Overview
overview
10Static
static
7base.apk
android-9-x86
10base.apk
android-10-x64
10base.apk
android-11-x64
10Zw6IGlco.ppt
windows7-x64
1Zw6IGlco.ppt
windows10-2004-x64
1license-ru.html
windows7-x64
1license-ru.html
windows10-2004-x64
1license.html
windows7-x64
1license.html
windows10-2004-x64
1UserDict.pyc
windows7-x64
3UserDict.pyc
windows10-2004-x64
3_abcoll.pyc
windows7-x64
3_abcoll.pyc
windows10-2004-x64
3_sysconfigdata.pyc
windows7-x64
3_sysconfigdata.pyc
windows10-2004-x64
3_weakrefset.pyc
windows7-x64
3_weakrefset.pyc
windows10-2004-x64
3abc.pyc
windows7-x64
3abc.pyc
windows10-2004-x64
3copy_reg.pyc
windows7-x64
3copy_reg.pyc
windows10-2004-x64
3genericpath.pyc
windows7-x64
3genericpath.pyc
windows10-2004-x64
3linecache.pyc
windows7-x64
3linecache.pyc
windows10-2004-x64
3os.pyc
windows7-x64
3os.pyc
windows10-2004-x64
3posixpath.pyc
windows7-x64
3posixpath.pyc
windows10-2004-x64
3re.pyc
windows7-x64
3re.pyc
windows10-2004-x64
3site.pyc
windows7-x64
3Analysis
-
max time kernel
100s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
12-06-2023 07:25
Static task
static1
Behavioral task
behavioral1
Sample
base.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
base.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
base.apk
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral4
Sample
Zw6IGlco.ppt
Resource
win7-20230220-en
Behavioral task
behavioral5
Sample
Zw6IGlco.ppt
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
license-ru.html
Resource
win7-20230220-en
Behavioral task
behavioral7
Sample
license-ru.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
license.html
Resource
win7-20230220-en
Behavioral task
behavioral9
Sample
license.html
Resource
win10v2004-20230221-en
Behavioral task
behavioral10
Sample
UserDict.pyc
Resource
win7-20230220-en
Behavioral task
behavioral11
Sample
UserDict.pyc
Resource
win10v2004-20230220-en
Behavioral task
behavioral12
Sample
_abcoll.pyc
Resource
win7-20230220-en
Behavioral task
behavioral13
Sample
_abcoll.pyc
Resource
win10v2004-20230220-en
Behavioral task
behavioral14
Sample
_sysconfigdata.pyc
Resource
win7-20230220-en
Behavioral task
behavioral15
Sample
_sysconfigdata.pyc
Resource
win10v2004-20230221-en
Behavioral task
behavioral16
Sample
_weakrefset.pyc
Resource
win7-20230220-en
Behavioral task
behavioral17
Sample
_weakrefset.pyc
Resource
win10v2004-20230220-en
Behavioral task
behavioral18
Sample
abc.pyc
Resource
win7-20230220-en
Behavioral task
behavioral19
Sample
abc.pyc
Resource
win10v2004-20230220-en
Behavioral task
behavioral20
Sample
copy_reg.pyc
Resource
win7-20230220-en
Behavioral task
behavioral21
Sample
copy_reg.pyc
Resource
win10v2004-20230220-en
Behavioral task
behavioral22
Sample
genericpath.pyc
Resource
win7-20230220-en
Behavioral task
behavioral23
Sample
genericpath.pyc
Resource
win10v2004-20230221-en
Behavioral task
behavioral24
Sample
linecache.pyc
Resource
win7-20230220-en
Behavioral task
behavioral25
Sample
linecache.pyc
Resource
win10v2004-20230220-en
Behavioral task
behavioral26
Sample
os.pyc
Resource
win7-20230220-en
Behavioral task
behavioral27
Sample
os.pyc
Resource
win10v2004-20230220-en
Behavioral task
behavioral28
Sample
posixpath.pyc
Resource
win7-20230220-en
Behavioral task
behavioral29
Sample
posixpath.pyc
Resource
win10v2004-20230220-en
Behavioral task
behavioral30
Sample
re.pyc
Resource
win7-20230220-en
Behavioral task
behavioral31
Sample
re.pyc
Resource
win10v2004-20230220-en
Behavioral task
behavioral32
Sample
site.pyc
Resource
win7-20230220-en
General
-
Target
license.html
-
Size
18KB
-
MD5
57d40cdb2111f13e40a7c92af27d27b4
-
SHA1
27f72955eb424eef52715ccbde22d1cb5b23f622
-
SHA256
7dda06156acbe260754bf5cb0ff2acce418c4b2a7ddf4176fb4e2c892dd85ebc
-
SHA512
8fa42a10812c9ef10327caf5d8b618cda0bfdcf477f7914e8448175024cbcde7ae1a5ac47eb3e1d4500ad1cb7e904a22e97c2e1956aa274182753927cddf5b0a
-
SSDEEP
384:CwQfL6d89D4eefdN7aEGJ6Eyz6h9rx3pc/:Vo6d5eMdNbxEyaJTc/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000272dd506b7623f4aa5a5f27470518ce200000000020000000000106600000001000020000000f47340f466d1e6f06bd9d9c3cc301cea6b1de538641a39a7cca4cc4f0ac66f72000000000e8000000002000020000000cec68d2d7c1e2033ce0d0ec56494016eb9dc19e70d312765364ac5994c73cc7e2000000071acda8fb934cc3abe520ecd17c7fd702cf9715ed50ca8148f9e11ff75ab5ec140000000c281801909fb150e79a4135efb29c7e5423863aaf739c1cc3a1dd4d04fa02cd1f5558bf91ea1c6a1fec7f278c252981c2739bbdad9fdc2d0d84b866e55b114af iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c02a2519ff9cd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{42312951-08F2-11EE-852E-6AEE4B25B7A6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "393319683" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1388 iexplore.exe 1388 iexplore.exe 1164 IEXPLORE.EXE 1164 IEXPLORE.EXE 1164 IEXPLORE.EXE 1164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1388 wrote to memory of 1164 1388 iexplore.exe 28 PID 1388 wrote to memory of 1164 1388 iexplore.exe 28 PID 1388 wrote to memory of 1164 1388 iexplore.exe 28 PID 1388 wrote to memory of 1164 1388 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\license.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1388 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1164
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5861007edec3d019f6ade419603c5cf45
SHA1517cab6501aeadd11e4d550979b69c5012139b53
SHA2569b0905da15cea6e2ca345e39a61442ae08aa5ad6b4e8207c4220d75a64b31ad7
SHA51261fd1f5e80d4f8870e65b96332a92ec8f9c9a945b5a13cfa5569989b09a45ac7d30594e7382cdaa5a366b1c2e9d47e01dd9fd9e2c816525f131a01a117f0affe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff62ca2ed47163fe9b42a761795befb2
SHA10c2d9451d3c082433e411c383e183b39d4e63a78
SHA25663882a10400d816a3f84111552b36fafe35786d7860364d9a14129a58e5b1a4d
SHA512fe9f30e7b217dc968aa2929735df778315d363fda0a2c158c91caf2b8a6b58f1d4cb845fec90b0a60a7c4aca5a6b71eb1a65260cdace356cd1e12527e044d185
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54289c94436a93f1e47a364b4036fbb55
SHA117cfb48bf4f3b7b968cfff4f543b9e8c96910198
SHA256baa64bc4d8d3f8c693c4a3526fe051378a8c39c13e5aa169ec0167529f2a81a1
SHA5126268582ce32b2e42614b069fb16104ea8b04966cf66940158a4e0dd0f0ca2772f9e7e45fcf698ad2e84ad8b8aedbf651009ae4a7f4678fbe36a8ff2cf5b9239b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e82ad16d7222e69862a43b9cae682e2e
SHA1fd72631d4598629021a01a4f10c71f328c131b3c
SHA25613fe7efc0faf1174584fe24d42939000a03c8b1b590a7c0065f8ad0723b1541a
SHA512529565b71c6ec0471deeaf4665552c5a6944f0aaf79cc03afc2c78fbcab15ded691acc4f8d4c868acc0792113975d56f424174547dbc011e58da04e0c5214397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d98035acc1f2c030d970ae3b8fed05e2
SHA10cbf816b9f077dfd095dbd3f40329c35ab1573e6
SHA2563e89d6053a9b3692b9587f8ef594f61e8920d19c27ba86b74b24ab13b914e5cb
SHA51209c793ff496dde3cd53bad4f65b00aefc40de999997bb628f92c8a1c860ab3411d88e4bdb367cddfba84ab6724cc99d93ccec4661a326c79e205438623b39fed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad506cdc56e2ee2e79d22659da0f135a
SHA1382d24c29bc9fc6d6298b56453d7dc7661972400
SHA256d449ebf4ca7c6f1d2f7dc2ad53903c5190b92a9b4fa288f017851e2332612557
SHA512bd25f4230736fe7401d2fe1651765facc1a302a7e09cb097444aa5dd39402a6a4be05cc655aa3d1c5fb0eb11e7e808802ccb028fd2156d8d88d9ed056d36eed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1a1696a6d21cce3d6542d488799b724
SHA1ce7aa5d98a7f4375c31cd534b7eb49b458594482
SHA2563be3e577b0bddd72e65082d603952c36c083767c6c49c5f1fc623d959fe85dc0
SHA51267631e5de87449f1a401f61896c969750fa3d1f7b2c10ac053a4854daa4d4e292d13c130ddc1cbda8faf96f8534e7ba743b58551c743b5225158fba62c7a8e2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cab409e2117f3df7ce7083946311c48
SHA18999e949beadce3589b81b0d1aa36fa9befd626e
SHA2562799502cfdaaa5dd0b6ca18d7a9a62c7c93972d2af64ff93e6ecf3f5ac5d8d2a
SHA51201271c4f13caed945da654698079a6804e8e4710ea617631f04cc321aae766dcbe2ff3053cf707ffe98ed78c0c183e1850b0cd222b2d95760825ae2aa7f1af5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1fb0cc283dd04e8397b8b8c007abeac
SHA10e4414cc25c7dc5d068ec05c634a61a59b954cb6
SHA256c824ec3554c628184748b8b6cf9f81748c42cbdd04300fec8b279ff991edbcde
SHA5128ca4fe25aa5e39bee058c23b9db34c56da86d78c295ecc7a8651001fe4e581dc39de096df42dff6bc6a3d0d7f2aed9a43005e5ffe0ae76177cacda3138ced415
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ACT9UUKV\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
599B
MD5544cb7b75eb99fa0a071538776103baa
SHA19ebebfd66b6d88b7a1700891b618a697f80b6070
SHA256542065202689fa1deafdf69758c010f07b9b463e9e621a37a1900039bca7b77f
SHA512b72d7a5922c33c08b5c19fe8186825251fd2d2943d2d06cdea28de2703719bdbb86242b09c0f939f6bacfcaf0b68297666ce31c77d81aefd8d4d81dff4767097