Overview
overview
7Static
static
7ibis Paint...om.apk
android-9-x86
1ibis Paint...om.apk
android-10-x64
1Paywall.html
windows7-x64
1Paywall.html
windows10-2004-x64
1TipsReorderLayer.html
windows7-x64
1TipsReorderLayer.html
windows10-2004-x64
1TipsZoom.html
windows7-x64
1TipsZoom.html
windows10-2004-x64
1UndoGestureTips.html
windows7-x64
1UndoGestureTips.html
windows10-2004-x64
1createjs.min.js
windows7-x64
1createjs.min.js
windows10-2004-x64
1mraid.js
windows7-x64
1mraid.js
windows10-2004-x64
1paywall.js
windows7-x64
1paywall.js
windows10-2004-x64
1splide.min.js
windows7-x64
1splide.min.js
windows10-2004-x64
1swiper.min.js
windows7-x64
1swiper.min.js
windows10-2004-x64
1tipsReorderLayer.js
windows7-x64
1tipsReorderLayer.js
windows10-2004-x64
1upload.html
windows7-x64
1upload.html
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
27/05/2023, 13:40
Static task
static1
Behavioral task
behavioral1
Sample
ibis Paint X v10.1.0 Pro - AndroForever.com.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
ibis Paint X v10.1.0 Pro - AndroForever.com.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
Paywall.html
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Paywall.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
TipsReorderLayer.html
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
TipsReorderLayer.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
TipsZoom.html
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
TipsZoom.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
UndoGestureTips.html
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
UndoGestureTips.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
createjs.min.js
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
createjs.min.js
Resource
win10v2004-20230221-en
Behavioral task
behavioral13
Sample
mraid.js
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
mraid.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
paywall.js
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
paywall.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
splide.min.js
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
splide.min.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
swiper.min.js
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
swiper.min.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
tipsReorderLayer.js
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
tipsReorderLayer.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
upload.html
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
upload.html
Resource
win10v2004-20230220-en
General
-
Target
TipsZoom.html
-
Size
1KB
-
MD5
04f3dcd6a2b4326cc0e85b959d472478
-
SHA1
e29ea6ebd37d0ad5199af0fa34444d12d4a252b7
-
SHA256
49e8b2dbf8df37e127ce59160497beaf13b35d190277b3ca310ae51bd66bf5fb
-
SHA512
0e95500121275013785f1caebe17b89e69b1c217d98b5bb8b6ecd2c87ab1a1c7fdb6137819422bc8bfa20c834c332f2eb5cd1b1669150c524415961919dc02ed
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e07dc054b290d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000746c6c7997446a48b88782b6971dca300000000002000000000010660000000100002000000080092690580f445fb065b7f1de5b7c5f0102a1c6766490fd7dba016a22d1d16e000000000e8000000002000020000000fe21894ce57f46aa41f5a39b88e554e6d689550011457bb8b49ddd961600f0322000000089863d0e31469b39a30ae1226ab3c7d29e435d2b6b66d27e057e1c29bb4ca6a940000000994d58bbd0661de62c69945e1131507b946905db318a20b4b2f9aea00c3b6a530e1b7bc88dc0ccb3edcd4b5a86f17a919244327740934042942d57c2c89c3517 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D13DAD1-FCA5-11ED-B416-C6A949C40DC2} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "391967320" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1088 iexplore.exe 1088 iexplore.exe 680 IEXPLORE.EXE 680 IEXPLORE.EXE 680 IEXPLORE.EXE 680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1088 wrote to memory of 680 1088 iexplore.exe 29 PID 1088 wrote to memory of 680 1088 iexplore.exe 29 PID 1088 wrote to memory of 680 1088 iexplore.exe 29 PID 1088 wrote to memory of 680 1088 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\TipsZoom.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1088 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:680
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f2087bc56a31ef446cb0828c2c5c543
SHA1482cd1fb5e9ea9b38fae65b3fd80608df698aaa2
SHA256262095c33c3715162de72ce31b19d01f97d8b6ddfaa37c192e9fca7dffc3f022
SHA512c4d6a7d4f6a652f98564311901407b31d59aec5a57f8e9f7d68c36a8df24179e3a01bba3a6d0a0d6dfbc83aac3df70a7b3612adcaf96b869b37f39c612aa6e61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5698806a862f5f1f4b64015eb1ab76a18
SHA1227bf2aec1b75ea5488ef39cedd914aba698277f
SHA25650bfd56fb452b764ebcc7997ec9803638ef3fd88669dca97f42218237505c2df
SHA5121fae3c9e2090ccd391c8f76615fdb585bbc8c48ee467c01b169982903699bf57a6b2d57eef7011db8ebda5453177a4b8c1dd00ec853a366a74f19d736919c8af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fec0917b5f60bff6f8fadd9a76643fed
SHA1dcc0b2a09a1a8542b16d8c07ba328e77f8e3bdb6
SHA2566922a9a0dda1017f3ebbdb303908200f2c2c0c649a973dfe229afe7b87ee28ce
SHA512f9ea2f0d658df7dd342419bc140b9c0837f943bdead3c8c8eb32c37aa20a91304cdf13199bce942d0742e028e70558d63bb82b056764202fef6ed748ac4faa2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2bf6dd721912f69cf3c2b9d63af09f1
SHA1777a5b87e83c1008ed320c8015e67de8f926b749
SHA2561e87efd45079f21c615054d36e67592e88a75a37dbf78e56f00503c5f8651c49
SHA5120f1437cab54c19e1be5094d13d5a17b0055f2510aa34875ce0f28329670b8f2d4bdcf58a80e17915eb294b722ed04d09f9c1b06aa350e9e45a643b03f7b701e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529ebd09b2dca7bc8ed20cf09a07c8744
SHA1fde7966e14fcd20ed808f1c76d6cf6d24add7520
SHA256fc9f8a30d6ffd3a07cac25dce39a7b8b2395a320b9ebc57a2791f8c98bff66d9
SHA512d43d809dba7f4c9b3396e3f138d3f64ad207b9fc6eab7c761f70794a0c0369cbfa66cf8fed30c018fade2c2eb82a550754c75e4cdc80f26b4300186e8c556459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad80edde6b17436323680664cd85f788
SHA1044903dcce91a796d1a2d6bc50b6be109ee93f7b
SHA256191efb3dda42805537f3f18f41d9d55ef004ab7882eba9bdb08f3c11aef69266
SHA512585e4779e5d9fa754fc322e1dbefd00d36c635cc0ac5740e9f95e8e04b331865b50649d83103de6dcc48aefa873cde5335d0cd8d635373a4225ceefc0f6171fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573fee7de3f55fa5a5ca7beb47594ef14
SHA1079101001594b302d0a51f1c6a4d18145dbb0b62
SHA256704d49e8841019b31299117b788f773a7e299c8160ec08018eb7aba17d2fcb07
SHA51289ecf4d8f63cfecbc74dc7018fb358745a019e22a9e4b06df7775c6d32e8f19432525263b5bdefa875efc193462e58f2ac5b293b3f463977090c522f56de6b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dee1f02426d848deace0e1ca2beb4bbc
SHA173362f9219c148ef5baf27e56c7eea89266f9e48
SHA2564b7af2cfc4c82c0f3363faab53da265695368d0ba3009f4a4fcc6595c93553d2
SHA512029a340a3a705558548d528ec7b1598c3252722f34643dc6848f1120a3420322eda33bc46e6029838dcc35ddfb887f5bc093ea6f858bb5002af53333e4f17b40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522bccee837300f09a802068f3c7cb296
SHA1aa904db5c607a904b5fd3af1ca7419a173899ccb
SHA2567085a310d57114f4f6dda6bcd242017fc6e4a87ef559de59380ac110dd426bff
SHA5122203f702fc515f5b8654fafa43bf8a05c99b9ab6a4dfd26346df97b8e96774d3c051d07b8bc7234da1175bb73f80271122982b78fae053b52f68cca22b7f9eeb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QHKTFKHM\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
608B
MD5d14a1e362987b3ded0bbe3799bbcf5e5
SHA1f5501ce0e2bbf76daf74e57e0c794db811d035d6
SHA2562add8a5cc015989582ba507552582981a226189c52bb50c86a9a910b8af07324
SHA512b65b3cbde5e6763c36d54e037bf78823bd069b80bd78954b2ff194ff2428e4fb9127e9c95191863ddcd9aaed58b8e4cafacc681b37ef6ec85094567ba4fa9889