Overview
overview
6Static
static
34.ƾ֤�....6.exe
windows10-2004-x64
6background.html
windows7-x64
3background.html
windows10-2004-x64
3jquery-eas...min.js
windows7-x64
3jquery-eas...min.js
windows10-2004-x64
3jquery-eas...min.js
windows7-x64
3jquery-eas...min.js
windows10-2004-x64
3js/autotransmit.js
windows7-x64
3js/autotransmit.js
windows10-2004-x64
3js/background.js
windows7-x64
3js/background.js
windows10-2004-x64
3js/content.js
windows7-x64
3js/content.js
windows10-2004-x64
3js/data.js
windows7-x64
3js/data.js
windows10-2004-x64
3js/djsh.js
windows7-x64
3js/djsh.js
windows10-2004-x64
3js/inject.js
windows7-x64
3js/inject.js
windows10-2004-x64
3js/kmhzb.js
windows7-x64
3js/kmhzb.js
windows10-2004-x64
3js/popup.js
windows7-x64
3js/popup.js
windows10-2004-x64
3js/popupmultiunit.js
windows7-x64
3js/popupmultiunit.js
windows10-2004-x64
3js/popupmu..._at.js
windows7-x64
3js/popupmu..._at.js
windows10-2004-x64
3js/pzsh.js
windows7-x64
3js/pzsh.js
windows10-2004-x64
3popup.html
windows7-x64
3popup.html
windows10-2004-x64
3popupmultiunit.html
windows7-x64
3Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 19:16
Static task
static1
Behavioral task
behavioral1
Sample
4.ƾ֤С/ƾ֤˹/ƾ֤˹2024.3.6.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
background.html
Resource
win7-20240704-en
Behavioral task
behavioral3
Sample
background.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
jquery-easyui-1.7.0/jquery.easyui.min.js
Resource
win7-20240704-en
Behavioral task
behavioral5
Sample
jquery-easyui-1.7.0/jquery.easyui.min.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
jquery-easyui-1.7.0/jquery.min.js
Resource
win7-20240708-en
Behavioral task
behavioral7
Sample
jquery-easyui-1.7.0/jquery.min.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
js/autotransmit.js
Resource
win7-20240704-en
Behavioral task
behavioral9
Sample
js/autotransmit.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
js/background.js
Resource
win7-20240704-en
Behavioral task
behavioral11
Sample
js/background.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
js/content.js
Resource
win7-20240708-en
Behavioral task
behavioral13
Sample
js/content.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
js/data.js
Resource
win7-20240705-en
Behavioral task
behavioral15
Sample
js/data.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
js/djsh.js
Resource
win7-20240729-en
Behavioral task
behavioral17
Sample
js/djsh.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
js/inject.js
Resource
win7-20240708-en
Behavioral task
behavioral19
Sample
js/inject.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
js/kmhzb.js
Resource
win7-20240704-en
Behavioral task
behavioral21
Sample
js/kmhzb.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
js/popup.js
Resource
win7-20240704-en
Behavioral task
behavioral23
Sample
js/popup.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
js/popupmultiunit.js
Resource
win7-20240729-en
Behavioral task
behavioral25
Sample
js/popupmultiunit.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
js/popupmultiunit_at.js
Resource
win7-20240705-en
Behavioral task
behavioral27
Sample
js/popupmultiunit_at.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
js/pzsh.js
Resource
win7-20240705-en
Behavioral task
behavioral29
Sample
js/pzsh.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
popup.html
Resource
win7-20240708-en
Behavioral task
behavioral31
Sample
popup.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
popupmultiunit.html
Resource
win7-20240705-en
General
-
Target
popup.html
-
Size
9KB
-
MD5
78ccf77c37e220683c7647e05a10a05a
-
SHA1
4186e533cd21d2170c6a619caa742bca8821ae07
-
SHA256
9e057891ebe6b985d007eb0e212170edd566494266f5cf16216c23b54acfc2c9
-
SHA512
10f594ca3a68e4d60e9ee06a3e04b5225e3c5675a4052981e73426ac4e762d260eddfb911e624bb5469e57db2a0f463fc981c9e480450db6f07de5636f6ebe44
-
SSDEEP
192:br90Bp4NZoB2r0/Ij99Rtwy9QKGqzmBDJYosIm1nW:n90Bp4NZod/Ij9zPQCzmlJY9U
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430516082" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{15490AD1-60BB-11EF-AB8C-CE9644F3BBBD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a048e9e9c7f4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000d6d352b278824474dd49357faf89d7a94f623911a0337a9e3c153fb9a8900edb000000000e800000000200002000000050a2124acf80fb76d4ea83430c1b556e03dd61505d606039a5baf9befea3b4d9200000000cada34320fa8624b65b56e1ed82311bbb874f97ac38dff9fe56a6e7611496fd40000000217390326e3be89283f6b75b97273416b3c6563d58c5e02633ec6e2a5f884ff7203b174878a8afe2f1991bb7ad24108712185b586f32b70f54d41a36aae71466 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2116 2532 iexplore.exe 30 PID 2532 wrote to memory of 2116 2532 iexplore.exe 30 PID 2532 wrote to memory of 2116 2532 iexplore.exe 30 PID 2532 wrote to memory of 2116 2532 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\popup.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4cca0b31d085fa76bf5eceb620ec104
SHA1aa8b46e8de97e50a570938f877a79bb74a703076
SHA256ce3cb89932d5cf44a945ddf854280fd0e579569fa01ec091348400ef87056dc6
SHA51260c618d10e0edd24f447d320cbb9b566e87ea195ae49b720694fb83991b0f610125a832819148cd598f5e4a2d7ec9441319b10d641fbff0be14fdd202d8d5e2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f8ec341d0a17697e5d86fccef46d0b8
SHA1547c7349a70e8278e13f9259c075435fda772265
SHA25649fc9f566d92136f420eb18e5072ea5316b479af2c38b3550a89738511964197
SHA51272da250aedf9ad31ca4c09ece00c07282029e62a0299ed2af0285a15979aff9f7524fcacdf3528fd2e847a16fe384fdfa36a3a89b0e7aca61bf14116752bac6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55567634df43d2587d9e8c8f134e40625
SHA1124430b063c8aafa4fdf5a0412daacec77c84bb4
SHA256ef50bd8cc875a52441b0fb503710dfd0283ce840126e81ba454e7d07df15fff7
SHA512c1ff1b17f681c9a99247ba5246f8e4ca4990dd27a30ea1a31b69904c29133b2b813023ad787b73cae8ce2a6ea2a8fd33195f8e9ebdf4cc089dfcb2b205632c99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fed03fbed65e145d85d677d544235d2d
SHA127edb9c8c82016a6ad35ca781d0addb0c07285a4
SHA2563853972515c4174f8f73983137adcebf58d1bec81329a2ff68e116cbf5f9e5cc
SHA51297d0425a034902320578d79022c477fbb25a792b0bdf97d08f659fd16b961c0de3ecc453f7495a7eb5fa54837e891dd743f91087586859054518814b4f0128b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59661f0d95084578f7225e2030cf2f9e2
SHA108fff74aa678b9420442a25ab5007ba140037d31
SHA25665eccc7e717efeb352239bc00c31dea17396d5653c4859695d7e5b95abb5e51e
SHA512110cfa4d1d0ed7c7fcb11a97aea8970201ac115784efc1ff9324c4d588ef18ea8a46c4d60fd7ab6d7d6d96ceb5291e9b47792d097d84983883b52024aa985bbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe5471ba4bf30202593c5fb5c70a7f3f
SHA19e96e45f83639c7e54a7fea3258872cf5f778e29
SHA256d3bd0a85dfc528c49c81f38db3ccc354d0a7fa69ae85b4d2acc29b80de491dcc
SHA5129d7982a8185b359694e03df773551f1337a855b0d1a417784c6122ea105e2feb801de2474f69308ad51f8af7848d2e5c9b82c9dd0558b8fa7467b4b4b796a982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df8ca348aef91a905e642504ee23be6f
SHA16a2d074120fb8d852aa620350c5816e15ffe1650
SHA256aa4fcd0862a84669fbb2fde6b456d6197e5292e6b097e986b505da5003e46928
SHA512892febb3a8600e50a60568296c7636a45106657ac0e9bf44c7ad31fd5848110d1ba0907285d63d6fc9e1a751d5aa4996c7ba85aeee0c3a849bfa69cc720b047c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5025bfdd7927c506a2896b308f58ccc8d
SHA10b552e0f57f9e9438e91fe60b3ddbc5ad84b5012
SHA256039f93af878c60e2908b779379e85c28dbc3e8d58e332a7f86a9d00ce66f5343
SHA512e85fc284922a4ba217bac71abac44ff1162e50732860437d8ee63b47df0fe41fe93b8e7470b3930d3014021b9405011e230382b35cf42c2eeeb51ecb57adcf1d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b