Overview
overview
7Static
static
7BitLife_v3...om.apk
android-11-x64
7DefaultWsd...tor.js
windows7-x64
1DefaultWsd...tor.js
windows10-2004-x64
1GoogleServ...fo.xml
windows7-x64
1GoogleServ...fo.xml
windows10-2004-x64
1aps-mraid.js
windows7-x64
1aps-mraid.js
windows10-2004-x64
1dt-mraid-v...ler.js
windows7-x64
1dt-mraid-v...ler.js
windows10-2004-x64
1dt-omsdk-m...ker.js
windows7-x64
1dt-omsdk-m...ker.js
windows10-2004-x64
1dtb-m.js
windows7-x64
1dtb-m.js
windows10-2004-x64
1fyb_iframe...l.html
windows7-x64
1fyb_iframe...l.html
windows10-2004-x64
1fyb_static...l.html
windows7-x64
1fyb_static...l.html
windows10-2004-x64
1machine.xml
windows7-x64
1machine.xml
windows10-2004-x64
1mraid.js
windows7-x64
1mraid.js
windows10-2004-x64
1omid-sessi...-v1.js
windows7-x64
1omid-sessi...-v1.js
windows10-2004-x64
1omsdk-v1.js
windows7-x64
1omsdk-v1.js
windows10-2004-x64
1sdk_core.min.js
windows7-x64
1sdk_core.min.js
windows10-2004-x64
1settings.xml
windows7-x64
1settings.xml
windows10-2004-x64
1vpaid_html...e.html
windows7-x64
1vpaid_html...e.html
windows10-2004-x64
1web.xml
windows7-x64
1Analysis
-
max time kernel
133s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
09-06-2023 21:23
Static task
static1
Behavioral task
behavioral1
Sample
BitLife_v3.9_MOD_modded-1.com.apk
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral2
Sample
DefaultWsdlHelpGenerator.js
Resource
win7-20230220-en
Behavioral task
behavioral3
Sample
DefaultWsdlHelpGenerator.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
GoogleService-Info.xml
Resource
win7-20230220-en
Behavioral task
behavioral5
Sample
GoogleService-Info.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
aps-mraid.js
Resource
win7-20230220-en
Behavioral task
behavioral7
Sample
aps-mraid.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
dt-mraid-video-controller.js
Resource
win7-20230220-en
Behavioral task
behavioral9
Sample
dt-mraid-video-controller.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral10
Sample
dt-omsdk-mraid-video-tracker.js
Resource
win7-20230220-en
Behavioral task
behavioral11
Sample
dt-omsdk-mraid-video-tracker.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral12
Sample
dtb-m.js
Resource
win7-20230220-en
Behavioral task
behavioral13
Sample
dtb-m.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral14
Sample
fyb_iframe_endcard_tmpl.html
Resource
win7-20230220-en
Behavioral task
behavioral15
Sample
fyb_iframe_endcard_tmpl.html
Resource
win10v2004-20230221-en
Behavioral task
behavioral16
Sample
fyb_static_endcard_tmpl.html
Resource
win7-20230220-en
Behavioral task
behavioral17
Sample
fyb_static_endcard_tmpl.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral18
Sample
machine.xml
Resource
win7-20230220-en
Behavioral task
behavioral19
Sample
machine.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral20
Sample
mraid.js
Resource
win7-20230220-en
Behavioral task
behavioral21
Sample
mraid.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral22
Sample
omid-session-client-v1.js
Resource
win7-20230220-en
Behavioral task
behavioral23
Sample
omid-session-client-v1.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral24
Sample
omsdk-v1.js
Resource
win7-20230220-en
Behavioral task
behavioral25
Sample
omsdk-v1.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral26
Sample
sdk_core.min.js
Resource
win7-20230220-en
Behavioral task
behavioral27
Sample
sdk_core.min.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral28
Sample
settings.xml
Resource
win7-20230220-en
Behavioral task
behavioral29
Sample
settings.xml
Resource
win10v2004-20230221-en
Behavioral task
behavioral30
Sample
vpaid_html_template.html
Resource
win7-20230220-en
Behavioral task
behavioral31
Sample
vpaid_html_template.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral32
Sample
web.xml
Resource
win7-20230220-en
General
-
Target
settings.xml
-
Size
2KB
-
MD5
ba17ade8a8e3ee221377534c8136f617
-
SHA1
8e17e2aec423a8e6fb43e8cbe6215040217bb8a3
-
SHA256
ce1db1ad8a9512073164e3eccdc193f7eda036e1a9733caec4635de21b2865c8
-
SHA512
c18bcbcbd4b9a20a72b1a934d70db1eafef047f34f3ba2c6357d8e3afed07ecaab861e5571ceb58c22d4d3e5ebb34b51e366a0553c3153fbc263d1d80472e297
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002842f28b10aa9a4fa03cc285ec8dc6b400000000020000000000106600000001000020000000963eb7f6908057965b1da4705829976e09635d08e5e358f3d23e934449a3e444000000000e80000000020000200000002156a9e24aaf5c51d330eda2d2a01bd40729bb8feeac3c10e1b8a99ff5394b9a20000000174dee34a0a65a81f1ae18fc450e1daaf240a1c5cbbb4deff4b5f428ca10469f4000000098294bc21884405ad09b1b63012096923f7e6abd4bc5b12b74d23eb850160b5597f0649b6955254ecc9feb91e5db5568c03a4a6434cfae7290e050e44b41a842 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002842f28b10aa9a4fa03cc285ec8dc6b4000000000200000000001066000000010000200000001eead6b5a5e8fc7aa2998ed5dc131ca548a1473a98a433f9c5d68e4faa3e6bf0000000000e80000000020000200000008d0d01596be4e5539fe53333c14cf3291d7bb38fe7198d7676181e1a2b6452b320000000dccded8dbd00cf6d4f3a695a865c898c080110032abca1b8db23714d0a816dbf4000000024fa5d0a7c391e323dffdc6d4880e80f80de4af68bc8d6ed488d30669375ca08c24308fbf59c274cb80f376d81e3190caea3483ec12615edff497aec27c3cbce iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{3F683E71-070C-11EE-8227-D22EDD327857} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "346423084" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "346423084" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31038233" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30b76415199bd901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0dc8a15199bd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31038233" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "393110943" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 2168 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2168 iexplore.exe 2168 iexplore.exe 4692 IEXPLORE.EXE 4692 IEXPLORE.EXE 4692 IEXPLORE.EXE 4692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
MSOXMLED.EXEiexplore.exedescription pid process target process PID 2312 wrote to memory of 2168 2312 MSOXMLED.EXE iexplore.exe PID 2312 wrote to memory of 2168 2312 MSOXMLED.EXE iexplore.exe PID 2168 wrote to memory of 4692 2168 iexplore.exe IEXPLORE.EXE PID 2168 wrote to memory of 4692 2168 iexplore.exe IEXPLORE.EXE PID 2168 wrote to memory of 4692 2168 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\settings.xml"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\settings.xml2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
471B
MD56a696bab5dbda1f9e3dead87bbdfda15
SHA1efa2517cc9c306a85acce2f45a1b1a4763bc0ad9
SHA25627afd05f059c8af3bf76e14ec650eee55d2d4ef298669efd65ca1acaeb66ac2c
SHA5127bed5bb59abb768ebbf6d597e8b3b14be75cb23b08bd64945bfc80fcb0b9ce155d961c8b67512943ad30895be6201e669c1c0f8481373f2a95a744170e3a9050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
404B
MD5c89976fb9dd07ff4d105413768e2d0db
SHA1b5310ce60fb0ddc48c0074060953c67ddce20736
SHA256644a3a4441d8d609d50596ef324f75e30e85f70bd12612f73891b8da5ee358e7
SHA5124a33f40b67b8704c3d13358a76ab9d5d0802cc7c36011fd2cadec55608afa192f400d9a7da25bd833fc89675c708bced3aa057bce0c900cad4ad098630ff4ad4
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver23E3.tmpFilesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GPVLIKPI\suggestions[1].en-USFilesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
memory/2312-136-0x00007FFD185B0000-0x00007FFD185C0000-memory.dmpFilesize
64KB
-
memory/2312-138-0x00007FFD185B0000-0x00007FFD185C0000-memory.dmpFilesize
64KB
-
memory/2312-139-0x00007FFD185B0000-0x00007FFD185C0000-memory.dmpFilesize
64KB
-
memory/2312-140-0x00007FFD185B0000-0x00007FFD185C0000-memory.dmpFilesize
64KB
-
memory/2312-141-0x00007FFD185B0000-0x00007FFD185C0000-memory.dmpFilesize
64KB
-
memory/2312-137-0x00007FFD185B0000-0x00007FFD185C0000-memory.dmpFilesize
64KB
-
memory/2312-133-0x00007FFD185B0000-0x00007FFD185C0000-memory.dmpFilesize
64KB
-
memory/2312-135-0x00007FFD185B0000-0x00007FFD185C0000-memory.dmpFilesize
64KB
-
memory/2312-134-0x00007FFD185B0000-0x00007FFD185C0000-memory.dmpFilesize
64KB