Overview
overview
7Static
static
7vpnclient/28ip.html
windows7-x64
3vpnclient/28ip.html
windows10-2004-x64
3vpnclient/gonggao.htm
windows7-x64
3vpnclient/gonggao.htm
windows10-2004-x64
3vpnclient/ip.html
windows7-x64
3vpnclient/ip.html
windows10-2004-x64
3vpnclient/ssm.html
windows7-x64
3vpnclient/ssm.html
windows10-2004-x64
3vpnclient/top.htm
windows7-x64
3vpnclient/top.htm
windows10-2004-x64
3vpnclient/...p.html
windows7-x64
3vpnclient/...p.html
windows10-2004-x64
3vpnclient2/28vpn.exe
windows7-x64
7vpnclient2/28vpn.exe
windows10-2004-x64
7vpnclient2....0.exe
windows7-x64
7vpnclient2....0.exe
windows10-2004-x64
vpnclient2....0.exe
windows7-x64
7vpnclient2....0.exe
windows10-2004-x64
7vpnclient2...ao.htm
windows7-x64
3vpnclient2...ao.htm
windows10-2004-x64
3vpnclient2/top.htm
windows7-x64
3vpnclient2/top.htm
windows10-2004-x64
3top.htm
windows7-x64
3top.htm
windows10-2004-x64
3vpnclient2...t2.lnk
windows7-x64
3vpnclient2...t2.lnk
windows10-2004-x64
6vpnclient2...op.htm
windows7-x64
3vpnclient2...op.htm
windows10-2004-x64
3vpnclient2...op.htm
windows7-x64
3vpnclient2...op.htm
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 19:22
Behavioral task
behavioral1
Sample
vpnclient/28ip.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
vpnclient/28ip.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
vpnclient/gonggao.htm
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
vpnclient/gonggao.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
vpnclient/ip.html
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
vpnclient/ip.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
vpnclient/ssm.html
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
vpnclient/ssm.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
vpnclient/top.htm
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
vpnclient/top.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
vpnclient/yyvpnip.html
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
vpnclient/yyvpnip.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
vpnclient2/28vpn.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
vpnclient2/28vpn.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
vpnclient2/28vpn_en_5.0.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
vpnclient2/28vpn_en_5.0.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
vpnclient2/28vpn_zh_5.0.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
vpnclient2/28vpn_zh_5.0.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
vpnclient2/gonggao.htm
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
vpnclient2/gonggao.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
vpnclient2/top.htm
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
vpnclient2/top.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
top.htm
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
top.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
vpnclient2/vpnclient2.lnk
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
vpnclient2/vpnclient2.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
vpnclient2/复件 (2) top.htm
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
vpnclient2/复件 (2) top.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
vpnclient2/复件 top.htm
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
vpnclient2/复件 top.htm
Resource
win10v2004-20240802-en
General
-
Target
vpnclient/gonggao.htm
-
Size
1KB
-
MD5
141e20590ae0e47f4921b51dadc3143c
-
SHA1
91b8a92e95147ba90cca66864b959cc7a0d67ac9
-
SHA256
09a4ba9dd83c8268063689eaf83a1eb9a667eaa1e2ab80a8676b5957d5cef319
-
SHA512
2cc063c5f62a4c512a1f2ac3a08a4e090105d70235f841090a1367e3697107883c6d9e675441e7fb692a28f91ebc4308ef546b08f76ad90ae102a97a8f110340
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4031c7541206db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000008f8b936ef6e6cba416e0ecb0ec047d2ddc00eeaeeeed7669ad7a5046ba6f251c000000000e800000000200002000000056f80fb7964f2bf3e1a2a943ce5b235838131b6a55b7b3dff050ed01e6c2d4252000000030fb533d8be41a53794a911526c25517970266801f28da612fde1a6a02a5be4a4000000022ecd84c453ddaae8e60ee4f8339aa9f3d06f8e4af5d5c18b3e31b7c62aad65d66dcbe707dea61afc4f2619b4ab559cdc42458fa37f962d51f36b06d24d34778 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{80408651-7205-11EF-B945-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432417214" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2820 2644 iexplore.exe 30 PID 2644 wrote to memory of 2820 2644 iexplore.exe 30 PID 2644 wrote to memory of 2820 2644 iexplore.exe 30 PID 2644 wrote to memory of 2820 2644 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\vpnclient\gonggao.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f78ac65ab95388e1a8f91a5208482c8
SHA1e287c5a8438cd17866f0aac7cf4cbf65705cf0d4
SHA256a3e331c92154ea672ddd086e7c35bc626ea843bd423729d5150f72c204086989
SHA512430cbc2a3446747494f1c8c9e1eb34e2537945f46ddf7499648263bb1b5c23dfe2808c82b0ef1c61516a2a9e202b625910bcf85b8949ee85ba179d07913fe808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca719aa0c6c51feded44f87ee84636e9
SHA14dbf39fd2b33665a4d6894639c7a01f6af15a979
SHA2564186a472b2f936f01201b6a30934b06206f96454d88681cb276f0bc978414bf9
SHA512ce5923bd95ca0596b1e8b6d56afad415618278f2904274c8de37be551a9a05d0dffc8dfd3dc3a2014b5bd35b4aceeb4950ebec707adbc1fd169bdfe4815ab5c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588e2f1f6d7146d66f16d1082e3303aa8
SHA14ecb2e8090d2f97225f653509b789333cd74ccab
SHA2560164a765354fbab491b474798e5650c9ce0033efb8b8a79d5315d3ea8fdbd4bb
SHA51283d80bc49a9cf7701e087b74f062b8e50cbcdde491d8026aa07f9fe88c50d7c746a360b1314dd753ea6e3f278b26c9311fbd057eea430cd3175559bd1317bf6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3ace56413ae5f72cc1b82cb948b5b02
SHA16efc6ef3738fed5f972cbb126c7c72b7fb5bc699
SHA2567c55673369049e6824e6005ebc54e33d0f8526e9a3b5d26161fad66fd8e9b039
SHA5127c99b8cfe262d524b090ddf3dc2342e6b9e2101064060b70e0717093fb0b6a937f4df83608af90fc1e98a991107ae764c8aba1ac347231c1b12c153e9d45310e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb701781983ac8836d2384820ea42d4b
SHA151b7b67e2986953fb27b1bcf48119f6c36c331c4
SHA256b1ace3873032d2c7ebc1476b510535c81c4745f16bdaa4f863ab194cc51076ba
SHA51266c2ae7ae741aafccde2d6378a97b83c413e27e3315f146a43ba15c5cceb84c1cd8a42815c346f3e4261ac7b24f91209890a95c31af10536e253914b61be0928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59683f98ed924c11f7e63ec9f1211bcff
SHA165a10f063908f411825066df4fad13d6b8d81f61
SHA2561446fb0385852ee553cac6930da275e3ca33dcded9f73133950f478af403a549
SHA512872c15d0aa53b2637965a31ca92ee9031b816d1779244d2d385c1e38ccc3a7c9355353b0d6564f9c9aa6f16da5ffcc7a9e30045d54e88c5c31b082b887a0e9fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aba9a886eec8f0ee98ffcedd6e9197ef
SHA1cbf76cb3c3ab05251df1ac41822536d218ebb463
SHA256e9d513da46d8bbd3167388c530c096abe0cc1a8bed79c410362f5b1768a72a79
SHA5127f6afb21d315c4a643df40f15b4de9b136b7ba1677e8d5bf58857b2634120fd06a3340078b2eab05050f9e16fced68bac5904a1a82fe4105f754cb933e6f0a9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a82fcbe4b7ee99dea057f424047cf153
SHA107964bfd4c277fec3592f31589996b87787d5feb
SHA2566fdb9498ef0ad761f151925ecd80bb345fa9f292130ff5c6a87d538cd0ab5b7b
SHA512ba5403250517dd89ca0c4b6b3d778789bcc247be3141692235ad59b58348fc7a9ae43ffceb59d9da9ced12a979c4d6d71fe25a967528f164ff992bfd10fb1984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b040307b1ccf3b40bd44dcbfadc12ad5
SHA11e77c0675bad269ce5dc7dd537c6ae20d4519015
SHA256da81547c9bb5c75c08c4a541f6f3ddd65db3ab3468d203d35e3198b98fea3b33
SHA5121f873e5ed4618380d744ef75f5a8a2d8ae93bdf78d5412a72ff43f3f4781c4831ec6ffd331d409a321a65eeceb59824b20cfd7fe8fcd376965cf9c4d520a6035
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b