Overview
overview
7Static
static
7Zelda Ocar...me.apk
android-9-x86
6Zelda Ocar...me.apk
android-10-x64
6Zelda Ocar...me.apk
android-11-x64
6index.html
windows7-x64
1index.html
windows10-2004-x64
1n64.apk
android-9-x86
1legal.html
windows7-x64
1legal.html
windows10-2004-x64
1license.html
windows7-x64
1license.html
windows10-2004-x64
1Analysis
-
max time kernel
102s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10-06-2023 16:45
Static task
static1
Behavioral task
behavioral1
Sample
Zelda Ocarina of Time.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
Zelda Ocarina of Time.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
Zelda Ocarina of Time.apk
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral4
Sample
index.html
Resource
win7-20230220-en
Behavioral task
behavioral5
Sample
index.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
n64.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral7
Sample
legal.html
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
legal.html
Resource
win10v2004-20230221-en
Behavioral task
behavioral9
Sample
license.html
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
license.html
Resource
win10v2004-20230220-en
General
-
Target
license.html
-
Size
341B
-
MD5
199bb4ac1652f60d7fc52391519e9fdd
-
SHA1
cfec6e94a0ab21a367e3d6d46d63ea45acf2d117
-
SHA256
483abc481b3fffd463eddb954deed3f01a86be4baa7b0ab786f8e47110b61380
-
SHA512
89eabcba01a6d9c5cb67aa06b6b317a59bebf3275447969d4598f97febd5ba87a3e6b7c5a88b7edfa12f6dedc40641ffd944a479443bb2c3a888202408892327
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b6e27fee4adc0841b34603c1734cf253000000000200000000001066000000010000200000004fc94b41b2514e2f6227f5e9ed5ebd8eea407b6c86a46e10f967009987eac924000000000e80000000020000200000001f2cbc4e6bcbf9a20c2412d21c4a87ffdbce820a053027ca70bc44e38fe058882000000093a6ee3cfd272841ef5ed0109a1217add60ee2d9fa6e4cfce4d881f63a4eb9c740000000581703478dc776d672627c38ab5840f8b85da15d8b95733f295753c7aa8be40a852ba109faf110f686c1995da67d9def46f5794a33f7536e175749d56fef9dda iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60a0b819bb9bd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{42E51F41-07AE-11EE-9578-4E1AE6AC1D45} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "393180527" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 608 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 608 iexplore.exe 608 iexplore.exe 1644 IEXPLORE.EXE 1644 IEXPLORE.EXE 1644 IEXPLORE.EXE 1644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 608 wrote to memory of 1644 608 iexplore.exe IEXPLORE.EXE PID 608 wrote to memory of 1644 608 iexplore.exe IEXPLORE.EXE PID 608 wrote to memory of 1644 608 iexplore.exe IEXPLORE.EXE PID 608 wrote to memory of 1644 608 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\license.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:608 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
62KB
MD5b5fcc55cffd66f38d548e8b63206c5e6
SHA179db08ababfa33a4f644fa8fe337195b5aba44c7
SHA2567730df1165195dd5bb6b40d6e519b4ce07aceb03601a77bca6535d31698d4ca1
SHA512aaa17175e90dbca04f0fa753084731313e70119fef7d408b41ff4170116ab24eaee0bd05dca2cc43464b1ee920819e5ce6f6e750d97e3c4fc605f01e7ff9c649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5442eee46c7eda23f64f9ff32f931b11f
SHA1b468a3e2389ee6aba4f7f87294737ad312f5b95b
SHA256c4f58f04d0e171d795186a353af5e3364cc0fb5eadb81110425a178bf19cfcc3
SHA512d54243d56facc78125e39ed4973935ad8313a45ca218df76f06bf432ce3e38f34a35c1faaf7b78f9c9f8278537cb5b0fcf08bffd78c2a0434110d26f693022a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57b3e8840a24ac148844f18c0b1e61cf6
SHA19b2b313d4409eb19dfa8ae3322a6ba0bbfaaef18
SHA256bed81ede67d43a939fb90b4c3fc7b467bc716fe95c5235b1e9b38d2bf6f12637
SHA5127ade14262c03d7a03233cff17e9bbe60a2d897121faed2dfceb17e5d0c1b2ae9c1973b7b2d8b25a9ec9e2d42560ed3fe09994b80999ae5ab5d2a12b56de457d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53ff51e196e4f1d903d46f8f45aac72cc
SHA113412386231382ad66e464fed8424f1d0c9bce3f
SHA256dc8cb098f286058393841297c7813ddf5837c01a207816824c46d6fcdf125873
SHA512423c379d456bf67d395d7ddaf5a16a9041ae659e02fad54bcef3d02c089923f90ce042a0981697ed3adb8d4d08108f6c46b8443f89011ed5857eca11bc3efa5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a65f9c7cc656ac755728690fab765ff2
SHA157360636a6b52d344ab116d8f26e94e2f5b7540b
SHA2562030738ceb2f54d40e0419ed2a8c3dbd460babb89109fe9dc4333d6264e93f5f
SHA512e1f805a23af6993ad14dbb6dbcc0757f5efd46ba2f9372d463f70d5a6e07d6014302cd84b4897d210d83cf53d75340efdc300e3e91047c405c839a59a44da0b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e44152519e8d976a433fcdbf75acc5fb
SHA1da54b0e41b6630384cb0893bd8177f02eba8652d
SHA2564515638dd82d2568d59269e744b26237dd3162520ddb3fb7af4b6de40eb496c0
SHA51266b389de3342b95c99f5077f115381e598f9f0ce41d1757c28ca0817f1ff6a79a8af5abef869e6382bdeed8ec2957e03ba31a270e2b9e4f639a3389644426b11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD532ce4c650c01295b3a5f05d8a32e85ce
SHA1272c8701caf2b0f0df58ce5c71902cfdba7d2e3e
SHA256a8b32b1557af4998ba1a5addac713bbbeeba07ed8122476643bb1acb7de4f05e
SHA5128db771da758f1554f2207db5612237a748dd7135d2abdc09cf5436f05275f841581c23588f5e1ffe41ef2ac0285b58f8d11373e7ace1cae23f6ecda8cf2e627c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b9c3096df50fb235f42630a78116f23d
SHA1ba602dacc9acc7312faa0f4b6a3c0eb4eaf076b1
SHA2561d4de94dafcd6fc430b78687c82049283e2cdf2b747068b64a6f35d472b97d78
SHA5122514c36b1712c1d11f67b5550f9fb68dec64fa4ad026f609cf386137972bf7cf8a47b4c5ac21d203b97b136ffe928f9000b7a79672f2b3bbd594a01a6e83cd5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e2e258685f215a9d7e9135f1f4b7c92a
SHA17aa1423c16a98cfcba2c48bf861bd4eb427edae2
SHA256a72149f3b22e0506958e40a6df3b0421e1e5775c4e63c075814a43aec9c923a7
SHA512d87dbc88797d8b4938e8fdb5b5bd079cf2b1bb11414a23dc41c8edf9a465dc747aaebbf2fc374c1124986f3d00ee96773378075c3648eb74f309c740d71248fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5dadb9976cbb430c245a026b03c5653d7
SHA17063c01a1e86a49a509ad48f23885d192b75a33e
SHA256831a597552f3b08eda45bb41d8558af92868871aa1dfeb7fb7ff2b96c060aa54
SHA512da29cff769f9c56ec52ee541cdc47404a0f6bacac08691d80ce2ee75554dedb0c114897b3c58ef44369b7558868fb65a30eebf23fa8e1d7e3fc1767a187140db
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QHKTFKHM\suggestions[1].en-USFilesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Temp\Cab4C30.tmpFilesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\D4WFBYS4.txtFilesize
603B
MD52aeb301caa1307db4335ee2630f55c93
SHA1eb574503291d0ebd76054d98942892717087f24a
SHA256b59257694e32a7a6ed49cfcf779d8e95481130b1ed7b85903657a600d2bb6730
SHA512b3546faf152c2aaaf96d13af4e118382669ae413c74a12a2d078974f60bc1d090a1cbecb571e6aca0ab25a421598ad57a55534a911e0efbaa5fae08a943df0a2