Analysis
-
max time kernel
134s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 12:02
Static task
static1
Behavioral task
behavioral1
Sample
libgraphite2__.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
libgraphite2__.html
Resource
win10v2004-20240426-en
General
-
Target
libgraphite2__.html
-
Size
310B
-
MD5
ced887facf9339ea0e9e353dd3c44b4e
-
SHA1
0a65ad6f472dce0958bd31ec07a3613aab39c95e
-
SHA256
3cf34f6a058886bc929fac24e336ca09d3c763e5d0c737fef2a7af1da0fa1140
-
SHA512
b50f2ce75c998b253531190c32c64faf76964f65a9009a942ae7d9731d84437cd7499c4c02024033aef799f9ce9f157beff5bffab13b8468107a3288f1f2a21a
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000fb0b323efe6ebe693c54461682a4cfcda12be6dca5a75f545206c576270e760f000000000e800000000200002000000093630d2b2bbee5acd0e93172e59f63418ba7c1a9fc05a1f574cd41919f9725c720000000fc2956b2584b06c586998256bdeb78733a7c4b675a92e4a62f414baa4f0bab1b400000006a5c3e6d0963a95f725ceb8c44dfc10b93677f136abcb3266261a973b5d6afa863d6f904237497572174ca4759749d09a81c838905cec91f89d95517c26c0ee5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F36D281-1834-11EF-99F9-4E559C6B32B6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422541790" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9017db5341acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2996 2420 iexplore.exe 28 PID 2420 wrote to memory of 2996 2420 iexplore.exe 28 PID 2420 wrote to memory of 2996 2420 iexplore.exe 28 PID 2420 wrote to memory of 2996 2420 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\libgraphite2__.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c30578be993910267bf67caca8255b7e
SHA1ce9a7902ce15bd220f529dd75b3f585dabdd8430
SHA2563327039bba1a90ef14c15003882834e4e434a8e1b2548477db5601aebb8b260e
SHA512fca7346d63280d906eb24ba9d4f784a530af5e6f7f4bbd27312c902e1db5850ca1a8eed3138bacd19d3839881f611e5c689bfeae028774e9ab16a3837af6fa5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579b6265602894d59c6abdb65db9a43f5
SHA1324b149638d23261beb2ebc82dcb09fc70774e35
SHA256960734d8f3b30e79b3b0b6a9116c23061f4fd9622cdb79cf9819ad5902dad29d
SHA512d612863d6990154c90866ff72892db1bd4ed31b232bcb4e075a09ae499de497c88776588fc80d15637d42e0881e802d365244322c277c1bb0f79b0cc737b2220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f586eadda079ad96b9c88e4b73982a0
SHA190f2990c1b63ca8318aa3d51140d735652c9c91d
SHA2563d6e939ebc909c8357fc915fdbefe5e9ad9f1c3064b22cc724424b62ac39fb5a
SHA5124b294f078b427aeb35297b4853a1c3d02e7e1d5fce4c69179ebf996379797c6f53e72888a445ea10e6960158a23b7d4a9bc01a894c276dda29e15a291f8b8b9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543ef8c6039f5e150d91bff088f17a83d
SHA13aec6bb561174b39dff03883d4632bfd17eed8c2
SHA2561acae413610c2c2b167b2f0cd1b2021bf2c41c301ffadabd85a830700951d545
SHA5120105047bec5110cf3e8cc137db0e03b16785b99b0231eba233d4670b2c17da85ed6c81f233b56dcfcc4130c16e11551d2deb176a440d08173f5e9f95af0d1c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518d301472e443544713da884ba934b6f
SHA10a9b4b1a9c6b7c359b62d97b2e3adc127c14660c
SHA2560fff0f0a3c99d431509c0bc801e43f313742c1da44a5c132f8a1f9e396b66d24
SHA512302e608a7275a2dc3b0953e4cdb0502c1e7b45beb208142ae82f5e2ba8c0e5c316fc32166f86aed2c8895103a1e8d7c79b323b6f0f6e6269dfb224411074e5f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575dbce608b136b1bd05a3fa1f0f2f8a4
SHA12e070ba45884443f10f4a20738f0519a586cb695
SHA2560fd7fe16fa00701e01d1630bb8f1250b78cb18faefa4d13105a51c4c4c44024d
SHA51239751bb419d249ffe6341d3efacd8981ec63e88bd676d0eea517025aedcb6fa6a3c5632a5d58b93adf522d4f4b47fc8e9c93972e1a16fb6e34f303ddd431269f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521106216eb2a9c7eb6648c468fcc2ebe
SHA120689c5c912efc2f8fbbc34169db4edddb31ac2a
SHA256e0d644d7c3aa548fbe3b680cad350a4af129c82e7f970a597253dfec31a1b9fa
SHA51257897a4032c779a2b2a7b8aadcbe292511dce3c2ee27b22af7d1e11838ef50d9065d9fdedd58c2aee9c99dbd47bc6367751099288040335cf2ae98c006c8f06b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b924218c1a7a22645ba7a135a806aa5
SHA105ddc51e8d76ea348142a5260e6e8d15caa3e578
SHA256cae33af3fbfc4360adc21dff9046c4b430092cc464188ee7a9b58fd5eacc66a3
SHA512d390ab3e17a75f21883d48bbf661c3e4b6020d4c00617330c38585c373c93c46d34e9522a9463fbdb30cab7d7e026ae883109046d3a6639cdade5109db7a9bbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8956c678351b0c2f5e599cd145fef22
SHA1c980690587bf83c05e585ebefdcc13cb4cc60a91
SHA256d0eba78a498d8fa0643b8b08dc4b1275c5524a0d3f82e927a776793d64ce4692
SHA5121098032be892be8668fd2e7eaa2daa29d7a4cc4b3f08a3b3ba2c07f0baed6d9c838499fa608f8a23f6b7c85757c22031b8a51cb0b8e114d1f625de5190513755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f04a4c7b638ce6b1afd18d7859f359e
SHA1a14233279238ce8b57c22e9b66ef56d33db8a304
SHA256b4e74daf6dbc176b4a2bb81effe86c9d86bd6a188a3b6f3c5abc456c670b7a81
SHA51279762c50fe72f35772c5ff9a40bac565ffae969cc41c8b8f3dae16e63aa61449581ffbc8ec1c0f1cfb88e5385271e95d70a73d81f8cb687bc0ef3c66d9a3df01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e0e4c4363c5ffcd7ca2b6fabf42df91
SHA1d49e841bf3f95e5d659245bbc90cb0e469758d34
SHA256a83076619d91c5fee4c68841fc1697afa409314dba9184e3f43c288ca5fea7af
SHA5125d88b213cb41d26a171a93e0328983e2e8957cd2aeca9c71632ee8512c6c055e6d99300faf1dcf3f8fbe98f42b3531a25973cbfc5bf4aabec3a9d594d56e6247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d15c8c456f6c2f633caa6383919576e
SHA1da14f993a27aad4d4bbec3154f7f77e43bd35a79
SHA256719b1bc5bb3dfb083df04ef263dc07e9d095feb102fea07e14651c050c7b441c
SHA5128a14b6c10006b5d8823a0a7586dcacc7d20cd2b4b46f73843bb7b31c28cd369893835b9b9116e673977a09c14ea744a866323c395dfe6388cbffb54373b81849
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55984ee21416cdbfa03cb24e77dbd419f
SHA123cb87dbc0b4b4343ff1a4e6c134915d8ebac022
SHA25646dce0a0dc9535dd30369d2f1ebacd465f8d5f191ed6aa2be5ddecb0f691714c
SHA512aa1bf38797a09c8f437132138994e84fae0110b60e7495fbd26c135b39e92e3c930aeb61482e63aefd5013a9a03b06e183e0194ab7dd787cce8661786f608088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556289afef30c6a70b894ef16f05a9c88
SHA101dbc89abe57c22e5ef1c83c24440b7b1845de96
SHA256bfbf11d958d346d15161925d1e402647004e358083ccfd9b410c12388cf46d1a
SHA512246e2afe119ca7092d597a122150279bfe2919c431ab6da0dac1511100ec673b48c9b0a8f13dcf8254ab3c2afd912b83a70935d7ffe65bf9a6ee19dc5cbe4174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598c01903afe16da206368966155eb577
SHA11e8cd882ce3ef5e33581449dae722f01fd740d4e
SHA2564fc77ff4b6d7fdf87ba421b94fab8a01f757bddeb82d1ac72543d78595ae3a31
SHA512e30a956407751af53dc8667508c73b2d6f2d2ab1a3636f510e48cbe2a25ec05579cf396e610815e2a3beab292bf20b2765f86b35a3da0af69911cfc4d673e538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d62c8b9c4ac5344f869cc77de1a4f866
SHA12e4fbd35e3a4b084f9beb824f8e21fba3bb919c5
SHA25693ee9e0fff8e1019f0e2bd9758b4c7f05181b747ea04b28455d33431e703c669
SHA512fb5a4c5ae1fcf667c49631128753618aee203f74ad1321420612efdf18082c6171fac7d1bf5b51cd8770f822e97fdd3cbb72d49b859110347d1c8beb91e384a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589620a4b2d722d3d2ff2ce229695cf11
SHA12149fa54ff3486f06915b17d443da2b8ee32df3e
SHA256ad1a62539be62fd2e5ca6c631ecfd8e58a5cee41b0720e22f96068829bd17ba1
SHA512db1d44106da6b1e29ec0e1a0418ff039283fd03f5495a444d9e759d7049683ddff4cc3315ef99b35b5b38cb2bee8dcd4de0e317dcf86da48f12a616c866bcf16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d3d2c8e9896ded431e4f28db790adf0
SHA13ccc7fcd68d657edfb7d245fe4b0fe49be4a94bf
SHA256bbf5ed11e8bc056a879b0a9036cf40a308167bbfee062b4229da75f4a91fbdc0
SHA512bcf85b2d126c90601e77ce60c64d249c7d3f513ca647d51de9dba6484fdabf46a97c5ab6a53466f7bc0f84cb0322329eaebd4ef49d37060804138611a284be15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5579aa8f2e6417d337fe7b8df65544850
SHA1e6598ef369b7e4070921c90dfce079923a9872d0
SHA256cc9b27955cbb278ed06907eba7ee61edf71b992afb3abde771537bb3ed740d59
SHA512f5142003995e2c32a3ab0f9de117f6f24bf7755c79ea788325cbeacf0adfb4a3b41236df2a2720515408bb0840f54ded91a9d2877782fc2112ce1404803fc597
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a