Analysis
-
max time kernel
100s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
25/05/2023, 15:27
Static task
static1
Behavioral task
behavioral1
Sample
Spotify_v8.8.36.522_mod-apkmodget.com.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
licenses.html
Resource
win7-20230220-en
Behavioral task
behavioral3
Sample
licenses.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
quicksilverCardAutomationInterface.js
Resource
win7-20230220-en
Behavioral task
behavioral5
Sample
quicksilverCardAutomationInterface.js
Resource
win10v2004-20230220-en
General
-
Target
licenses.html
-
Size
1.8MB
-
MD5
e51c452e3c0a5322570840f145bec86f
-
SHA1
272fd93ef8bc30ad02879ef245d626b80dad9d6b
-
SHA256
0dd6d560372744592aced2de9424b81a3f1b14a7564ed44f60d2ba471fad48b1
-
SHA512
c6f18f42bd764820d1e1554074627c33674f41e044e8bb171a27a9279af8323705253bb1107c1fd3b928842fbbacc93c01059c6953396738160857d968fad8fb
-
SSDEEP
12288:q3e3P3D34353/3q3q2w2S303w3e3w3a343H3S32323+3n393C38303J3l3f3j3S+:pQq
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D6714771-FB10-11ED-97FC-F221FC82CB7E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000ddac8f4846ef941a4ee5c6339bda68d0000000002000000000010660000000100002000000056b2e0d2a1e5204a482c830757033a9334638888663180d1129343a4f4f0b05a000000000e8000000002000020000000dcc64d2e258e3eefe80c31a1261fa7c1ff78eac84cf0f22c7217cb0adfb77d1020000000f57be3452f557f9baf79dca04595994af67d95346e413c00aebd02ffd0ea842e400000003a4c7ea322f18db5781b20fb2c909965349c1ac901839e9fe12ff02b2d94e9df0e9dae4f45a8e2e9bb8dd129f2f3cca322c698b50631d16e98f7ff92856920ee iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "391793501" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80226ead1d8fd901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2000 iexplore.exe 2000 iexplore.exe 1484 IEXPLORE.EXE 1484 IEXPLORE.EXE 1484 IEXPLORE.EXE 1484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1484 2000 iexplore.exe 28 PID 2000 wrote to memory of 1484 2000 iexplore.exe 28 PID 2000 wrote to memory of 1484 2000 iexplore.exe 28 PID 2000 wrote to memory of 1484 2000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\licenses.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1484
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fc99610572b8b2fb24c3dad5eb04615
SHA1613131e2f1023f6d0e8576ef59d3053b8cd7d860
SHA256168b3aa0b5dd40e2d390478df8c86932111a5c627a0de712a39b085a138b6f5a
SHA512f9be23aa6d4567a60ca8e2d6e344bc3b2fe98c2f68a154a5d757a2cb03620fe0fb92b98e8f9252e2c4e957300c57701bbcede0db623c1d20dfe7d508dabb78ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b00a3dd0005d70c307979e0fabad3f4f
SHA145d5561c45f664d5f86141c776486e463a3f5793
SHA25618b0f7b768740e80681684e482e6c83871bd4520e2c6d6bf5f5856b74c523027
SHA512609e301eb0c924282e32d7ee1c0bcae9241562f9f697e8c2eef8f33b815c42226deeb1501c97983f3ed3c76b8a1c758d3cda4e84ea7c16dc47f6373b08af0d43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531da1e6c8766401705e73aa74db7848b
SHA152bf2f8c1981ab62391c9451d59c8dcfd18b3e1c
SHA256e21db69db70c78852a4aec71869f8e65eb2e3ccbd35212cc35231fcd5c2095dd
SHA51220fc50d8879c1ee0a071d79f8ed0ca717bb01abef2cd5a7eb1a6215aa848ddf1810bfd38b9919ed4adb566ccd9b9ef0e21b6edf43ecd3b47b8b7c1c884775f07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a5395efa5c744da9c4caa45be59cb6a
SHA1ce3adfb5fedc825ed014d437ddce30b26b0fcb78
SHA2566b2255ac7684889804f830ff2d1df986b36dc3678e86d10a259e7c5ec77888f1
SHA5125599cf532cd452b3b8231a462a7791587be039786440e7df1aeab32244f421bc795ad20bfccf8cd364a2bfad5300318442cf607cfb0d0fa90e82799fe18812f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c826b31dc977c8a23ffb4d066f8067e0
SHA10abaadb42592364018403dcde225573703182f29
SHA25697d6863aabcfe6b24f0680a952cc4626cf5e65d394a5f0c5a65dbdf2202e40a2
SHA5124785cc27d40b1a49dc0a8fd1ab83e933123c795703a8f6cd14bf32b35c54a7702522d0d2e29deff47b3dca3762a166d2733be19650f68a488877e38cf3a8cb47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b8f355a7e4c5823747cd4446255f815
SHA1db8aaf10a8e09c10b160c4700b3e7bc4d54bc2b2
SHA25671fd5ec879aaea23d4f0c3819c608a2ba8d32d410943e1e9c4dc373e75a2312d
SHA5128861191ad01e69d4f4597aaad27c1336c25a18e49e07805bbfef6322ba698466580ec5a1e1386fc33f42dad7a2d4a25c82bf8d91cc3367f71df403a4595e86dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54480a2a4f1a8e9ce683d295b88dc4ffd
SHA1e8146619d77b5278c08c242444cdbcf7b15fe179
SHA256481b89ae85c5d7cc00be6c82e16e3bdd4dfc0ec75af7c19ffb7175ebca1e9bbd
SHA512ab4006cee4ee7204a43023094b2b79a2f57302adcadf0d6182938188dcfbdd2882314828b46dbd89edfa120fbb8157efe70088293cf2fb544faa3017d6569020
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VQ77JNZF\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
608B
MD531c5f3b66f6d7126bd83b8a34de8682a
SHA11cdc74b785d11cf03768ade747152c57e638753b
SHA256695a17e0c438a867493c95445dc86872e6ad777d5affab4f957e8cdbb95cdc9b
SHA5121bc9a80c94189e68febcf9e3474a73c1c3259a0bc03a1909b99795e184db80478d65c7eede668e2847b7f6386a047af8c851229b8832d2441b751b0359f1d454