Overview
overview
8Static
static
3StartAllBa....8.zip
windows11-21h2-x64
1StartAllBa....8.exe
windows11-21h2-x64
8$TEMP/Star...ge.svg
windows11-21h2-x64
1$TEMP/Star...nu.xml
windows11-21h2-x64
1$TEMP/Star...nu.svg
windows11-21h2-x64
1$TEMP/Star...md.xml
windows11-21h2-x64
1$TEMP/Star...or.xml
windows11-21h2-x64
1$TEMP/Star...og.xml
windows11-21h2-x64
1$TEMP/Star...te.xml
windows11-21h2-x64
1$TEMP/Star...ia.svg
windows11-21h2-x64
1$TEMP/Star...ss.xml
windows11-21h2-x64
1$TEMP/Star...es.svg
windows11-21h2-x64
1$TEMP/Star...it.xml
windows11-21h2-x64
1$TEMP/Star...il.xml
windows11-21h2-x64
1$TEMP/Star...ns.svg
windows11-21h2-x64
1$TEMP/Star...lp.xml
windows11-21h2-x64
1$TEMP/Star...ed.xml
windows11-21h2-x64
1$TEMP/Star...ut.xml
windows11-21h2-x64
1$TEMP/Star...en.svg
windows11-21h2-x64
1$TEMP/Star...el.svg
windows11-21h2-x64
1$TEMP/Star...nk.svg
windows11-21h2-x64
1$TEMP/Star...es.xml
windows11-21h2-x64
1$TEMP/Star...ow.xml
windows11-21h2-x64
1$TEMP/Star...ot.svg
windows11-21h2-x64
1$TEMP/Star...fg.exe
windows11-21h2-x64
1$TEMP/Star...64.dll
windows11-21h2-x64
1$TEMP/Star...64.dll
windows11-21h2-x64
1$TEMP/Star...n8.dll
windows11-21h2-x64
1$TEMP/Star... 7.dll
windows11-21h2-x64
1$TEMP/Star...ck.exe
windows11-21h2-x64
1Сохра...л.cmd
windows11-21h2-x64
7Тихая...а.cmd
windows11-21h2-x64
8Analysis
-
max time kernel
432s -
max time network
1155s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/09/2024, 09:04
Static task
static1
Behavioral task
behavioral1
Sample
StartAllBack-3.8.8.zip
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
StartAllBack-3.8.8.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
$TEMP/Start/Ribbon/theme-light/Windows.Computer.Manage.svg
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
$TEMP/Start/Ribbon/theme-light/Windows.CopyToMenu.xml
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
$TEMP/Start/Ribbon/theme-light/Windows.MoveToMenu.svg
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
$TEMP/Start/Ribbon/theme-light/Windows.MultiVerb.cmd.xml
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
$TEMP/Start/Ribbon/theme-light/Windows.MultiVerb.cmdPromptAsAdministrator.xml
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
$TEMP/Start/Ribbon/theme-light/Windows.RibbonPermissionsDialog.xml
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
$TEMP/Start/Ribbon/theme-light/Windows.shareprivate.xml
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
$TEMP/Start/Ribbon/theme-light/accessmedia.svg
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
$TEMP/Start/Ribbon/theme-light/easyaccess.xml
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
$TEMP/Start/Ribbon/theme-light/windows.SystemProperties.svg
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
$TEMP/Start/Ribbon/theme-light/windows.edit.xml
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
$TEMP/Start/Ribbon/theme-light/windows.email.xml
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
$TEMP/Start/Ribbon/theme-light/windows.folderoptions.svg
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
$TEMP/Start/Ribbon/theme-light/windows.help.xml
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
$TEMP/Start/Ribbon/theme-light/windows.hideSelected.xml
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
$TEMP/Start/Ribbon/theme-light/windows.layout.xml
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
$TEMP/Start/Ribbon/theme-light/windows.open.svg
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
$TEMP/Start/Ribbon/theme-light/windows.openControlPanel.svg
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
$TEMP/Start/Ribbon/theme-light/windows.pastelink.svg
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
$TEMP/Start/Ribbon/theme-light/windows.removeproperties.xml
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
$TEMP/Start/Ribbon/theme-light/windows.slideshow.xml
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
$TEMP/Start/Ribbon/theme-light/windows.troubleshoot.svg
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
$TEMP/Start/StartAllBackCfg.exe
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
$TEMP/Start/StartAllBackLoaderX64.dll
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
$TEMP/Start/StartAllBackX64.dll
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
$TEMP/Start/Styles/Plain8.dll
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
$TEMP/Start/Styles/Windows 7.dll
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
$TEMP/Start/UpdateCheck.exe
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
Сохранить текущие настройки в файл.cmd
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
Тихая установка.cmd
Resource
win11-20240802-en
General
-
Target
$TEMP/Start/Ribbon/theme-light/easyaccess.xml
-
Size
2KB
-
MD5
bd71ae5561063094ecdbb18d0f38d474
-
SHA1
e2eee62bfd715d2bb807ff1daf354f2954f93efc
-
SHA256
3a58ece9da8a88a997fb95b0ed8d81f223218f2e089192b451df8a451fcc9800
-
SHA512
f9c39d0a4c438402ae71eba7fce031db76c9616ec9b88592fc6f7d80b73b57d6333f567844ea13209afa662e1f879812cb0dfd0a40772d9a94be210c5cedff29
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "13" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPMigrationVer = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListXMLVersionLow = "395196024" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListXMLVersionHigh = "268435456" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\VersionManager\FirstCheckForUpdateHighDateTime = "31131311" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\GPU\DeviceId = "140" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\StaleCompatCache = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListDomainAttributeSet = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\VersionManager\FirstCheckForUpdateLowDateTime = "834107203" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "8" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\BrowserEmulation iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\GPU\VendorId = "4318" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\StaleCompatCache = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\GPU\SoftwareFallback = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\HomepagesUpgradeVersion = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\GPU\Revision = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "268435456" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "395196024" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "9" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000\Software\Microsoft\Internet Explorer\GPU\SubSysId = "0" iexplore.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4148 wrote to memory of 4552 4148 MSOXMLED.EXE 78 PID 4148 wrote to memory of 4552 4148 MSOXMLED.EXE 78
Processes
-
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\$TEMP\Start\Ribbon\theme-light\easyaccess.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\$TEMP\Start\Ribbon\theme-light\easyaccess.xml2⤵
- Modifies Internet Explorer settings
PID:4552
-