Analysis
-
max time kernel
146s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09-06-2023 21:18
Static task
static1
Behavioral task
behavioral1
Sample
Spotify (Premium) (armeabi-v7a) v8.7.70.553 - espacioapk.com.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
licenses.html
Resource
win7-20230220-en
Behavioral task
behavioral3
Sample
licenses.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
quicksilverCardAutomationInterface.js
Resource
win7-20230220-en
Behavioral task
behavioral5
Sample
quicksilverCardAutomationInterface.js
Resource
win10v2004-20230220-en
General
-
Target
licenses.html
-
Size
1.6MB
-
MD5
f3c173ef646567649c3fb6fd8234d0f0
-
SHA1
82db4864f815270a53ee6e3e8cbef37ce7421456
-
SHA256
e573a3ed9f29e4260566055ebc87b4762c7b17a2335d904cae730b13ec1268f8
-
SHA512
f9fcb15906128300755b80504e171ff47897e346dec7ab894554689061f55d4c724a38d6b1f99dd17377d334bc13bb0a6eedc0ba3647a8be6cca39b6cf0b1cc6
-
SSDEEP
12288:h3w3J3P353/3q3q2w2S303w3e3w3a343H3S32323+3n393C38303J3l3f3j3u3Aj:6po
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003c10241c4f93334099a3a898d2b6078c0000000002000000000010660000000100002000000014d8098f5a0f25eeb1551d285f1276d959478cb6f421d3062966d4f8cceb5568000000000e80000000020000200000004bc0d6be9b17e3dce2cd290c678b8068a48857101d6c74df431f998f2b6c1035200000000c3e54ef044c4abf2b542e3357482673adffea7c90653c8687017dc3f231a84340000000d34745eb387f8a106ec37e79f4804f9a9333dd0c939ec0352755a035d6b77f4f2159e9d43ef8909fbf72501142dfbe023b2ad7b54e0d726ab0661c50fe2246cf iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3EB26F21-070B-11EE-BCDD-F2A4F945A9C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "393110512" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 805b2016189bd901 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1476 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1476 iexplore.exe 1476 iexplore.exe 1444 IEXPLORE.EXE 1444 IEXPLORE.EXE 1444 IEXPLORE.EXE 1444 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1476 wrote to memory of 1444 1476 iexplore.exe IEXPLORE.EXE PID 1476 wrote to memory of 1444 1476 iexplore.exe IEXPLORE.EXE PID 1476 wrote to memory of 1444 1476 iexplore.exe IEXPLORE.EXE PID 1476 wrote to memory of 1444 1476 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\licenses.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1476 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55a3f65171c9aca364429a1f79851ee41
SHA12356e4f3878c7af7c7a78584f20b9086a5825d5b
SHA2567a38e5ce8071a628edc723591bb6f877f8a1db0ac33d4ad4a0f584d63f393930
SHA5126126bd7650c343f62c0f6574b68688344a87474efc866bfc2357d41f329691e85e1d8ec3a223ba106d1771ebe848d3673bda32705cb855f57246d7b8c376cf72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5955ad34924a3f7a29496932d6f61f4e0
SHA1b0ec4f0ba6566b930a542fbe5fe08b6087054a9d
SHA256f9e49878f14b15f922a543bff6ff20d989daff391a9e4b155038f3edbf335dd7
SHA512f8e19c5d672f59b2213c1c63c1ff578e96b6a49fa124ea7810cad108126512f64b1dd42193dc4d08843c8f9d4c64ace988ba954a42794cf5c86e1ec754a01612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55d15917b3333d76b890d59453c5966ee
SHA1f3d0ad9bb818980940f96648d3c238a3f4929cc2
SHA2567a75255e8e178d591a5193fbdfd5ce5b119bd49c83e98b922a0de84e6780a094
SHA51248b12dd15de871f37854d3058c52c3817cfcbbb0a67b8d2a687089b4f3a9c68c82d45bf7a26dffea60e5754a6f02ebf66fb2f57cdd0cecc5c037cb9f87330705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD565bbc1029bbbb058c157ce8e777d817d
SHA10c36e2791b08379bfd719f550932779a811bfe79
SHA2562f3b4c2c9747ff1d7b00e96d8006d2ec10818b0a558cd6ef7ca89cd80acdb103
SHA512006efd5255ebc52759b295aee245c0d6d5d4e08ba3a4d9b8fb639c9800fc4da31dc06a4c30c61487d22a3bf375b2ef8e26f4be7db54cdc4a88687ea46fefb6f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d1d6779483f0f8633134861e3519430c
SHA1077130737b7bacacc945fbf8446592c8dc848ca6
SHA256cda1b172effc680570f3afc25e1fc2f8d2bf98813fdcf1a9fe25f23cac425b7c
SHA512997bbecbe531d9647d7e42b686ab14d044e11d1850813fea5cf0d3a348f2c887d34495f62c27f2da7bec5c5e261de6c5c7af966fbc3d404801d3dda42ab24814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52056298634ac5eba24149db21cd37b82
SHA1ef9596e7eb5a23b550b73e668675b878dbde4e01
SHA256f31b34292522548d058f59ed06f0a2d16b6279147b297c96c316f41831634c36
SHA5123a33834c7b2b5b812362453b4efa9179e45d931851e3db66afee2b02f45f7fa26570003d134e32235c754df1f51a84f37e63bfcf089a361f9ab171b515af84a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51ea5bf5f9f6b524216df03a10b290d90
SHA1f5cf9f46162a41a9949815db980809ff21579078
SHA2568b1f0c5615f5f6272a939e619fad95a40a8857f4c637b09bb1954ce077cede78
SHA512b289d186260910d5863eb6517f90701b60ac98976dab2d2157e37659e557eb281728507b929fb28e9d3e292e8cb704352b59c7f66c77a05c30b545561f222ce3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD533bc1e158da73a5cb1497d8641cf4c40
SHA1361f42e3c267cb3b760b62a53275052df196a516
SHA256a7670b1650ca0be641e4709d20c5124ded381bbe988978eee81f5a73459456b4
SHA5128dea6b710d8fefb395d6bcd8b2202828fbb11cdf0d36742f1b79bf6ff9453d4ab353c40dab02625bb09fb42889d69b70f000432f38d15bb155ddc02632f730fe
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UOYUJSME\suggestions[1].en-USFilesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Temp\Cab3E5B.tmpFilesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\Local\Temp\Tar40B3.tmpFilesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\BO6JK5SL.txtFilesize
601B
MD50ddc387fb6f769b9f4b86bd63434b016
SHA1b174d7b82dd0213bb5ffc9447f3fc8615cb9ef88
SHA256ed5f65eeea396a47de54ea50fa6be21a24884ce409fe059e8c50324a6eb1fa51
SHA51274d128e4b1787a7acff6c5a5376b2fa81bfd403d1b25644f08c94b71849dfaa0c954f1f2b19347ea2e4ed265dc1dec991071e3d901d707dacfdfd5bc5337e18b