Overview
overview
7Static
static
7a37f233569...c2.apk
android-9-x86
a37f233569...c2.apk
android-10-x64
a37f233569...c2.apk
android-11-x64
createjs-2...min.js
windows7-x64
1createjs-2...min.js
windows10-2004-x64
1vpaid_html...e.html
windows7-x64
1vpaid_html...e.html
windows10-2004-x64
1webClipper.js
windows7-x64
1webClipper.js
windows10-2004-x64
1Analysis
-
max time kernel
100s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
30-06-2023 23:05
Static task
static1
Behavioral task
behavioral1
Sample
a37f2335699f2d66b575572284f4cbb5573a76ded24580189e2fb6d0bc9f08c2.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
a37f2335699f2d66b575572284f4cbb5573a76ded24580189e2fb6d0bc9f08c2.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
a37f2335699f2d66b575572284f4cbb5573a76ded24580189e2fb6d0bc9f08c2.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral4
Sample
createjs-2015.11.26.min.js
Resource
win7-20230621-en
Behavioral task
behavioral5
Sample
createjs-2015.11.26.min.js
Resource
win10v2004-20230621-en
Behavioral task
behavioral6
Sample
vpaid_html_template.html
Resource
win7-20230621-en
Behavioral task
behavioral7
Sample
vpaid_html_template.html
Resource
win10v2004-20230621-en
Behavioral task
behavioral8
Sample
webClipper.js
Resource
win7-20230621-en
Behavioral task
behavioral9
Sample
webClipper.js
Resource
win10v2004-20230621-en
General
-
Target
vpaid_html_template.html
-
Size
16KB
-
MD5
7d7cb3d6c22da954fccb084f6c18ee01
-
SHA1
529871b15146f802c1c1fe2342b31db9e328bb7b
-
SHA256
05cb7160ec6766397cacbfc5d57373edbcb028917d81e2f2d748e27086db23cf
-
SHA512
a73d034079dba15d38bd14ddb81afd8af51b31a5c80cd83346556e7ca7f2ec927511ec3c151abf7cdc108ac4671b7623066e0375b30536e1503125354fa1a15b
-
SSDEEP
192:mrLYJFkVvGFQshArPtP842+Lw1wOEeR6kad8bWXSrJEBOn8TsjNC4ck8aanlDTtI:8U42Fn9qW4+EQNuSXIlodo4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000826db13b4f2d6946b52cb68ee9de0a2e0000000002000000000010660000000100002000000095045e4c5441065ffc132f64284cdbcffae2b6d9f6170c880624fa3580dda6c6000000000e800000000200002000000086a450c90375b5e928c9e4b505b10d5441ff6f355f114ef1599ab7d520ef55f720000000074cff3e2aa156c06b30db41f84d2e04635f3183de7220edd7ce5209effa9605400000008ed18a82e3870a6daf8d62a85328695f3d1f4b6c6e975618c2793de857a090ed1988021891b753cdddada5fdf819eddaf9ddf616a2ed0456538748412fad3c32 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a038ac6aa7abd901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{93A57281-179A-11EE-B26F-F6780A61CDA7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "394931291" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1372 iexplore.exe 1372 iexplore.exe 868 IEXPLORE.EXE 868 IEXPLORE.EXE 868 IEXPLORE.EXE 868 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1372 wrote to memory of 868 1372 iexplore.exe 29 PID 1372 wrote to memory of 868 1372 iexplore.exe 29 PID 1372 wrote to memory of 868 1372 iexplore.exe 29 PID 1372 wrote to memory of 868 1372 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\vpaid_html_template.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1372 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:868
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548c2da7d8abefdedf201aad66f22b552
SHA12d38df409fe3274e7b9d457e93c13a057c364e37
SHA2567414c19cfbe34c2f756e78875926d3ad88bdda8d89228c582cb30bd2640ecb4b
SHA512059a91886691541c205dd060324bdf34fce1c0cf4de208d861b03006c9179a503a01d9903444f7378384b1156e3583832ddbed236a467690b569367d4715d6ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cde5a3c7e7b2d2c294d89aaffef67e46
SHA10b71c8f6b4a3f50b0b3f51aaf68cb6e8f078eb3d
SHA256b4c397f5fbca8fcf66f71dfc283d79aaa7a170604eb74bce218e63e76b573c17
SHA512555bcc1ec4e0d775499c1fd9cfec5f435d60a0935f6f9c859f1b0496ac3b4ff59d83189b208f2a8fffb0509ec8963f9a05859f102989cbfade8f9fee8574c169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edd360a2aa459b75012558f92931add4
SHA1960776af4eac07e4490ba8d31c82fc01ca01e0d1
SHA256035a3d180b3179dc481942a39f090c7a47362dc69e6ce43cb082ea22d568be09
SHA5126a4c1c168e4acb3cbf9f94d32125deb3711685f338a5553b0577c3dc48ebf58dd37f39cde2b16cba38c648c8200843ec13f40c921aa8370a5af916183f7f4bee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fac31da596768e2cd034cb6e6b95179
SHA16817f6e1fc3a1e6343f417fdf74fbdf92e13ff17
SHA2562b2da96e855025c38b6ec6630c5b19b9749598451df05eb310e8bb1c4e12cc01
SHA512d4a03178d649968e30522a4d9770b869bf3151798417a2d1c4d219d77540002c7ae2b7c3b2a2f390f819b397b7efa789575ca88b5c942c5073401af05050f7e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545d850f486dd1e837cb2c6570b2b6a5d
SHA1e3e6fdb7564040483cff7a955b36a6db07f9a6ba
SHA256a2362d688c0bd638853b1f5b1df86c46ca6b32dc1c597fe6126aad8949449385
SHA512d77eba4df3f50520ead3e622717ada01c7b5a16ab0f6589a1be3556effcc529139a4c1a46246dc55f306f2062c8d81a9aa8bb211624be35a7499c78ee52ab86d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c73bc9b2afe5a590a1609f3d0b3085c6
SHA1ae920f7ed414f614ad1c1247e6a80e2d2eef2634
SHA256b7cf0a5d61ee0e0f405cd4170dc7a65d64ad44b8d6a7f18e4e75022506384458
SHA51295eb00ea624b63faf1409f67ce69d5b1eedc543e8ec5f250403cee88876f25611c42f7f9f8c01824141d36c4434adfec67bd037b484702b421063c9548f0432d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581230a2fbb01c13d6d9480ecf87a973b
SHA1e4343987d6dbd012779a0c89d5f9dadac27db760
SHA2562df94a57b6bdc6908a84364274517e9e60606c9c55a78e88eb65e98f7493712e
SHA5128b63da705bd0afd9291cb93a62a5b614e82baaec1b65f6600a48a3c07994449f06276c11563c15dfb2208b1988d17d709a71f64d9f3a0a463125c98c2baec02b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebaffe82fef3411c76f98da9c377c5b0
SHA10b5adf860f488c29dee6bafcf10086c74f4e25bb
SHA256e6750db75a01a6d299a1de8a09bb13bc885d0cdfa135a31d74dfccf2c1377633
SHA512a44c589b20f575e96ad74f26270b0d7e3cb3b32dcaa1cde5a1919b248602f4954f5ce09e6f9064feea00b0ab6bbba14c0e4b78338712be2d53ab50099831fdd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518dafcc4b5fdab599e0891d6794e94d7
SHA1ca758c168c0e5c2b8aca9ea5564b9f8c6c7e735d
SHA25678f4369fabdcd53bfc863884fe8b2f08ddee91db4ea2391001903bbe4a7db7ec
SHA5120d9afed866b8517bf6a92e4f16c774a7706d20313e6ad0837838285f13a5d66301dc38d3ef64a939c502d06313d49353d4d88621ef251b27779b06a5a294d6dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57aa9e8ed5a3ee420d5e802f35809811f
SHA1f4f2cf22cda1f0534e5284a0ba82c752bcb46142
SHA256ea31a23a553d3c76bb9d78a1826414ff440cf4e8f145fbf509410b88bca30ec5
SHA512142910d4a95beaa4c038edfb1fa7acbe316d4b08f1e4a27fdf26704feed135961b47cf1d56cc679b2645ec148993dbfbe30d7947daed1c3588f6f95adaea321e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3b6ab49fda3950c8511a19119c63c88
SHA11c9d8ccb49b5e3940b0bc0673d431db8c89839f1
SHA256ea4aebe6846c9971d46bf6b4def97be217235cbdd05c9a5c44bb7ed38188a155
SHA512637faa242d175da4bb4eb483022c5815b8acade77936521b7c5cb50115140741dd9339fd2b7e7c399b22f62e4304ccd1d6346957e05406ebca50fa2f8026a8ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567007245db306172f71cbad53dcea0b1
SHA14b9371763f641ea5ce063057ec7f4eb63ef2c53c
SHA256ab8e3dde2915f44c70b0b911173704ec4d9fac6e201b2727e88f05dc3044b154
SHA512c91389b473843d47b68861f1fc4805ef2324a7dea8b07df69cc2fa4ab3899e4fd2311d96aa5f518fc3103b49bf57dacc4146ac06499a8556ccb89e5c72b9bf2a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\134K02XQ\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
601B
MD55f46082c81ae3cfef1a83b04f6c60b18
SHA1a26f7336ab5359ea1014744f2db002fc97650b66
SHA25652d768786960926dc52417f432dce635fd39be067d5b2136f40ff3cfb2f71968
SHA512e0f60ce95632c874043febdedc73e65defef3079204af9a91f67d04219659c167ebca574c56fde847d6ddbbc0e211b5dbc5a609d230f52674d86d465a27de500