Overview
overview
7Static
static
7GB_b19741fxj.apk
windows10-2004-x64
3YOWA.html
windows10-2004-x64
1changelog-ar.html
windows10-2004-x64
1changelog.html
windows10-2004-x64
1clockDarkTheme.xml
windows10-2004-x64
1clockLightTheme.xml
windows10-2004-x64
1credits.html
windows10-2004-x64
1e1627.obi
windows10-2004-x64
3e1632.png
windows10-2004-x64
3e1908.png
windows10-2004-x64
3e1911.png
windows10-2004-x64
3e2156.png
windows10-2004-x64
3e2161.png
windows10-2004-x64
3e2182.png
windows10-2004-x64
3e2190.png
windows10-2004-x64
3e2732.png
windows10-2004-x64
3e2738.png
windows10-2004-x64
3e2742.png
windows10-2004-x64
3e3223.png
windows10-2004-x64
3e3230.png
windows10-2004-x64
3e3232.png
windows10-2004-x64
3e3234.png
windows10-2004-x64
3e3236.png
windows10-2004-x64
3e3239.png
windows10-2004-x64
3e3242.png
windows10-2004-x64
3animations...6.json
windows10-2004-x64
3l17846d7a_x86.so
windows10-2004-x64
3Resubmissions
06/07/2023, 18:35
230706-w8fqlsdg43 706/07/2023, 18:32
230706-w6mfdadg35 706/07/2023, 18:27
230706-w34kgsdg32 705/07/2023, 09:21
230705-lbqjfabd66 705/07/2023, 08:59
230705-kxxdfach7v 705/07/2023, 08:41
230705-klwmrscg9y 705/07/2023, 07:15
230705-h3aqhscf6z 705/07/2023, 07:13
230705-h2e9lsba95 705/07/2023, 06:50
230705-hl6fvscf2t 7Analysis
-
max time kernel
103s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2023, 07:15
Static task
static1
Behavioral task
behavioral1
Sample
GB_b19741fxj.apk
Resource
win10v2004-20230621-en
Behavioral task
behavioral2
Sample
YOWA.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
changelog-ar.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral4
Sample
changelog.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
clockDarkTheme.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
clockLightTheme.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
credits.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
e1627.obi
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
e1632.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
e1908.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
e1911.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
e2156.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
e2161.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
e2182.png
Resource
win10v2004-20230621-en
Behavioral task
behavioral15
Sample
e2190.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
e2732.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral17
Sample
e2738.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral18
Sample
e2742.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral19
Sample
e3223.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral20
Sample
e3230.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral21
Sample
e3232.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral22
Sample
e3234.png
Resource
win10v2004-20230621-en
Behavioral task
behavioral23
Sample
e3236.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral24
Sample
e3239.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral25
Sample
e3242.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral26
Sample
animations/lf30_editor_cjab5ej6.json
Resource
win10v2004-20230703-en
Behavioral task
behavioral27
Sample
l17846d7a_x86.so
Resource
win10v2004-20230703-en
General
-
Target
credits.html
-
Size
3KB
-
MD5
64ecc35282113e2de83eb80221a9c379
-
SHA1
236417851a07204647043cbec1570bd2c86d1b3f
-
SHA256
98573f2746aafd2c7dd8313b12021da2fc47d7b0111a1a0b79eab18c4730fae9
-
SHA512
39cbeae68f7ce7d22510c22c6542168969ed789c6ab66d9d41c3d443fe0815c84571b833eff7e4f5139a61b7776114ec7194c1d1d87b2c7058ad5b51381212d1
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31043344" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4065969023" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{2217A080-1B04-11EE-AF62-7290DE67E8EA}.dat = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{2217A07E-1B04-11EE-AF62-7290DE67E8EA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "4065969023" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31043344" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3824 iexplore.exe 3824 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3824 wrote to memory of 4804 3824 iexplore.exe 79 PID 3824 wrote to memory of 4804 3824 iexplore.exe 79 PID 3824 wrote to memory of 4804 3824 iexplore.exe 79
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\credits.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3824 CREDAT:17410 /prefetch:22⤵PID:4804
-