Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 12:18
Static task
static1
Behavioral task
behavioral1
Sample
libgomp-plugin-nvptx-1.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
libgomp-plugin-nvptx-1.html
Resource
win10v2004-20240426-en
General
-
Target
libgomp-plugin-nvptx-1.html
-
Size
334B
-
MD5
34c6ed03bb40ae6cde34767f0cf4cdc8
-
SHA1
35cae80b67c770c971d645c26db35f12ad594ea2
-
SHA256
4cba0261b72f6d62cdbc9c58cbb216afdd2b766d45cc0abbebe0e8b840fb5be7
-
SHA512
f1f8172767aed2e2d05dd8b0deb14bc03b5310303ecc7419a13234508d9652421ab54cd166c971597a976964b0ad2da4a57829b669fbf8d5c08a02411ebe3546
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000c8a235c5d9679003878c91168a5daeeb48ef27e004ea58edd393d89f93e0e826000000000e8000000002000020000000b5ac00ae089b1c9a55246e73f83b368d9b7e4c5fcb414a87e209ac6ffb226f72200000008f8d8b6b61cb8e1988aa7dd9105a1bf9ff383357257067fa7de593d4f035a3ee40000000b6ec5144703604429fe589493457b77a016708306b558384e1b1aa49d9ba754b694e242704b3463eb71938dd14efb412406e7a69499329f0f7ee1da000b5aee2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{43516391-1837-11EF-8C71-D684AC6A5058} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422542977" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80d2e11744acda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2268 iexplore.exe 2268 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2916 2268 iexplore.exe 28 PID 2268 wrote to memory of 2916 2268 iexplore.exe 28 PID 2268 wrote to memory of 2916 2268 iexplore.exe 28 PID 2268 wrote to memory of 2916 2268 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\libgomp-plugin-nvptx-1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fe73decd59afb75184f3136780a0792
SHA121689f84207ae434cd94b82545593a7a70bf230e
SHA256376f6bc7b75042f850e2c0a421667150eb6fbc4eab78ee93b129ae3a704051cd
SHA512602b35605e128b8130e3c741484ce2b244f449e9e8d6dc152c49f34a38437f61cb59007b85f7a17e8d537c7eef80c51856f890091dbe6a94ec59bd4a82f34508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0789d13e3ecc69cabc391c14c33b459
SHA1e663cd9aaf1c9125ca4b7de9c6330212eb051be0
SHA2567e35956939b6ec9e4dc8d6bf24341d50233efe7238a075809ca7aa17eead9365
SHA512121af95031222ce4f24ca7a59418ebc7e8e8ae12afb17485567bc0fecd6c81c0023c4f7eb547f38465fe1096b7a733cf7056a48c3f98a8c6416c21b62dd58a28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53363414fb8ef120bc8b1b6506118281d
SHA1f1649e51ec32086fa6a742757010a24e04d4a2dc
SHA256fc74853b2ac8e745734340f0d6ae2833ad66b2f187a5770bcb6975ed048c28a1
SHA51283bad1c7bcd49705d7d48c1d6bc4835f48a3b2259533bbafa2b046377a6e2b47f7a58e9129a63cb2e46a8dbb3cac47826d5e6e7aa8ba62304df41fea62c3e9fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dde7a838945c15ae450fc74a096f81a4
SHA12a3d025d764109d7110fcc63c0e5135c59aa0d16
SHA256e4bef34f508ba548493cc7092d7c600002eb7c610578cb89ee73dd74d4ac2122
SHA512ae2c3d41318aa287e941646186d789d7012140cd07bc2047fd283adce2d4f7e977ac019d0bf9abdee446dce5ca7625ccae2a08c07ce14fb88905a0c1fe8b314e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5040f1acdd19f597c7311322252037254
SHA1d945218b274132f5c7aec6e3a9eb62ef81e1fc8d
SHA25623386765a174ac38ed4878193440220736fdc07e94bba0e0e50be280a179a2e6
SHA512c510a1fb30d27f7c6b52a5af7a33b3d1206352db6e1359a1037cbc12f5c951b4eb6b4ebb488a944cad429da092c33b9d363d1d2dac078def511c541ef705e60e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ca7eaac8daa6e55f4bfcc90cdf3858f
SHA100c1f69ce3a2c68cf5448315f81b7f03b998d083
SHA2568d4e3b6a0e5d22514e76d20fb6810b6b1c4f34480e85420b8dcdd5e11212b099
SHA51274f543eab05618b11159c27d483795d41dad5be1f2b719926454f3671e78088950999442471dfb0eecb3307693e182e0f54a00b5081c299167dedc2e25a5148e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8d9a43780700bc3741d83bcb7792878
SHA13396a1060a048ea68752a7aab27f4c0eca9790c1
SHA256c5b93ae000311dccc253eabe2f367698f51c8b64b7f13c5df8cc73851948ecb6
SHA512383e8268ced7cb1d7996cb793976ee7ec16a5d31dc3d62e819bc66dd628bd15aff6016036b32f295173c1766b7f6a4e18344a2d00eb80e27dda767613390003d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c411aa8e5478c0bc2e3b0b0f93350157
SHA1a64fd8cb2dafc073b1076446fb01a628a64f1a58
SHA256280f53ded382f8a86c606c776dc9688072a77f7df17238a913596f4b753ac79e
SHA51226f0455e6643915f3e9f3d3d83e4a445e10a3a8703aab43599b74fe26b811d8df2f205359fbe08ea23e7644227c9cd01eff280594e66aabda1a787d9a17ebe2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57167fe3dd1963d6aac3eef58d26c0d76
SHA15318626f8995b419e9a06a431adbb31bc4d13b3b
SHA256864b1ce7c3be515478b3c21e42efdf35b7cae1bc97f1e3b4591f6d6c352a0f3a
SHA512817ab9a82eb3dc86b73c9185865db541725df8d3836489bb752e9832fc933075b02d38a9f2887806097671742691413f5216857a57088dee7ad377e576355784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a964f07b1216d40d8424fd683ecb665
SHA19bdc52f259f4a5dbbbdc4f1789b20f33b173b6a2
SHA2569061145c7f4a70c8f83b1d3ca80e94e7b27bf3e30a2ff70c6a15d12cc1987e2a
SHA512c97aba342534265d70030e03135bbf5200ef3f5bb2e9baca413146844f13a44b6ad98bd3bdf5d50df42a1eced5b6efdc6fb39a5515618ec691307de34fafa35b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576faba2b67baaaae7bea3ceb4954415b
SHA167dbaaab9a5d185a1d871becfdd3257d11a42557
SHA256e769a547eeaf0b9c2887f14614d46821c7c85540b665291515efc479c4a0f68a
SHA5125a5e64b2a0a4e5fdca27cf9ed3eec8518fcdecb04cd000b426c1f81b050602fff20b68f267dcca80ee468a065cd22583a635b5fd8cd51a590ac3f5a7d1a09e24
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a