Analysis
-
max time kernel
148s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
24/05/2023, 16:47
Static task
static1
Behavioral task
behavioral1
Sample
YTMp3_YTMP3WEB_v4.6.1.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
platform_download_use.html
Resource
win7-20230220-en
Behavioral task
behavioral3
Sample
platform_download_use.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
search_download_use.html
Resource
win7-20230220-en
Behavioral task
behavioral5
Sample
search_download_use.html
Resource
win10v2004-20230220-en
General
-
Target
search_download_use.html
-
Size
1KB
-
MD5
37e7684c5ed67d4dbc24e5e91a56d54e
-
SHA1
10aa27c6e1f9f34077529f75cdff2fb19debb2e2
-
SHA256
87a9d44bb004b1f7e6242ee5cafca09066de91eed8aa2baf4796260644648dd8
-
SHA512
6d52193fc1050d98c867abdb07f367ab187175f566e0671183969379599ba6479160924be55518a77a75e6bf3dd17f3fe0505fff6f36950976ed5e8b8b2ea370
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{969A14E1-FA63-11ED-A455-7AA90D5E5B0D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0c02a6d708ed901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ca408a48f4f2a644bc7d714262dededc0000000002000000000010660000000100002000000006708975cdaaa98fe11adc517c4a3ccdc6422ba2bf99d465c0fbc1c95e747ee8000000000e80000000020000200000009326e0b8df17c3aef02be2c555d08c62d3a57fa76936373fcfaa69fc9b83cb0f20000000e63a7b4db8e7490b92789e4a72eb3290e8fb7a7574f1762455cfbaf01ad86ec940000000d6bd355ab0376f2a1a44275ef2486b1b0469c8e4970ab6585536d85b8b652ed7244b46d982b23f7d0634fbaf2860ca8f7634c6e8ba64cad10a1f08a5d97033e9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "391719090" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2012 iexplore.exe 2012 iexplore.exe 524 IEXPLORE.EXE 524 IEXPLORE.EXE 524 IEXPLORE.EXE 524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 524 2012 iexplore.exe 29 PID 2012 wrote to memory of 524 2012 iexplore.exe 29 PID 2012 wrote to memory of 524 2012 iexplore.exe 29 PID 2012 wrote to memory of 524 2012 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\search_download_use.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:524
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5b5fcc55cffd66f38d548e8b63206c5e6
SHA179db08ababfa33a4f644fa8fe337195b5aba44c7
SHA2567730df1165195dd5bb6b40d6e519b4ce07aceb03601a77bca6535d31698d4ca1
SHA512aaa17175e90dbca04f0fa753084731313e70119fef7d408b41ff4170116ab24eaee0bd05dca2cc43464b1ee920819e5ce6f6e750d97e3c4fc605f01e7ff9c649
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6b9a5cbe6d1439a7d492223285c9a53
SHA146d103e086b2bff0f40f7e516f22831a91a532e8
SHA2561d3b55a649d27a56072a25835a72575e42c6c17cd7fd4132a3673ea4ca4af97c
SHA512ebbf9d8a686ab86a827ad66d4604abb09798274c96d4d1a0370ccc27f045858f266153b41c6ce399532ecc32d8c39434330358f679a9ec77d4def6aa78457ea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6f568d8b0f71f49556f4baf16733f55
SHA1267e331f52388b3b523bdf77ece9d801431ece82
SHA25613c95f89f2d1cb58794fc5f5d67e3cf3778f52ba49e75ac11c48d83b33c16b86
SHA5122844e937aa42b175310d75547bcf43113776808b7c810b5da62bd4bc7138e6cf2f7e996abef9f918326eed0b2b9e2c0262e0e92de91137771bab2e38b47d415d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579599acf533ade0c74c34925462f0b2b
SHA1db2a6e588198dc8b306f9d4ee10826307493c9ff
SHA2565795be9f5015488dd4f5c4e81b0d0a4cdb671cda9932c3a0b44176a99aef3b3b
SHA512ac9d19873401d7f74eab922ca1c567de1624813988329bbee1cf9da661b6c26eeb09891d4e3359e1321b6133e88490c45ab1b80c590449bdae805a7a896497b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d79dd0b089f88bf732c0e4254120aae8
SHA1466210b9005793faf7ed305853b2ea70924e588c
SHA2560a208ebb7e10c0802d9f54339901fe0373e82feda0f429c1d66c087d00fbacd0
SHA512df2e6e3e4141cb98d0fc0cca2d56b0c782965e1a8c209552dddfcf83ae139e0cc80b4e3480497f67718782ed9ca67c412f3ce6e54812e7d8d70efb2b04dfb56b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555320fb4a69d865fc6c654618d4bb3bf
SHA164dcf34b9e9a3f19b70499bc9301818a67e3632e
SHA2562da6901e829d96cc21fe9e7ee0b162bd451f433dbfbd5678983ccaf5714cebd8
SHA512a6de9ab69861eb5f1b677a58099a05cd404f73d7761da54670a22cffdd36af6586045ae7c92abe735a0e6d5ddbadf64b5421ed23a59e17b910b323e3be091636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5831598fdd7bd2666f3919f0fbbfb2ffc
SHA180d13d7008b8b754fa8b6b8cc9ada05419f21b11
SHA256f5266208e594054c0bd86818d572edc1807edda5ed997922fe368994da010cf5
SHA512218a2c72b701c66d5a039ba6233e5ba4bc2d876cf3aa80a797d268eceb720656431158a6ffdf077728e91cba4e80478ee2ea29da8f4d1f143ac23686520211bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d04538fe88c8c65c5fa2def3bff81a3d
SHA17eeac52bc3e29a7b6ec22b63389c96a0818410a1
SHA2564e3a5e77c50714af3ebfc14338631ddb9355ec4bdc2fbb4ba56fbc83abc6e501
SHA512dae164e78153df67fa0b03970e5d822e3cfe6ac9f4713177e6a406d3210d1ba6956837081e128296bad08c0816875cf37e03c934e31fa3bcfb46418ba1254948
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5939d85eea4ba189e9caf215a98630ce1
SHA16c479dc933a7a0d3c52dd2e6f8ae3f4d3f17be20
SHA25610ce42c9d038bbc2a5c59e8a37eeb47ff3b0c4e8837fcbae5e18711f8a5f2e60
SHA5122d148f5c753f7f4e7f7e25caaea275750dc2e4078bc8a81bd87e9519ea6befe8be51ea9194abf1544fb8c460e66b48696aa05f220924c6bd0477e8d7e194b67d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UOYUJSME\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
606B
MD5ed4b757f27560b0153de3074b05ae433
SHA19ffab682bfeffa1353da0ace0fc5c23f767e0035
SHA256685fdcd271b398d691f80ac6e85f1fb44e924655978862071928b3c15b09b872
SHA512cb9311ae7da08064a8c06688484a72ee5cb9b5764def93f0e3a0dd2d536f58ee9bb17f6403132ec2766bdb3ff8c050cbbc560a00e418af6ebebb92c4674e8691