Overview
overview
10Static
static
76245fa1646...6e.apk
android-9-x86
106245fa1646...6e.apk
android-10-x64
106245fa1646...6e.apk
android-11-x64
10actionsQueue.js
windows7-x64
1actionsQueue.js
windows10-2004-x64
1mraid.js
windows7-x64
1mraid.js
windows10-2004-x64
1omsdk-v1.js
windows7-x64
1omsdk-v1.js
windows10-2004-x64
1shape_01.xml
windows7-x64
1shape_01.xml
windows10-2004-x64
1shape_02.xml
windows7-x64
1shape_02.xml
windows10-2004-x64
1shape_03.xml
windows7-x64
1shape_03.xml
windows10-2004-x64
1shape_04.xml
windows7-x64
1shape_04.xml
windows10-2004-x64
1shape_05.xml
windows7-x64
1shape_05.xml
windows10-2004-x64
1shape_06.xml
windows7-x64
1shape_06.xml
windows10-2004-x64
1shape_07.xml
windows7-x64
1shape_07.xml
windows10-2004-x64
1shape_08.xml
windows7-x64
1shape_08.xml
windows10-2004-x64
1shape_09.xml
windows7-x64
1shape_09.xml
windows10-2004-x64
1shape_10.xml
windows7-x64
1shape_10.xml
windows10-2004-x64
1shape_11.xml
windows7-x64
1shape_11.xml
windows10-2004-x64
1shape_12.xml
windows7-x64
1Analysis
-
max time kernel
100s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
25-05-2023 01:24
Static task
static1
Behavioral task
behavioral1
Sample
6245fa164605d119c883a056c185f3fd9c502eba4ef08290bdc053b0db68466e.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
6245fa164605d119c883a056c185f3fd9c502eba4ef08290bdc053b0db68466e.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
6245fa164605d119c883a056c185f3fd9c502eba4ef08290bdc053b0db68466e.apk
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral4
Sample
actionsQueue.js
Resource
win7-20230220-en
Behavioral task
behavioral5
Sample
actionsQueue.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
mraid.js
Resource
win7-20230220-en
Behavioral task
behavioral7
Sample
mraid.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
omsdk-v1.js
Resource
win7-20230220-en
Behavioral task
behavioral9
Sample
omsdk-v1.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral10
Sample
shape_01.xml
Resource
win7-20230220-en
Behavioral task
behavioral11
Sample
shape_01.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral12
Sample
shape_02.xml
Resource
win7-20230220-en
Behavioral task
behavioral13
Sample
shape_02.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral14
Sample
shape_03.xml
Resource
win7-20230220-en
Behavioral task
behavioral15
Sample
shape_03.xml
Resource
win10v2004-20230221-en
Behavioral task
behavioral16
Sample
shape_04.xml
Resource
win7-20230220-en
Behavioral task
behavioral17
Sample
shape_04.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral18
Sample
shape_05.xml
Resource
win7-20230220-en
Behavioral task
behavioral19
Sample
shape_05.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral20
Sample
shape_06.xml
Resource
win7-20230220-en
Behavioral task
behavioral21
Sample
shape_06.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral22
Sample
shape_07.xml
Resource
win7-20230220-en
Behavioral task
behavioral23
Sample
shape_07.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral24
Sample
shape_08.xml
Resource
win7-20230220-en
Behavioral task
behavioral25
Sample
shape_08.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral26
Sample
shape_09.xml
Resource
win7-20230220-en
Behavioral task
behavioral27
Sample
shape_09.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral28
Sample
shape_10.xml
Resource
win7-20230220-en
Behavioral task
behavioral29
Sample
shape_10.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral30
Sample
shape_11.xml
Resource
win7-20230220-en
Behavioral task
behavioral31
Sample
shape_11.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral32
Sample
shape_12.xml
Resource
win7-20230220-en
General
-
Target
shape_04.xml
-
Size
828B
-
MD5
07377bd1a13bbec7af35e95af89b4245
-
SHA1
d2059d04e0072ba94d4267e8c220e56662422fec
-
SHA256
8a2ef1ac06c3071986fdc48a0e16934acc6cbbe73b8196d33d3c17d15798ef29
-
SHA512
8860e198ca78c09d135afc0852dc995ddfa9fa104c2dcfa55de4f20a31f134ebcc6af285d2112e8db7c0934607917dff62349806c62f29cf755b8ed3f63ddb51
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEIEXPLORE.EXEdescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "391750066" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B5577241-FAAB-11ED-A6B7-D6914D53598A} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d511259fbafb954d83813a52c79043ca0000000002000000000010660000000100002000000018ca9f5a3b384c2838961483f53e9e2e0893d5d9afdf6bd93703051912447dc4000000000e8000000002000020000000386548635c5d13d33d80ee19ca7c2a5618670b5ecef4dd3736cbb3818cc40e0c200000000e503647b0c3f3956fe648c2fa04dac5f808a1ab230be4e3d9d4faf1e142a92f400000008ebc2022d35fbae45d7c58116ce15b62029b51a5e869c7e55df4174bc09d2caa61b11a14181042f83bc312b86c19a5861592614e65449774023ad96574e8ad2b IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d511259fbafb954d83813a52c79043ca00000000020000000000106600000001000020000000632fb55210a0b35826bd13c21cbca4f04b286bc0ff9bbaa3f0f0baef4c03fc10000000000e80000000020000200000008c80c04e38ad026c6c7390563765d163a8fe875eb3a1b1b0ecea84159a41122790000000fddbfc671393b22a9857aafc68afae2868d5d2599a86a7a9dffecd9e15f50878fccc92f2c30a32e784236b7695162e7a052750c65e65ea71095d1423788db334599258e6301ab6380998234c406d24c17d7b1280653e08ecf2e70c5b112460aea498069961ddb506133940d1f568e28ea16b4a4584657174a94bdb49500455d2afad2042ce4a25c11ee71c2bbb78c9fd40000000f13951131198994d9ecfa34a8968de54c2241718baadcede09e52486dc9ab42d02ec2cafdaa0d38072e3ea8e7a11c77dae197701d025a42fb904cd123bba00f1 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 309fec8ab88ed901 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid Process 1252 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEpid Process 1252 IEXPLORE.EXE 1252 IEXPLORE.EXE 1832 IEXPLORE.EXE 1832 IEXPLORE.EXE 1832 IEXPLORE.EXE 1832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
MSOXMLED.EXEiexplore.exeIEXPLORE.EXEdescription pid Process procid_target PID 1584 wrote to memory of 472 1584 MSOXMLED.EXE 28 PID 1584 wrote to memory of 472 1584 MSOXMLED.EXE 28 PID 1584 wrote to memory of 472 1584 MSOXMLED.EXE 28 PID 1584 wrote to memory of 472 1584 MSOXMLED.EXE 28 PID 472 wrote to memory of 1252 472 iexplore.exe 29 PID 472 wrote to memory of 1252 472 iexplore.exe 29 PID 472 wrote to memory of 1252 472 iexplore.exe 29 PID 472 wrote to memory of 1252 472 iexplore.exe 29 PID 1252 wrote to memory of 1832 1252 IEXPLORE.EXE 30 PID 1252 wrote to memory of 1832 1252 IEXPLORE.EXE 30 PID 1252 wrote to memory of 1832 1252 IEXPLORE.EXE 30 PID 1252 wrote to memory of 1832 1252 IEXPLORE.EXE 30
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\shape_04.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1252 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1832
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568d6562519fa1f15fc59fab1ee6ec1c7
SHA15cdc7d823e48fb799de7d3680dcc5c1994ce3a52
SHA256beaaedc2d577c0977dbfb6a71d745158e937891a8fe4ce41d839d47c166f1389
SHA512dd20f5d136baacb160934b26f17ec70ccac8dfff84125abe1f522c8eb10d25becec9dad9f47f7d4d3e898b33463fb0e1d1469dae9811f7d03d991424aea2038b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8314f04f0f112938ac23e905b18049f
SHA1782dc9065543465853dd89bf20710859ab56ee35
SHA2567c00e6a1c876b042dd6a521e073e5950042d6825dc89a716c06e0900d975fe48
SHA512b6987995f8e3d3cf16293e9f796df4bbcf931dff8aa948eeb67d24d91f430d8ac13e9c782ddee6132007a2a38311f1268e282b4f92cc962091b862ae96240298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559a339f39fb01af76cddda24297c34bb
SHA185d780e5815a27cc8eb9167d4c22ab0eefc8b50a
SHA256fb67bfb7d17b6a72cfa0505d4ca1aa3cbc25249b837ab34642c4915191a4bf2f
SHA512ff6247d949dc8429aa697a20e6c9c8147a54b7ff8930093804c9da5574a694e4a0d373f1b50f4b031cad3403f6898539e283befe3cc6957737e5274d6a84d489
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S7FIT0B8\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
606B
MD50acc8baf9bd9e731851ae4e70de27cf2
SHA11299c9ec10de7c6be3a5998850f451521109902a
SHA256b4f1c6628c98e6b982447e8ad49d234b89390f4a83cb6c511ea12af505b1ba2a
SHA512709e6ea756284ff820b97243b973517d1f6d522639c223465c321f3068028e55e2c9b5e35e9ca99afb3fa596860f0df84e5b3b3e53d1625cc167ab9e92085fe2