3f04425d0c52cef659009301ccdd4eb4024a54d3ac8e16b137 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422395561" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3008 iexplore.exe 3008 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2640 3008 iexplore.exe 28 PID 3008 wrote to memory of 2640 3008 iexplore.exe 28 PID 3008 wrote to memory of 2640 3008 iexplore.exe 28 PID 3008 wrote to memory of 2640 3008 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\license.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a256577060209f7eaf596ee3e5b5c6c6
SHA1064811f4252f2a9d5aadbaafc2b653da86079b73
SHA25658157e6482b91544c82455d7c7e9c815a9e633de5b5084162011ca6b1952d178
SHA5126909a83e8497f3a87827d42ee8947ce48fc1a307a762439befb3ccb65fe50a513db58d5585d3f9e508395b5ca9dcd98bde94e19ac8dc5ea6aecf7622aec96ccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53608eaf510cfd2370f60cec08590fa9e
SHA14115caea55b12a6ff5199897d0d9739c2ea435b8
SHA2560679449d0b6d9ef21e09b09dbab42e11c54adca34f9acd493b7fd247403208f4
SHA51287ac04190bf3ba7bc6f20b194eee41e7a02da17cc786b2c73b8dba2adfd035fda0c1a3a8c740f89a58c92d2f876671676ff5f0576005ee652086396780c73afb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571f8f09c8297b8b9c4014dfca77cf376
SHA132bff01e5c7a2f3a08be8599e7990c0f2b5b7f4a
SHA25639709cbf8192b9051dec2649f6f8542c1cb4d6228cca7c601d46f061bb5f96a8
SHA512a2e25d19bce7b6c5e104a0b276ff18c00341cac30eac0a07b33055378469f1c580231f0d68f385d73a62d2e7a8e08022c64969d428d5935db2d1211fd9cee499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cbb3a73d8264f4e8d1927bab5e59118
SHA121b8cab7305cdedf82bfcc2af48e7b62a1405df1
SHA25611bc349495c337a6b4a043894c58cb9375a4c311472d04c726e02b127f7bf757
SHA5126b168292d8df4c6cd2fe27dea447831e61a36d48e92e1c25f6919226f38619dbb0e8b49b9387069148149dbf5328dfdf95b47bdd08c4ba28dedee74fa013e9af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5493d071719f7d5b3c15ad26af868eec0
SHA16b6e614df01dcb3bd993093256502a9a8b7b2fee
SHA256c6ad9744e4962c5574eec1f1e77633d983283e3e323189120d82e3b99e075f27
SHA512fa5ee6e1c657e7dd9d83d158e760c5a81099919e3ae886e5cd05105ee48fe63f33dbc69928c170e1d3bddfdf65d967805f13caf183508c825550db59c04a3ff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9cb9672215ca16559ee6635b9b9cfeb
SHA192ddde58c95491277ecceb3022b9e4b0534a1245
SHA256df22f1b63fc14d0fa4c42128cc0e9205db03b8e463348517edfb5fee4c0aa2b0
SHA512d819f5bf43237958f8fd9c1cd6b80c0f756c6085845eeef39f1849dcafc192322b1bb38a3dc9a84c5fbaebc5250ce827f8e47d2beaec72e840705553f257082c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5888c02c992d47f3556e2da0508b8a64c
SHA1676e5df420c98f80f2fec1c410d990d49b895cb5
SHA2566a5b49805e556dd0f1077c704f3a5ec802ef2d0b8b58c0db8d25e9105edf5ea0
SHA51212428e43bd12774ecaa1235fcc7a978b10eaa15b3aa9ef2107468a26190d616d32703549a91610e80a87603314fc92ae22d868c5e70698f7cac22ed2fa2e8d9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7e1c9f6513f6deb7b3b43ab31bd8c2e
SHA136531ae8f1a43a967a2dc2b91a308b1cdd3d703e
SHA2567371bf11429069080a764008177818d49d8aafbe12711463b682805b91c8d9d9
SHA51206ff8d6d41524d04060350b293cb23a8dc62e0d03f4a0523fa4aaccf5dd113d99c059ef8f0a1d6ffdd37b3ce58ddeb3c7d4c277023e3745cd007cee9bc5fbdd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa1b60b0decb1fc6c7a114a8892bbe1f
SHA161d1ddfb3dacf5a280e42ae04b917eeaa2de3e19
SHA256024fb68b79766810b5aa1ac7e3438f3e3886683da8461634918808d8eefefcd3
SHA512ce11167e4ecd949f2a3e3948da08af49c62d0964b964392d42f1f966f91115f7bfd528233c122578189f51b210874a851f63ad14c16cc658d96442b94fa643ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f93c8fcacd8f962114c8ed2e622101e
SHA1bd1870a123d5bd4e50a71cf04e4cdd867bb09942
SHA25619fed648a5f14132ae10807e718e25bc92d59646112adb1c2e49239a2d1455b2
SHA512cbf50abb8cf3f4930ad3e83d30420001c2a88a5b1bc8e2daefb47cc57fc99179733c1e4eb3fbea5accaf8e81f3a825490d34f5604e8e04e5c1b8f7b52fbaad83
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a