Overview
overview
3Static
static
1files.rar
windows7-x64
3files.rar
windows10-2004-x64
3Vervolgd V...min.js
windows7-x64
3Vervolgd V...min.js
windows10-2004-x64
3Vervolgd V...min.js
windows7-x64
3Vervolgd V...min.js
windows10-2004-x64
3Vervolgd V.../js.js
windows7-x64
3Vervolgd V.../js.js
windows10-2004-x64
3Vervolgd V...min.js
windows7-x64
3Vervolgd V...min.js
windows10-2004-x64
3Vervolgd V...(1).js
windows7-x64
3Vervolgd V...(1).js
windows10-2004-x64
3Vervolgd V...sdk.js
windows7-x64
3Vervolgd V...sdk.js
windows10-2004-x64
3Vervolgd V...min.js
windows7-x64
3Vervolgd V...min.js
windows10-2004-x64
3Analysis
-
max time kernel
19s -
max time network
25s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 19:19
Static task
static1
Behavioral task
behavioral1
Sample
files.rar
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
files.rar
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Vervolgd Verlangen_files/jquery-migrate.min.js
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
Vervolgd Verlangen_files/jquery-migrate.min.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Vervolgd Verlangen_files/jquery.min.js
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
Vervolgd Verlangen_files/jquery.min.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Vervolgd Verlangen_files/js.js
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
Vervolgd Verlangen_files/js.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Vervolgd Verlangen_files/main.min.js
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
Vervolgd Verlangen_files/main.min.js
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
Vervolgd Verlangen_files/sdk(1).js
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
Vervolgd Verlangen_files/sdk(1).js
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Vervolgd Verlangen_files/sdk.js
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
Vervolgd Verlangen_files/sdk.js
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
Vervolgd Verlangen_files/vendor.min.js
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Vervolgd Verlangen_files/vendor.min.js
Resource
win10v2004-20240508-en
General
-
Target
files.rar
-
Size
4.5MB
-
MD5
50800a4d8427d0c6ae6b76f5f9e9b390
-
SHA1
c808af734d55153125f1eaef8a26d528029cb19f
-
SHA256
ced082fb707d3d0ae36aeb3427dcc54b7ceb7b921c52774e993f6e525289242e
-
SHA512
d236c5e0c9d491f57c9d9aa5c59980c6fcd772b00a3d38684617cd72612341021d44b23d01495445a707c1f7e5ca34165e0421e7690b251dac14303117c46144
-
SSDEEP
98304:LwHun/wFNFTDxnu56DtRPpwvCRthv9rljbW4oz2z+gP78qpMC0Na/Ke:UT75D8yh0Cx9rJtx78qpMP8ye
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{52B18FE1-2B4C-11EF-AA16-D671A15513D2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000_Classes\Local Settings rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2044 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2044 iexplore.exe 2044 iexplore.exe 2596 IEXPLORE.EXE 2596 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2576 wrote to memory of 2652 2576 cmd.exe 29 PID 2576 wrote to memory of 2652 2576 cmd.exe 29 PID 2576 wrote to memory of 2652 2576 cmd.exe 29 PID 2044 wrote to memory of 2596 2044 iexplore.exe 35 PID 2044 wrote to memory of 2596 2044 iexplore.exe 35 PID 2044 wrote to memory of 2596 2044 iexplore.exe 35 PID 2044 wrote to memory of 2596 2044 iexplore.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\files.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\files.rar2⤵
- Modifies registry class
PID:2652
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2612
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\AssertUse.gif1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51724229506cb7d6bc624e2fc9bd039e1
SHA1dab3557ae2f1495dd1bcb5638bffb1a80a1f9e64
SHA256e2aee285fc5252eba0b827d01714492c4c5a9aaff6231f5ac01041e0d7c8f7a3
SHA51211757ac1456a90956cfcb0be5626f51b8f61b683a1052abf08c9df973e49fb76d0fe47b9007b3ee7d29fd815c15a1b170f1cfa1a88675d28b4b7206cca3ca46d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5101dcb003230c84d7835683138f5d64f
SHA122f055fd4627a37e1db9f48308780e56203ce468
SHA2562e7b062aca2a5d56e5cfce6ca0e1984874ddd383b6ecc6fccc7b78d1b9c1b3d0
SHA51265098db5f12194165f1847dfd49e3f4607dafaddff08ada19d87e9cd8ca1a97b6620bdfcd90ff1446562c1d8d1a999043c0cfda05b24717361f185b8047dee67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5772e19dcfe08ab2f37363dd2046aa916
SHA1e7a09fed146ec7d58b48333a7d8bc0c89df36e14
SHA256b7be28f19ab28abdfbfa58e8ca2fd789c2bfa0aec85c0925b626df4919fc2b39
SHA512d76c278a830cfc333f4ad89654de1fe53bb5fa3ea1df4856feaba6dca0d3188c1b9e3eb80350d13e49e02b3d8625cabdcb7be1eb69139ba8e18f785bfb8320ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5570bf4386933838ca4bcfd02f86dfdef
SHA1caa941527a09b05b4bcffb56cc918c15a8574d1c
SHA25637b93b7f23139da1515a3b24985b1dcf16d3569a0b60922e3fa6877f9e12c2b0
SHA512af68b0758a51ff84528297bb37e460ef6dc7f8c1aa0551c15fb76d4edbd58d39f0f2fd614acab5b35c7c73a84dc25adb58e6f3540d146b9044fee00e91bb250e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b