Overview
overview
3Static
static
1adminbiz/e...fo.ps1
windows7-x64
3adminbiz/e...fo.ps1
windows10-2004-x64
3adminbiz/�...��.url
windows7-x64
1adminbiz/�...��.url
windows10-2004-x64
1ajax/bizcate.ps1
windows7-x64
3ajax/bizcate.ps1
windows10-2004-x64
3api/js_dp.ps1
windows7-x64
3api/js_dp.ps1
windows10-2004-x64
3bizadmin/s...fo.ps1
windows7-x64
3bizadmin/s...fo.ps1
windows10-2004-x64
3cms/search.ps1
windows7-x64
3cms/search.ps1
windows10-2004-x64
3flei/search.ps1
windows7-x64
3flei/search.ps1
windows10-2004-x64
3flei/viewflinfo.ps1
windows7-x64
3flei/viewflinfo.ps1
windows10-2004-x64
3images/35/XM35com.js
windows7-x64
3images/35/XM35com.js
windows10-2004-x64
3images/35/...ter.js
windows7-x64
3images/35/...ter.js
windows10-2004-x64
3images/35/core.js
windows7-x64
3images/35/core.js
windows10-2004-x64
3images/35/counter.js
windows7-x64
3images/35/counter.js
windows10-2004-x64
3images/35/...ype.js
windows7-x64
3images/35/...ype.js
windows10-2004-x64
images/35/stat.htm
windows7-x64
3images/35/stat.htm
windows10-2004-x64
3images/35/...02.htm
windows7-x64
3images/35/...02.htm
windows10-2004-x64
3images/index.htm
windows7-x64
3images/index.htm
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 00:42
Static task
static1
Behavioral task
behavioral1
Sample
adminbiz/editbizinfo.ps1
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
adminbiz/editbizinfo.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
adminbiz/新云软件.url
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
adminbiz/新云软件.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
ajax/bizcate.ps1
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
ajax/bizcate.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
api/js_dp.ps1
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
api/js_dp.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
bizadmin/savebizinfo.ps1
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
bizadmin/savebizinfo.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
cms/search.ps1
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
cms/search.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
flei/search.ps1
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
flei/search.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
flei/viewflinfo.ps1
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
flei/viewflinfo.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
images/35/XM35com.js
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
images/35/XM35com.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
images/35/converter.js
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
images/35/converter.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
images/35/core.js
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
images/35/core.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
images/35/counter.js
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
images/35/counter.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
images/35/prototype.js
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
images/35/prototype.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
images/35/stat.htm
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
images/35/stat.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
images/35/stat_002.htm
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
images/35/stat_002.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
images/index.htm
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
images/index.htm
Resource
win10v2004-20240802-en
General
-
Target
images/index.htm
-
Size
1B
-
MD5
7215ee9c7d9dc229d2921a40e899ec5f
-
SHA1
b858cb282617fb0956d960215c8e84d1ccf909c6
-
SHA256
36a9e7f1c95b82ffb99743e0c5c4ce95d83c9a430aac59f84ef3cbfab6145068
-
SHA512
f90ddd77e400dfe6a3fcf479b00b1ee29e7015c5bb8cd70f5f15b4886cc339275ff553fc8a053f8ddc7324f45168cffaf81f8c3ac93996f6536eef38e5e40768
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 401bdf380807db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{647E5771-72FB-11EF-9747-6AA0EDE5A32F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432522819" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000d11f50614e4d5f839cfe6dcf8b9782ad85dab267fc9859540b70e0c74b8ecc2c000000000e8000000002000020000000c40f9cd605c1d452da3c7846455947b67e777efff3b93b2e317190cb667e7c8e20000000033f1d4054b03b107f858a4f4a93b1c6623dae7d115c27050b405a8354d8b90540000000d689246e7146b0bf358a610b2fde8c9c4ca3542d04ea20bf88d003b4f73b31da43bc430f5dc414de550d8e211db5cc756e94750c8a4f4b3a416fb4624ef739ff iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3012 iexplore.exe 3012 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 3012 wrote to memory of 3020 3012 iexplore.exe IEXPLORE.EXE PID 3012 wrote to memory of 3020 3012 iexplore.exe IEXPLORE.EXE PID 3012 wrote to memory of 3020 3012 iexplore.exe IEXPLORE.EXE PID 3012 wrote to memory of 3020 3012 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\images\index.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523840e3e9c8eb150d79e72a1655e23ed
SHA1f451da00cc7950191fd9c95b38d7e7dd6ed9ddb1
SHA256b6addff8ab6931afb7e035a2fa2aba984db7ca57e0eeddf134d75d1defe58d15
SHA512a28614d5b73f9384a3512796cc57cd635626d1dd2d6c6b274247953cd6d7090d1e18530ade781ebbab7b9a9a56927133d86721a2ba35feb7e7e406ac70165cf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db954e4450b3c4baecb92221bb0d9a58
SHA12bafab45914ef6408c0ae200b7af322dfabf1ede
SHA25636e3dcd348bd4047513424baa1f95ed1e125a57ce89b6212c7e9ecd2f5855e56
SHA512fc8a20e7aff80a8aadac02a4127db5a2d2386f7f3bd58c018d17334cd08f0ab320080d3957e41f5afc05ca6bc498e87cbb4abde6dc2d4d6e5b67eb639a5ca956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58940f8cdd6e1e7c9e0d76679e660eff5
SHA1431460ef83a8cd604d20f9b32c854e83fca6d891
SHA256a089f62c0b52518334929a0592d9dca9bea079107ef9fcafbfdea2801469af28
SHA51237493912e0859cf89c475a0f28d24cbd5a95aba3de958b7e1cfb78ca2727fa25c1b4fee5325f72b61cf4c45acc7b74d0d568c2314fbd815d939a9e9afa90172f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5712b3751d2147a8f6df70881d9c520a0
SHA1e7025aab8229d9588a90d083b5734c02cc5444c4
SHA256cc2c386ab9c213e4052058a5335c061d6faa01f7592478c2794c18cae61fc8af
SHA512ffb67797de12d7b6f3c9fcf7a65a84f32dfeda9aae59528368dc910e03458529335d53c599b1c3c0ab2ca32774c6e2bc577891a54253c2c556c3a481d175b4d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb66f55a1052db1823ec1666382ffaea
SHA13ff82974714e43573aa115015e274a9b78d69b21
SHA25636ff262c1821bc82af9d414a83205b72f4248d5060b21018571383ce2c83277a
SHA512a899d3cc4cc355645e59dc28d06a8c4b6ca1ea9fddaaaaa6332c2a25340fe9542c4b7410ba22bf56da3e883aa3643809994bb84da3b83a9c5aaa2275a30893ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7f84e793fa0b33f15dcd36eed192819
SHA1fae8e1c5cf6d70b6637aa46559a1634f8ab1d350
SHA256da456b3f74a64cdb6941952795c368a8acc734b09173f05d7fabc6a6b5d96318
SHA512d5e7c2e7ae8a7d52e1cbce6f3d0a8a27c92c1bbdbd6cc08fa55a3ba02f92def40a2073513a172f4e867646c9132b2732023d841acfb64e477cb88faa4b92c074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c289a6479c05d888bbc30b43ccd7bbc
SHA1ef04596e6fa5880f929e8d23a89787f7554f5e16
SHA2564a72c80b2735155bad77c531679c770c24ad3d023f5acf75f8ad68e759c52ea0
SHA51221e3b585375b4aca3c3a586321c63f64a1653f67c54979be3f1b961720472de601f6e25038b85ec801aed7815e4b0bb3a77618c62cfc0fb1011a34026fb1885d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579ecc0dd88b4d1f58fe9dfc532cb0c04
SHA128d015cbe78ecf5ed6de10d5894f2f2e79de1617
SHA256f3f07266ae512f7ff8f0d3ec650b462168121c28f4447593b7092cd9065f8a1c
SHA5129ff6cde38a2fdd1e58258603ee3a7419859f8a410426b5a38e6e7d50ccfd0a234f24ef4df5f51010e5152934571fbec73ce0a1aed30eb157d5c6a3386dd364e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500dc55269db889943d9bed787f25a85b
SHA13d154024449bd94ce9ebe4b60d0d5205dc7a7d84
SHA256058547e1361dd795e5b32a81131de061718fdc68f288089aad69bc29acef0a59
SHA51203c384949ba807ea72cfb3223f84492c146d1839c5ba8bb635a5ad2e48e5ca0693571b8c6db8b7e3f8b1679d9c2abcde6bc1273b1ba24059e13561c883833497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54101075ae8efad7194becffe56d8f201
SHA106c1f2094341d31bbbabd2987227354e3fd33384
SHA25670a491907fbe7239676d70fceb21d93c61a11dd1de92f89659676f80d78b733a
SHA5129fbca217b40abf5b39eecde21fd662c3f2f0da4103674684961227fd13e0bbd446cae39d111197ae5f921438c66580238d22d22348f17f76121ae32d36545446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569f8405b4d2510e0749592ad82538315
SHA1d5bbfda5b18cd77c4aef8666de3cc05d786b7a05
SHA2562edc90c6d0bb948fa56ea7c3f77df68b75c705b74e5321b370a48bcb17dde12a
SHA512afa3140daba2e333b3268776db25532fe204ae7a65ede3ae8be7f53d2a3997273a83b08bc6ca97ca4c5be4581625e42cd2eda8b1be451f258bc44c80491c4792
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b