Overview
overview
7Static
static
7GB_b19741fxj.apk
windows10-2004-x64
3YOWA.html
windows10-2004-x64
1changelog-ar.html
windows10-2004-x64
1changelog.html
windows10-2004-x64
1clockDarkTheme.xml
windows10-2004-x64
1clockLightTheme.xml
windows10-2004-x64
1credits.html
windows10-2004-x64
1e1627.obi
windows10-2004-x64
3e1632.png
windows10-2004-x64
3e1908.png
windows10-2004-x64
3e1911.png
windows10-2004-x64
3e2156.png
windows10-2004-x64
3e2161.png
windows10-2004-x64
3e2182.png
windows10-2004-x64
3e2190.png
windows10-2004-x64
3e2732.png
windows10-2004-x64
3e2738.png
windows10-2004-x64
3e2742.png
windows10-2004-x64
3e3223.png
windows10-2004-x64
3e3230.png
windows10-2004-x64
3e3232.png
windows10-2004-x64
3e3234.png
windows10-2004-x64
3e3236.png
windows10-2004-x64
3e3239.png
windows10-2004-x64
3e3242.png
windows10-2004-x64
3animations...6.json
windows10-2004-x64
3l17846d7a_x86.so
windows10-2004-x64
3Resubmissions
06/07/2023, 18:35
230706-w8fqlsdg43 706/07/2023, 18:32
230706-w6mfdadg35 706/07/2023, 18:27
230706-w34kgsdg32 705/07/2023, 09:21
230705-lbqjfabd66 705/07/2023, 08:59
230705-kxxdfach7v 705/07/2023, 08:41
230705-klwmrscg9y 705/07/2023, 07:15
230705-h3aqhscf6z 705/07/2023, 07:13
230705-h2e9lsba95 705/07/2023, 06:50
230705-hl6fvscf2t 7Analysis
-
max time kernel
97s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2023, 07:15
Static task
static1
Behavioral task
behavioral1
Sample
GB_b19741fxj.apk
Resource
win10v2004-20230621-en
Behavioral task
behavioral2
Sample
YOWA.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
changelog-ar.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral4
Sample
changelog.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
clockDarkTheme.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
clockLightTheme.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
credits.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
e1627.obi
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
e1632.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
e1908.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
e1911.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
e2156.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
e2161.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
e2182.png
Resource
win10v2004-20230621-en
Behavioral task
behavioral15
Sample
e2190.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
e2732.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral17
Sample
e2738.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral18
Sample
e2742.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral19
Sample
e3223.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral20
Sample
e3230.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral21
Sample
e3232.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral22
Sample
e3234.png
Resource
win10v2004-20230621-en
Behavioral task
behavioral23
Sample
e3236.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral24
Sample
e3239.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral25
Sample
e3242.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral26
Sample
animations/lf30_editor_cjab5ej6.json
Resource
win10v2004-20230703-en
Behavioral task
behavioral27
Sample
l17846d7a_x86.so
Resource
win10v2004-20230703-en
General
-
Target
clockDarkTheme.xml
-
Size
1KB
-
MD5
663e33bfbbb0d14830694114d49c457d
-
SHA1
3231baf54a3c1f336f1b11d9a7011bc5502a9d4a
-
SHA256
43b0cd84c7344f57b2656d66d5bf215a4f1d1713a8117e0ecf92226b8ce1a200
-
SHA512
c116ffaf6c1f8ad9bd6a1d85de318c9ca2c3b6d4931a1aa165dc7ef7351c80fbddc7ca1371c81dee35b3e12720fee2d3146d7a510b54026c3aba9202dee5f1b8
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{1D7C35D5-1B04-11EE-AF62-D2D73DF841E5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4063056070" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{23ADB0D0-1B04-11EE-AF62-D2D73DF841E5}.dat = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "4063056070" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31043344" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31043344" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4692 iexplore.exe 4692 iexplore.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4028 wrote to memory of 4692 4028 MSOXMLED.EXE 79 PID 4028 wrote to memory of 4692 4028 MSOXMLED.EXE 79 PID 4692 wrote to memory of 2572 4692 iexplore.exe 81 PID 4692 wrote to memory of 2572 4692 iexplore.exe 81 PID 4692 wrote to memory of 2572 4692 iexplore.exe 81
Processes
-
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\clockDarkTheme.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\clockDarkTheme.xml2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4692 CREDAT:17410 /prefetch:23⤵PID:2572
-
-