Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
26/06/2024, 00:17
Static task
static1
Behavioral task
behavioral1
Sample
rx-AKMod_msDTC/misc.vbs
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
rx-AKMod_msDTC/misc.vbs
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
rx-AKMod_msDTC/rBot.html
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
rx-AKMod_msDTC/rBot.html
Resource
win10v2004-20240508-en
General
-
Target
rx-AKMod_msDTC/rBot.html
-
Size
2KB
-
MD5
e2f5be04d4112082b11b0da8c4f83a46
-
SHA1
0e7cdf85e9a0ba48c99bada92a45ea1e0e4fd353
-
SHA256
b7dd227ea26b8ee31a32fe8cb6b3f6e6ac9641854ffa6e8258a35b384c44ac77
-
SHA512
ea7113e89035e02a5dc77ef407b621a4814d70af7eff4751376b31130fae158f38c2be757094c0fa8059fcf16d0c47516b8054fab725693184bf7ec922108a1c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000b847316adb62e75c341abcd7f7131cef2f40a315c3d6340f8fdffece7afb0b17000000000e80000000020000200000007a2e32d541c61b09aa1b1c7f467c57a4151d90431f0c394bfc4577295762ce3320000000f93dc6198886ebd0aa71f1e0b11255e9f0aec0d1cefc1f89ae478ad34235a8b040000000a992054dfae7f5b863d2bf8e800fabbfc8c7d455f7f05976eb4a4a2b36f8f22cd28b4062cb11b0ed88b552665bdbdfbefd5cea978db2f67da3e8f96b1712c87e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425522906" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{72FD8E91-3351-11EF-A1B3-D2ACEE0A983D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0cba1475ec7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2412 iexplore.exe 2412 iexplore.exe 1292 IEXPLORE.EXE 1292 IEXPLORE.EXE 1292 IEXPLORE.EXE 1292 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 1292 2412 iexplore.exe 28 PID 2412 wrote to memory of 1292 2412 iexplore.exe 28 PID 2412 wrote to memory of 1292 2412 iexplore.exe 28 PID 2412 wrote to memory of 1292 2412 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\rx-AKMod_msDTC\rBot.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf5eae0456e709dcea11ab49ef5532e8
SHA1e5e2dbd74c4d099107f16754491f719bbc8df72a
SHA2569723c06b70aea00d3e2cc40321323a5a1fc8445547a053c9c8ecc516ec4031d0
SHA512946d1d34473f060297539137461210a1779287b0db40107c830aae5a76a6ad373037622a044e2f87e7cb8df9071795a47ccc7fc59bef99a71815be004ccda926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3ff18a79e717ba2b9edb40f3df1c9a0
SHA10441bc7242a78a19b0c95cee7f86c14710180709
SHA256e81f401324afff35aa4be8dd4c2d08b4999dcafaef88fd33f9c3570d1e558423
SHA5122ccfa74d65362e0f30a5fd3ebd228c1c9cc4871b0b161149b0cd91fedbb1c0c8724025638708fac2770a914915125c278f40bb9807998675ca08af5990e67eea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58826bb56698ec87f7fd308c8aca1fda1
SHA1d35ab2718acc59d41a536f62e164e7e6ce2ce2ad
SHA25697f1e34eeef1bb2c783cd1c6fc36b6a97c4bbed2f04d740fb48f06f605239fbd
SHA512ec90492cc309d7b77b6c55ca6f967bdd561a801336b017c8b768e7ee559f2d50933b43c176bf42ec3ddba10f9ba30bb0e4df20b4e582c1ccbe309b2c55dfe862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57af5733144e8c4ba0b38506eb15273f4
SHA16e0339bef8388dd91289ffaaedef5052aab478c7
SHA256f075126369a443227afcec456b36b1f06123648419554ad690b949cced36b7c0
SHA512dec2f62b5c399b0b5fca0b729e6a3f5172dc894b4d1d78785aa764f2e26be3c2b9e05772d6c767d396862881f8efae551fb95190903352d1907e5f843dea710b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5240355b6cf58e5b3a84811107b187f87
SHA15f11eca2c1bc665611c5ac61a5951a8f9dfa9c6e
SHA256d450f226eefb71632e3cba6dd1f3ebf112069fd1a14a3ea5b0d77b5f4151eb24
SHA5125dc32b91270f3cf1e89793d1d184ec522fae46dac126b102a2a21b3f010005029206ace90baaddb1c5a4e12bea4ba3da88750d224fc96f64a440b5b96538034d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faecca28f134ec2832ee4826573e2d9a
SHA11162642003b80c7870ef296a579494c366528eb2
SHA256757b5763b6c2a1404bff8f5e6a48865a7215acdd273590bffa7eee13c930efd3
SHA512e58b5ec8abfe82b58eeea87ca92a61cc42be546acb7fe339fd48173a638d721558a47f50382661cd3506961ef92a22cfd1ef61f2284eb392d0fde1ea9f218028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0d614743a2ea47d5eeb1db7b413610b
SHA1df82a84f9ccd8e137c38b3fcf423126a9780d99b
SHA256acf1c828f7783d510a5350f4f04004ce6bee51aba15e94fc5e0762153d8f9330
SHA51287f4dd1ac608883f519f4ccabb9e5de202e795f7db1b986283fd207dfbe57535eddd0128431396504adb94a01153a86ac633b4298b26ea2e4dba600e0d9295d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515ee7cc39acd8d345224a1b2038431c8
SHA1bb2452de7691686699c9e3deed218cdfb304fa48
SHA25630747a156a9405cc99f2bed98213c8382144d2c0f7b7636acb9c9ee2c1ebbe96
SHA512fae1bcd5b5f116bd6868fc597b68c0ca3673b2ddc066fbdc8e93b3ee84a418956fa4948f071c269604c1205182334f9ef70e945985e6ad47651a991e8d641cbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5b2116e57a8d5174b1b6ae38c15925d
SHA173541e5bb523d03dc229ca0b69b2c5425a9eac7e
SHA2563c424e5b20550bf147e086ed3207ae6242ef2c6b55cd6bccbf0974e506994bd6
SHA512735722685f68422b75d4432d13c5c994b9b2af48c4238f8483578c0e497a38e8d97e8b27e725b1531d4459b8e2e3c17cdb50c3c59f54a8abcbbf45d484d20609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559439971ea51b63481d6bc3c1b24b4a1
SHA164db0ba8a8d1621a351f979b00e40f68611ad8b3
SHA2569eca0167886515a98f89fa92e4aa3984f8a355ddadbb9b74b4800abdd8b9efe3
SHA512ac0442a2c7c73a344d4936a6044758879e47eafbe8e5f412a344bb7d0003700765130dea3d0cdf2386c594366d2c969d4f00ec0265a09488b3fd1c032f06f7d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577410da3cbe86cc5498c908f56b8acb3
SHA1bba7e5d1a3101477c1929daa27f59f7cf0c663d4
SHA256257687b1f9a9923041fdeacb6d3a3d234a8b6f37495bfecec4c6c573b21b0462
SHA512fbbd5c03483d75e56e501b55179e7ed02008cacbb27108893e64f4d5ecbb8356cf1aa15d8a78b1b81b00136c30c8f6729b9323324bdbabc4235ac4669c914f02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bb40d6b206a8787ae527c143fc4c791
SHA1b68c4d5b7bcf85045b2790b56f784a47f48cbf3f
SHA2565a90b60d92863f90f4ca042e47a589db43a22d66b6b8b67972cf6521d2ccc242
SHA512c435e66adb07b5723f188f3e9ac2f8eb2fdd3b6d853cf1fa242f5f6a838fc34a28f9ac3ed3610c047bb264b45cf4b70548f4b89cbc6cc58214b7dc9f89f7febd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bdf1ab1945d134b7d40ce309802f71c
SHA17f52164ea042b754e1dfb68e5f89542100051176
SHA256b8c838db928bb2607c366f855661943ffbde30f54de8e8943541a1fe4c6d8f33
SHA512f0898c6720d19746a378f087701a1007336c8521a018bf7bde3cff8bbb3109758b00bce1f502f9066f32c264d8ec73fc838b1a5a611f32344582124e2b1c56f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d96ed04213606a5f0ce73b77bc76be4f
SHA19c6e88f776672ff562b545d05c012deb45420416
SHA2563c36c315fd16640a6b18e0825672ea9e097160847c6e1f7f35475904b1713f17
SHA51282215529a6df9ffa8ed47f0d3cce2910610c35d5fce73fd8d4466dc66d259a94d331cb7ac8562b074f421c10328aad9b6a9596d83ef74ce9dbdce0d1105568ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524812e2d4b1b018e632ec7d6ff1d679b
SHA1425bb7616bdf75269f77c970a6ec1b05f9f1f26d
SHA2569affd6696a705b7e94b2f5b5553f020241f6468c955b0a95df42ff0fe6f8c6bd
SHA512ba83e4c98f40076052f8ff9bb93a5a9b7d66e3aeeef0b5439026d45c5b765a6a09a456a3fe17ed4afe68498473fe354cff2c594413a68a880456e67311b5491c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5638a6f9165bdeca01c1c3590abfbe308
SHA124a43867a61de88410648457a2f0cd15b9fa0496
SHA25616ae24e4309e07a2c64fafb0927c9f169b9df10ec1fc1192a366ce872e708cff
SHA5127d2d660650d184d45d1fb142de1850627b23791bf154a1e70d060efa7c563667879a4ead40c0a8ccf5142c119b84aa6ec742529be24a3d88c964890ac4ec6e80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4c0622c0f27b97507868dbc6276a889
SHA142916cf28d3fa691eb1ff8e8fe4758496d659b08
SHA2565e9796130283591ae100b79ea501f8c52ecfe676ad04662bec6ea856320f28a7
SHA512c5b2b651144ddd9144a9dcb40c9310c61241a796a49bcda18182eef0ed4832cecf74788fe94fe9998b26109226fb33f92cb5a06d9b48d0263bfbc4adb27ce1af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae0e1df5c8032e67ffa20df78418e16f
SHA1a708bf0b21a8f41686a4e005be4838e9be43aa50
SHA256fffc281d313c4ac912b452700701de781ba171f7efa7340d5a9718532a629bc9
SHA512c57e82717a23d49512a29d8c2780b4545981762c542f9f1a9a50bbe781f32f27578f78bdf96b6f764f9f33ffafe1d919a7ab7ed64fdacbb6ff3ea367f440d3ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50004d1b40cb707ba3e10f036d0e27e99
SHA127231e53a35f53e1886e852d184936fa80c1a1d4
SHA256c2c0bc96b8d61626e8bb10b5fe71fa22edbb26c0b0fcff20e0290c6575db4516
SHA512c58465ac021a05099022d35a5dbb9836773d64912c1189514460362a2c31b9884c14e0f59c0f18479e59de31aca06dd2a53364ec2b2ff17313250d49b7a12f9b
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b