Overview
overview
7Static
static
72b0bd5645b...0b.apk
android-9-x86
72b0bd5645b...0b.apk
android-10-x64
72b0bd5645b...0b.apk
android-11-x64
7index.html
windows7-x64
1index.html
windows10-2004-x64
1libjiagu.so
debian-9-armhf
1libjiagu_a64.so
ubuntu-18.04-amd64
libjiagu_a64.so
debian-9-armhf
libjiagu_a64.so
debian-9-mips
libjiagu_a64.so
debian-9-mipsel
libjiagu_x64.so
ubuntu-18.04-amd64
1libjiagu_x86.so
ubuntu-18.04-amd64
1Analysis
-
max time kernel
100s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
15-06-2023 01:06
Static task
static1
Behavioral task
behavioral1
Sample
2b0bd5645bbbb9d18937d6e3a58abd0b.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
2b0bd5645bbbb9d18937d6e3a58abd0b.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
2b0bd5645bbbb9d18937d6e3a58abd0b.apk
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral4
Sample
index.html
Resource
win7-20230220-en
Behavioral task
behavioral5
Sample
index.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
libjiagu.so
Resource
debian9-armhf-20221111-en
Behavioral task
behavioral7
Sample
libjiagu_a64.so
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral8
Sample
libjiagu_a64.so
Resource
debian9-armhf-20221111-en
Behavioral task
behavioral9
Sample
libjiagu_a64.so
Resource
debian9-mipsbe-20221125-en
Behavioral task
behavioral10
Sample
libjiagu_a64.so
Resource
debian9-mipsel-en-20211208
Behavioral task
behavioral11
Sample
libjiagu_x64.so
Resource
ubuntu1804-amd64-20221111-en
Behavioral task
behavioral12
Sample
libjiagu_x86.so
Resource
ubuntu1804-amd64-20221125-en
General
-
Target
index.html
-
Size
2B
-
MD5
444bcb3a3fcf8389296c49467f27e1d6
-
SHA1
7a85f4764bbd6daf1c3545efbbf0f279a6dc0beb
-
SHA256
2689367b205c16ce32ed4200942b8b8b1e262dfc70d9bc9fbc77c49699a4f1df
-
SHA512
9fbbbb5a0f329f9782e2356fa41d89cf9b3694327c1a934d6af2a9df2d7f936ce83717fb513196a4ce5548471708cd7134c2ae99b3c357bcabb2eafc7b9b7570
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000067ab9c5972fe74b9fac97eadee675ac0000000002000000000010660000000100002000000035a350732b3f178cbf7d03cf75af7f24b8b611fe2e45a41ff8e9ff2b9cc4308a000000000e800000000200002000000069b4f5c247d39a48f88fa15258d2ffe9658e71af12807549b1a1acf4cd5347e020000000ce4fcf211eba215c9f406638d6f37f6a1f083cf99121431458314ca73497b9b640000000f2209a09ee3c2cdf65d1df6eda58ffcf19d1c8a4a5dac5e49191ef29ca7a9498001a21e96ef3ca10a5e926a01cd65ed9959406e6f99d2d0c87ff5d4d2a3c9b0e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EE7EEBC1-0B18-11EE-8A9B-DEF2FB1055A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "393556196" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0c896c5259fd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 1524 IEXPLORE.EXE 1524 IEXPLORE.EXE 1524 IEXPLORE.EXE 1524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1524 1724 iexplore.exe 29 PID 1724 wrote to memory of 1524 1724 iexplore.exe 29 PID 1724 wrote to memory of 1524 1724 iexplore.exe 29 PID 1724 wrote to memory of 1524 1724 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\index.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1524
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5b5fcc55cffd66f38d548e8b63206c5e6
SHA179db08ababfa33a4f644fa8fe337195b5aba44c7
SHA2567730df1165195dd5bb6b40d6e519b4ce07aceb03601a77bca6535d31698d4ca1
SHA512aaa17175e90dbca04f0fa753084731313e70119fef7d408b41ff4170116ab24eaee0bd05dca2cc43464b1ee920819e5ce6f6e750d97e3c4fc605f01e7ff9c649
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a09c77ad6be5f7f85fda66fd83ead67
SHA1f5c9b786ddc0ec40a9408976295301f408f78a31
SHA2567194dc6666e05ad432b724948a2c77a1dcd122a74f46c7e8f9b1e85a6131a699
SHA5128f5222230859f3a2dee58d59216c1c8b6b6846f84111b6785bb37e336cbb1b9995973668e8bb6429f4740d53c90416e13be56fb3edfc8c62f54d2319ce189bf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5535a8850435ba8f3d1203c00a17fd4
SHA14efaaf15dd1ab9cc5d716ec73bf42e60fe2e1572
SHA25660754f2d9b543e68ce3a3e920c1f8f9e9616c9e4832f2754b4f327d74fef30e9
SHA512726cad84e5f09394203c4fa8be38fc044e2d3a420ed73bdfea4ba0fdf4a4e74616a63a3c844e3d3b13ea2a898fb36327245e8fe2d92ccd0c65018b8cc1b9a59c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bba106bbb0e901f3dd3ac9c3c63183e5
SHA11e09caab7792420347a0ddc763d6320a58ef70c0
SHA25689444b7b44b6d4d4cc1c7a0f312abf4ff763872159e1403daf763d5353adfd8b
SHA51220cd63605bbc32ff25deb570da67936aa9f837964fe6e1a46e122ebde9cc51fa1cb584f7b8e4a8f3bd801c122270d13ef7303fa9c00c5e79bc66de7d533f0e5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574734af081bdf5666402d3f1fb6ef32e
SHA1d1e9a7d355566878551cb7d33e7186725fb72c42
SHA256ed3b1f2dd49ff6532f7b8b728c2917301cebd9230e282020cad2c33dc098b853
SHA512b28eaf8362094ccd2b9e782235aa93a8bc31f17b9d34264dbfd292ec910ae5919b00453b1951db7bae64ea7f97439cf4103ed6f69b699ef20691b3623bcf2b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5becea33013448e6b63fa7657e4bf1051
SHA1a0cb22e84ec2418b4c433731fcc8493396e248bf
SHA256877d750d8904b2393c99d7dbe30156a81b1293a7a77032393cb546bc7991b7a1
SHA5128ffbe5f618c4b57b910fac3c875cf730657e19d0b84a6249e492b0a1e2e56eecb0d258443b2f129bc1f999cd0bca18be29a3c2009f43f55e47761206c612b410
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ACT9UUKV\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
600B
MD56dc05ab870db364e781f0853a77a2bea
SHA15e20b1e655ead8a97a2bd89272209ebddf58b7c8
SHA25628b70e2f3543ffeeff5e0fc50ee26c42a42ed14ff11b3c04d9aff3ab0dab3e04
SHA51275b54243d68362d0e6518aec019f068566bd7204251cf543e38e567cc98043eb3cd37a194fa78489ea4ae9776fa356c8e6bbad76a54c24b69f1592a4230e4938