Overview
overview
7Static
static
URLScan
urlscan
1https://chat.grupo-w...
windows7-x64
1https://chat.grupo-w...
windows10-2004-x64
1https://chat.grupo-w...
android-9-x86
7https://chat.grupo-w...
android-10-x64
1https://chat.grupo-w...
android-11-x64
1https://chat.grupo-w...
ubuntu-18.04-amd64
https://chat.grupo-w...
debian-9-armhf
https://chat.grupo-w...
debian-9-mips
https://chat.grupo-w...
debian-9-mipsel
Analysis
-
max time kernel
234s -
max time network
194s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/01/2023, 21:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://chat.grupo-whatts-free.click/LPJttvNoGX583VW5BzoPJ8
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
https://chat.grupo-whatts-free.click/LPJttvNoGX583VW5BzoPJ8
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
https://chat.grupo-whatts-free.click/LPJttvNoGX583VW5BzoPJ8
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral4
Sample
https://chat.grupo-whatts-free.click/LPJttvNoGX583VW5BzoPJ8
Resource
android-x64-20220823-en
Behavioral task
behavioral5
Sample
https://chat.grupo-whatts-free.click/LPJttvNoGX583VW5BzoPJ8
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral6
Sample
https://chat.grupo-whatts-free.click/LPJttvNoGX583VW5BzoPJ8
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral7
Sample
https://chat.grupo-whatts-free.click/LPJttvNoGX583VW5BzoPJ8
Resource
debian9-armhf-20221111-en
Behavioral task
behavioral8
Sample
https://chat.grupo-whatts-free.click/LPJttvNoGX583VW5BzoPJ8
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral9
Sample
https://chat.grupo-whatts-free.click/LPJttvNoGX583VW5BzoPJ8
Resource
debian9-mipsel-20221111-en
General
-
Target
https://chat.grupo-whatts-free.click/LPJttvNoGX583VW5BzoPJ8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003bad9e5810411a41b405bdc87c3b0eb8000000000200000000001066000000010000200000008649d4162647e2c5e9929c6c43f9bced1d0cab96244287770e4e276829e1cd35000000000e80000000020000200000007e6497cc4b85162319f1b53b2eeb8fe5973008fe02c54d42c23834aa1933f0772000000037b7abc8376520e41ff0fb578ac7da1f187ca2e9872baf5133cc901d9208bcc34000000038413f7c54e80a3ed729d7d47927010ddc2a1de43df111e1b2991eb310047df8dc7d1ba0435c60f95c19565a85ab99e14572c108dff03b50f813efb22a25b748 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{81AE5421-8E10-11ED-AC54-767CA9D977BF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0aefb5a1d22d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "379808682" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2012 msdt.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1740 iexplore.exe 2012 msdt.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 1172 IEXPLORE.EXE 1172 IEXPLORE.EXE 1172 IEXPLORE.EXE 1172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1740 wrote to memory of 1172 1740 iexplore.exe 29 PID 1740 wrote to memory of 1172 1740 iexplore.exe 29 PID 1740 wrote to memory of 1172 1740 iexplore.exe 29 PID 1740 wrote to memory of 1172 1740 iexplore.exe 29 PID 1172 wrote to memory of 2012 1172 IEXPLORE.EXE 31 PID 1172 wrote to memory of 2012 1172 IEXPLORE.EXE 31 PID 1172 wrote to memory of 2012 1172 IEXPLORE.EXE 31 PID 1172 wrote to memory of 2012 1172 IEXPLORE.EXE 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://chat.grupo-whatts-free.click/LPJttvNoGX583VW5BzoPJ81⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\msdt.exe-modal 786772 -skip TRUE -path C:\Windows\diagnostics\system\networking -af C:\Users\Admin\AppData\Local\Temp\NDFA287.tmp -ep NetworkDiagnosticsWeb3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2012
-
-
-
C:\Windows\SysWOW64\sdiagnhost.exeC:\Windows\SysWOW64\sdiagnhost.exe -Embedding1⤵PID:756
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ce0a4d8252b9c34aa954d4ab424beb11
SHA1af4d2d292dd681c35facfe9de8e327c4f8b7e32d
SHA256d8261aee084c4eaa3c115f5993c35e8ac7025ca8bef209a7a30710a58ca99101
SHA512f6cffed6d69951022dc887cea07c5341a58f15c623ec457797f50dff3aeb1e50b669e61e353bcaeda7db1ab8b225dba4aaec689539cae68de22a051971beaad6
-
Filesize
608B
MD52dea6fa7cb631accf114f45c02b319d1
SHA16decb5894ad922e69b0dad3f0da413b249a092d5
SHA256e0e2c3ff355aa517decf129768d120efa441fc88fa0c97ca930f28fa2e62f988
SHA512e5b9279d1ccdbe22f9bcede4be04cddbef6c515efd06082509a51f45c311b1d53cda659d20e56723d34ae5cf4e13fa8b93812ea35d4be26c971a7a293a51b1c8
-
Filesize
23KB
MD51d192ce36953dbb7dc7ee0d04c57ad8d
SHA17008e759cb47bf74a4ea4cd911de158ef00ace84
SHA256935a231924ae5d4a017b0c99d4a5f3904ef280cea4b3f727d365283e26e8a756
SHA512e864ac74e9425a6c7f1be2bbc87df9423408e16429cb61fa1de8875356226293aa07558b2fafdd5d0597254474204f5ba181f4e96c2bc754f1f414748f80a129
-
Filesize
52KB
MD52f7c3db0c268cf1cf506fe6e8aecb8a0
SHA1fb35af6b329d60b0ec92e24230eafc8e12b0a9f9
SHA256886a625f71e0c35e5722423ed3aa0f5bff8d120356578ab81a64de2ab73d47f3
SHA512322f2b1404a59ee86c492b58d56b8a6ed6ebc9b844a8c38b7bb0b0675234a3d5cfc9f1d08c38c218070e60ce949aa5322de7a2f87f952e8e653d0ca34ff0de45
-
Filesize
2KB
MD50c75ae5e75c3e181d13768909c8240ba
SHA1288403fc4bedaacebccf4f74d3073f082ef70eb9
SHA256de5c231c645d3ae1e13694284997721509f5de64ee5c96c966cdfda9e294db3f
SHA5128fc944515f41a837c61a6c4e5181ca273607a89e48fbf86cf8eb8db837aed095aa04fc3043029c3b5cb3710d59abfd86f086ac198200f634bfb1a5dd0823406b
-
Filesize
5KB
MD5dc9be0fdf9a4e01693cfb7d8a0d49054
SHA174730fd9c9bd4537fd9a353fe4eafce9fcc105e6
SHA256944186cd57d6adc23a9c28fc271ed92dd56efd6f3bb7c9826f7208ea1a1db440
SHA51292ad96fa6b221882a481b36ff2b7114539eb65be46ee9e3139e45b72da80aac49174155483cba6254b10fff31f0119f07cbc529b1b69c45234c7bb61766aad66