Overview
overview
7Static
static
7460bbe6038...d1.apk
android-9-x86
5460bbe6038...d1.apk
android-10-x64
1460bbe6038...d1.apk
android-11-x64
1continua.html
windows7-x64
1continua.html
windows10-2004-x64
1error.html
windows7-x64
1error.html
windows10-2004-x64
1index.html
windows7-x64
1index.html
windows10-2004-x64
1instalar.html
windows7-x64
1instalar.html
windows10-2004-x64
1instrucao.html
windows7-x64
1instrucao.html
windows10-2004-x64
1Analysis
-
max time kernel
100s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/06/2023, 02:34
Static task
static1
Behavioral task
behavioral1
Sample
460bbe603853611287bb45e77f38da9adff85210a283b433deb11684288ec7d1.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
460bbe603853611287bb45e77f38da9adff85210a283b433deb11684288ec7d1.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
460bbe603853611287bb45e77f38da9adff85210a283b433deb11684288ec7d1.apk
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral4
Sample
continua.html
Resource
win7-20230220-en
Behavioral task
behavioral5
Sample
continua.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
error.html
Resource
win7-20230220-en
Behavioral task
behavioral7
Sample
error.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
index.html
Resource
win7-20230220-en
Behavioral task
behavioral9
Sample
index.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral10
Sample
instalar.html
Resource
win7-20230220-en
Behavioral task
behavioral11
Sample
instalar.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral12
Sample
instrucao.html
Resource
win7-20230220-en
Behavioral task
behavioral13
Sample
instrucao.html
Resource
win10v2004-20230220-en
General
-
Target
continua.html
-
Size
6KB
-
MD5
7d6321780ea71322ca45e67a005d0921
-
SHA1
fc6c6aabdcd4413de3e4dd53031ecaddd41b7fdf
-
SHA256
2af1eb500cfa4ae019958c3c7af92a826f1ff5f9320315b629dc68460e72b4d5
-
SHA512
99604161a1db28688530fccad00b82106aa1fa5acac20273e0df74420d5060072d31293e2e9b863bcc0cda313014f349402273a4ee61c466006583b46bd22d0d
-
SSDEEP
192:XtKC03JQTS7vYBnhnsnrGKHEanMW8qX3IR:9KC03JQ27QBnhnsnrGKHEQMW8qX3IR
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006155a0c6823ef54d969767caaa08371b0000000002000000000010660000000100002000000081ce54373822a99bccb771240f0a02510d1db3aeb580d01bbc8d9ca4d1cf0fd7000000000e8000000002000020000000109cbb0afabc0c1150b60fb7724ccea3d81ff37843552d48e47b7e7887b5701f20000000b999d119869a2f88b1180c9ade5e06d5b1e6632e15729e37ed8f95e1ee90e44d4000000005aab5b2ca6d7872883aa2f982caebdb1b6bfa37836f54b278ba69a79328e06234ee49bfd18034bc7d4ae073e335470be338e9fe67640a63ec254019c7e2cf26 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B00823F1-0412-11EE-8AA9-DEF2FB1055A6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80bf19871f98d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "392783856" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 656 IEXPLORE.EXE 656 IEXPLORE.EXE 656 IEXPLORE.EXE 656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 656 1728 iexplore.exe 29 PID 1728 wrote to memory of 656 1728 iexplore.exe 29 PID 1728 wrote to memory of 656 1728 iexplore.exe 29 PID 1728 wrote to memory of 656 1728 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\continua.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:656
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ed0a062e6d6c06733553c736ee03b8f
SHA19e97d1088f1ad9a403d552cad144e42f17efcbdb
SHA25605558d84a065b37732e5bc7d189ebd4af8fff28f2f25c5e5850a50bb5d0e3c97
SHA512b571a23f45da94611262bff0315f003e9af54a27f750af56da6075280cd6d4c015a6e3e9c4761156db8138c4a36979a193df19f55df3eebb1fc0b2a3819dc567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57809a1a5623ae5a3c91e038286885b23
SHA105c16ed6d29821c2f36180b4b7489383f64ee42b
SHA256bd5a45b57c4b225ffbeec51ad4707d726900eaaca531e1fe3038483e9e39fcd2
SHA512ede337fe955d49e65e34ce2030b68f1931ae0d06f23a19ed7aeb1cb4dc7b63ed316562128b1fee4750a53cb2e1e5331389f7f812cd257e5b9035a3628e09c7dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56df1548dd24c272251bce46f9107d63c
SHA1dbe0eab57164a17c76661a5e59c1b0d68988cdd9
SHA25667b9d8a42f34741ef6d1be839085bb7db38dff329eed09bacb4147060973751e
SHA512e6944e8774bf574f4c7aef6f75f539f14a99af132b018f01f021d8b489274f97c439378f1019d79b21a1ea200050c8be7da80edaba3561f0de69043b3fd3066f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a510c3cf5da32c8bb3857c77d6337adc
SHA1b00adc0b916e5d3c995d77d156008e8cd325fd63
SHA256bb0ee9f54c966e7ab3b71ecd589ab8fdeb582e07c66709751819e47e64f83df5
SHA5125aa944e1d2cfed80f3464fae8960e74d02ee2f151cfd3c42b43139c269a9b7716920309b339aaf8e140f22a9e453fb56a13c3e287c22b99f84a84a3b06201eff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a364a43025322a1cf923294755460f5b
SHA190ea1221d69ad3b2558d26229b3deccaca3e4fc3
SHA2568f1fef65ad08e0565f2da85dfaa45c11172a6a2e837b30de21e98fa3e6626784
SHA512bf5f3ef09d21210674a5c8408ff831d1aa2b6a547e429962d75844f1f9ea33350759053374faafda8d86b22be9370194f5e609466ca1af150826c3d4d84a844b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f808a66b7afa68891c3cc3a11385629
SHA138feaba75fb270ae3752625d7755a5e438d02bc9
SHA256a99900139475b580f64b66a8d4df2644c69c7c079af1ddbc6acf74fcec335dce
SHA512136a1086d709baa5e0aa230ae01b9662879c099f9a7b3e2f8250db5c8bca41fddbf1d8372d1f2112629c20aec7b7b372d1feb6b7f629b71f8aabd94ad0d231f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598cc7a6847fede637621f4a2f3e895e2
SHA14fd546f63afb5a7e49c5241356ede4fb60e5c184
SHA25653b176acaa7f6f6959b711b4daa5fc8bc6da17cf710f15f084d8b640518d6619
SHA51266ce46314da1ddec725c4a2765e6f73b6318dc2eedf798a6b722e0bdf60ee62b4f6918d4f053378052883435b979bd45179777129e652d93eaf65d0217dd9bc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e853ab52b86c9dbd8d8fe2dde7391c40
SHA19ac8a29e5d49228430c45b383cab5bb06918eb93
SHA256c55a65f8ed34aae04253a65834177e3412e0d2e1d6e2cef1c21de78c67307b41
SHA5125f35f9018719309846b1e8f474efe2f0fe329b0eb82655decfe2326ce74c96ae5fe420d961a12013bb56afbfdef59d98526312507af2eb854152a12ba3fe474d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dff1dcfc4159931446eeff0f598a9bb1
SHA1062fec83b956839a1eb2f2277bc350698d9670c9
SHA256bbfdbf2afa38ffc0d0c027211877553488f938b645878983052a00497e342976
SHA512fb2dce5dd88e573516717060462cfee1d5148bc5eff037bb56a67530fea11f6a9d86c9cb5725e7ff870807ae608a77c19948a9b1c891953660351447a69911d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a11152db53ed16addf8b84089a96b76e
SHA19d7916647389913a8094a1264febaab3202f412a
SHA2561811503cd67021bbc82ca40c1498be137db2b989f80c9dc8bd6bbbcf02c044dd
SHA5127d26b2910e6612de116d04b91c00fcc44a5321c274331589d7f8049a2e5842810d71ae39e021348e43050b06faa69636d31f196827b0ab2170390b707b6fc912
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UOYUJSME\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
605B
MD5b6db88a0b837c2c2de5e8f3f1ece4542
SHA1743208a34fdcf2cdbc588bf13089eb24528d6bec
SHA2564ddb695fa5124ea58c9a5b72058f3d6d89bb2bc185a9ac7e7546931af0b6dc55
SHA512181a665834bc5265d58c2cb2103e290814ca053d4aef2ccec89e5823b002554d38396eb5ead26c9e1405c52f1cb16c9ee29db1a8af1cf1a005566a2cde3d4746