Overview
overview
1Static
static
1Payload/Ze...roller
macos-10.15-amd64
1Payload/Ze...bImage
macos-10.15-amd64
1Payload/Ze.../Zebra
macos-10.15-amd64
1Payload/Ze...s.html
windows7-x64
1Payload/Ze...s.html
windows10-2004-x64
1Payload/Ze...min.js
windows7-x64
1Payload/Ze...min.js
windows10-2004-x64
1Payload/Ze...n.html
windows7-x64
1Payload/Ze...n.html
windows10-2004-x64
1Analysis
-
max time kernel
100s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07-03-2023 00:06
Static task
static1
Behavioral task
behavioral1
Sample
Payload/Zebra.app/Frameworks/LNPopupController.framework/LNPopupController
Resource
macos-20220504-en
Behavioral task
behavioral2
Sample
Payload/Zebra.app/Frameworks/SDWebImage.framework/SDWebImage
Resource
macos-20220504-en
Behavioral task
behavioral3
Sample
Payload/Zebra.app/Zebra
Resource
macos-20220504-en
Behavioral task
behavioral4
Sample
Payload/Zebra.app/installed_files.html
Resource
win7-20230220-en
Behavioral task
behavioral5
Sample
Payload/Zebra.app/installed_files.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
Payload/Zebra.app/ios7.min.js
Resource
win7-20230220-en
Behavioral task
behavioral7
Sample
Payload/Zebra.app/ios7.min.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
Payload/Zebra.app/package_depiction.html
Resource
win7-20230220-en
Behavioral task
behavioral9
Sample
Payload/Zebra.app/package_depiction.html
Resource
win10v2004-20230220-en
General
-
Target
Payload/Zebra.app/package_depiction.html
-
Size
644B
-
MD5
32fcac54fdfe9158497c1ef2920d7156
-
SHA1
25b20b3ce262dbd790e2d2c1a1748484c053bb69
-
SHA256
018737a6ebce460a1a8f29b581450285feabda48260c158b4335b654d2b95566
-
SHA512
605abb23468914a45ad11b8211b4bc2f1b43b3e2c7c442e8c30e26f7ad2e46584d9133491bb127aa44e3bef6f600546e4e1dbf58fe23cbd768ec423158fe386a
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007837404bb2ac374381d657b4bfd4f9e2000000000200000000001066000000010000200000005fea0b080f108db0ae2ebf0bc91b6b600975039628f160eb56599954450d0132000000000e80000000020000200000001294b66d8d4e744ee0b9931f5e5430887911f0ea8d8c8b4c77e0ba998b31d31a20000000f9230f6bbcde41c6cb88129681eb04149dd8208187ed7c1a745349c835faf21b400000004ef262732c4e0023783d54f73b53479c705389f6d64792a1e70f3597f27beea5ad02fcd4f23710016009e6b14ef969d6435f7e916118ad8f010c646e65fd1c73 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6557A0E1-BC84-11ED-810E-724BB54F6CA2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f07da73c9150d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "384916210" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007837404bb2ac374381d657b4bfd4f9e20000000002000000000010660000000100002000000062b845d265312edd294f45d9c258f788384faf05655c00f6f004cfb777494e03000000000e8000000002000020000000a31156abd0245f45ce2ed2ea0039899e260acb9ac23991f16b7e0b766a2c45cd90000000fbb87b669f3e87caeec7b4523a35683ec29bcb7e875d43d63264ccba09aea28fb6eb7d984f56d03aaf164d6c4633833db8f1eec61940c87012f775e27b3fb3b0323bcad8cd9dd79b003940b84c7469261ada0dc75148e7f5c4c4e7083d93576d649e2bd65667e1beeb0b814ec256d41829a272ee8cc17184db1e344506517941ba1a635de1fe06bd9a0a17fd6c6f12964000000060dbc2d0bd3a2c90484f3750ea3429ca062737ff5a0ee7b5e9e69d30f5f30eeafbe40f76624543baed87d0d3904c21a102dcd7726ea12a5e355c47e6c9c455b8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1544 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1544 iexplore.exe 1544 iexplore.exe 680 IEXPLORE.EXE 680 IEXPLORE.EXE 680 IEXPLORE.EXE 680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1544 wrote to memory of 680 1544 iexplore.exe 29 PID 1544 wrote to memory of 680 1544 iexplore.exe 29 PID 1544 wrote to memory of 680 1544 iexplore.exe 29 PID 1544 wrote to memory of 680 1544 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Payload\Zebra.app\package_depiction.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1544 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:680
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5da07e377c47617b1e20060ea89d6b004
SHA12f132c196b5a7c34cedc28ed937a345b2cde5a9a
SHA2567ad9d61b844c804861663b8a908f6baaf8b88c3e94707e02b2ee00a77a56841f
SHA512edb31577053a1e7e15d4835d933cb7e6bfd0b12ae8087e538fa21adcc104d80f1138a8371a2cc2bd57b07cda159fb56265301c697a5a7b1d0cdc3cc3c5a26ccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bb6ba34618338b69fc29b86b3fc5706d
SHA13c15e7d9c118d9cf95fc097ea6bd75b829377f30
SHA2566f4fb4130bf09e8f63bfaf4bc2c2a7aa3b6b66eac5d454a7fefe56d19894dbe5
SHA5127d2e6bf77bdb639bec6d79c2aa942cea6a18c1ef167b002c300097c33f53e1fc0f6cf2985fd2bd542045349b2c7551b3097dfb4bf99e4f1c8de3bf1223361be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b33ab8b19c975d95a676043f03b57774
SHA18261160264a16b78f820527de3b862738c19378c
SHA256e63afb4451cd88fc7eec31b74d1494e3398fa71199f5f71ca80955d011e509b5
SHA512e2528b7e9cdc56a2a4c1a3177548966e27905580b7957c59283e048e08e9e568c531fbe636e355d8a8ae4753637ee7ee5ceba88193da770ccee47f37b841a554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b337f0c626650dfa84a528075c32357d
SHA18d9d64b27d5b475611d1894dc4be7b8de3db811e
SHA256f3d517d8e1d7eff405a5adc63151768993b6ea755db57c054fab6be9e242faa0
SHA5123fab383cc47301f1137189f2e694a7b557dc38299d7a208ca564e2e674b9fb4793fdbaac965232b7041a813f788b5eb112c8fd3c99600a9f22ba5fdee645d079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD512f5537f97a24f628e830a614a66a1d0
SHA12296ee8d38631c23e8dc3c23be435f9d4bd741df
SHA256da9be1f58f7cfd7359602cafb33b11b16ac37aa2dbb2dd65204db07d642759dc
SHA512bc47040d7678a20da3f3692de7ed6cf3179a946ef974fc9484d180c2f256abec4a9987a2c29176009daf3c6dbc65e716f5b66c38fd312a2168005367059c2d24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD561f29860330c62a2b8c556a2fe212644
SHA194b9f2f6ce7880350ca0a571cfa0aa69c559ce02
SHA256a6bd701ccef92d4c3695d95a44642b3f9306791933a541fc7e8b9fd8c2fe87a7
SHA51266364e513aebbd8b4f7cce756d7ddae709eaa8380c6528e3d95b842be01c12c2c55fe8d587b00ef7ca29b252631c286580ff39f96d1e769beee062753f3cfbdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e07e1b3737332e17df2d44372099a002
SHA15fe84becec12a653591152847dc2da09a6245a60
SHA2568d5791ec6f6345c0c87e84473556444e9b6bc0c87409ffe53ecab0cf8143cdd3
SHA512b5bc0a0904248d0fbc1d2507682f353f76fefd39e179b6e772ecfff7f05da9640432cae7758a902d7b78076ab1f4818ae2de8afb4389a0c86f219f37114ad303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD557a39c85019da9baeea8f98e233fbfa6
SHA12a8d81630c39a3b0397c307553a9512ac97e1af7
SHA2566e7c059e992063b40ce426bb2819c3622187a8fda066b3e6b6f88e3327b369e5
SHA51221d01f931f97023b473c2d03792e9d2e22b1410498fcac120cdac886c59c63a37c094d89b5d83d3564ccdc57fb1b4bb1f7fc48d15b8d2ef0435da15c4ece8cd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e9cfd519159cbf7047a345fa9e36a2e4
SHA18539f5170504ea95fc1549f0bb394b6bc9791240
SHA256322f31510e6d54fe40e56a83ca9d01897ff5bb69ebc9b3c34e689128eb2446fc
SHA5122c4e26e35cc30477839769286748904c7f4885c792bd07a523c8a6af5182b2f3a4b73235e035b12e47c7240f5b4f957e7b7677eaff87e28f9a7dd594873e6396
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UOYUJSME\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
602B
MD5971a1d4ba780d8a6029e2571084b5622
SHA1d13bc04e18e478a9bcf21cae65f390ecd722a4fc
SHA25613664980ba5dd3bd7546d8ace924613b070e280d44e414711be670eb8e798827
SHA5128444899d2e79a90b6fdb30ed058852a737ad1e2d872ed3ede69bd9116755833ae14c614569cfd7fff94ced775eb3d13b90d57602f093049c1a21480647bdfc41