Overview
overview
6Static
static
34.ƾ֤�....6.exe
windows10-2004-x64
6background.html
windows7-x64
3background.html
windows10-2004-x64
3jquery-eas...min.js
windows7-x64
3jquery-eas...min.js
windows10-2004-x64
3jquery-eas...min.js
windows7-x64
3jquery-eas...min.js
windows10-2004-x64
3js/autotransmit.js
windows7-x64
3js/autotransmit.js
windows10-2004-x64
3js/background.js
windows7-x64
3js/background.js
windows10-2004-x64
3js/content.js
windows7-x64
3js/content.js
windows10-2004-x64
3js/data.js
windows7-x64
3js/data.js
windows10-2004-x64
3js/djsh.js
windows7-x64
3js/djsh.js
windows10-2004-x64
3js/inject.js
windows7-x64
3js/inject.js
windows10-2004-x64
3js/kmhzb.js
windows7-x64
3js/kmhzb.js
windows10-2004-x64
3js/popup.js
windows7-x64
3js/popup.js
windows10-2004-x64
3js/popupmultiunit.js
windows7-x64
3js/popupmultiunit.js
windows10-2004-x64
3js/popupmu..._at.js
windows7-x64
3js/popupmu..._at.js
windows10-2004-x64
3js/pzsh.js
windows7-x64
3js/pzsh.js
windows10-2004-x64
3popup.html
windows7-x64
3popup.html
windows10-2004-x64
3popupmultiunit.html
windows7-x64
3Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 19:16
Static task
static1
Behavioral task
behavioral1
Sample
4.ƾ֤С/ƾ֤˹/ƾ֤˹2024.3.6.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
background.html
Resource
win7-20240704-en
Behavioral task
behavioral3
Sample
background.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
jquery-easyui-1.7.0/jquery.easyui.min.js
Resource
win7-20240704-en
Behavioral task
behavioral5
Sample
jquery-easyui-1.7.0/jquery.easyui.min.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
jquery-easyui-1.7.0/jquery.min.js
Resource
win7-20240708-en
Behavioral task
behavioral7
Sample
jquery-easyui-1.7.0/jquery.min.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
js/autotransmit.js
Resource
win7-20240704-en
Behavioral task
behavioral9
Sample
js/autotransmit.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
js/background.js
Resource
win7-20240704-en
Behavioral task
behavioral11
Sample
js/background.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
js/content.js
Resource
win7-20240708-en
Behavioral task
behavioral13
Sample
js/content.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
js/data.js
Resource
win7-20240705-en
Behavioral task
behavioral15
Sample
js/data.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
js/djsh.js
Resource
win7-20240729-en
Behavioral task
behavioral17
Sample
js/djsh.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
js/inject.js
Resource
win7-20240708-en
Behavioral task
behavioral19
Sample
js/inject.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
js/kmhzb.js
Resource
win7-20240704-en
Behavioral task
behavioral21
Sample
js/kmhzb.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
js/popup.js
Resource
win7-20240704-en
Behavioral task
behavioral23
Sample
js/popup.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
js/popupmultiunit.js
Resource
win7-20240729-en
Behavioral task
behavioral25
Sample
js/popupmultiunit.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
js/popupmultiunit_at.js
Resource
win7-20240705-en
Behavioral task
behavioral27
Sample
js/popupmultiunit_at.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
js/pzsh.js
Resource
win7-20240705-en
Behavioral task
behavioral29
Sample
js/pzsh.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
popup.html
Resource
win7-20240708-en
Behavioral task
behavioral31
Sample
popup.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
popupmultiunit.html
Resource
win7-20240705-en
General
-
Target
popupmultiunit.html
-
Size
3KB
-
MD5
6f1ffd7d5e36f2da71f99e3212e2417f
-
SHA1
f116c1ca344eb1785a9708ac78ccf23a88422068
-
SHA256
deecc4170ab28e38747708d9b66d761668d0e8fbd8a6906418a5bc1c455620b3
-
SHA512
3203ba16c65dc6cead1e15aabf3fde91913dd88faa4989eec0416f76500046924d5b8c826450f0a8b5221db2c4331f030bed7d3b6571b86c45f336f3e69379e9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430516103" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ec2cebc7f4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{168A9B21-60BB-11EF-A1F7-DA486F9A72E4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000257471b61b8e4d636ca4a001ad3111084d4db5757700925491b9741253abad0f000000000e80000000020000200000006c364b565434d951308c415a4bef95700f5fc0fa170b053d4ba57bea84c66dce20000000902f42fadf41562e6513bb260e31fee9a93e41c4fca5069312cfd64e8742f7784000000011e40c60ef7ce278ee3fc53e25a8d7e7c74c5f90bc63cab89a4de319f1e26ed5e1bc0296320cbc7f18f860cc96b175d2be74f14abb24a67f13251885dcc1d10a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2764 iexplore.exe 2764 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2560 2764 iexplore.exe 31 PID 2764 wrote to memory of 2560 2764 iexplore.exe 31 PID 2764 wrote to memory of 2560 2764 iexplore.exe 31 PID 2764 wrote to memory of 2560 2764 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\popupmultiunit.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2764 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8c9eec3842872a18310e3cc06ad7bf2
SHA1bfc99d0090c89308e29709362e15e55a9d5aab7c
SHA256faf86e4c0fb3ac0209cfc516e0196f03bbd964706ac60001dda82495706ad834
SHA5128fd699c5af3adb5097332466fca59dae666cd50bd027a93cd64bee083e1ccddf232396a6db072b99a3d9ba34ef4c335a5f8ecbbb6d02889b11d694468bc81913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0fc9e060bb29ac0d3814de364abcf90
SHA1b3778c3b797bfd9d1677907480577dea1ef95796
SHA256e8e955041e5f93bda3b71bc4f6a3f09577dec9e100fdd26638be8081cbf85b4b
SHA51254b73d17b3d3591366d54b9698ea0f4ce4de9ec6e13d653098e543e9d38d95fdf316bafafd8f2c5289c65ea22b068ccfea9020de89e48b0fceee39b8b225a7ea
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b