Overview
overview
9Static
static
7CPF10.apk
android-11-x64
9clockDarkTheme.xml
windows7-x64
1clockDarkTheme.xml
windows10-2004-x64
1clockLightTheme.xml
windows7-x64
1clockLightTheme.xml
windows10-2004-x64
1ic_content...on.xml
windows7-x64
1ic_content...on.xml
windows10-2004-x64
1ic_content...ck.xml
windows7-x64
1ic_content...ck.xml
windows10-2004-x64
1ic_content...ck.xml
windows7-x64
1ic_content...ck.xml
windows10-2004-x64
1ic_content...ld.xml
windows7-x64
1ic_content...ld.xml
windows10-2004-x64
1stella_e2e.xml
windows7-x64
1stella_e2e.xml
windows10-2004-x64
1stella_wa.xml
windows7-x64
1stella_wa.xml
windows10-2004-x64
1Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05-07-2023 08:41
Static task
static1
Behavioral task
behavioral1
Sample
CPF10.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral2
Sample
clockDarkTheme.xml
Resource
win7-20230703-en
Behavioral task
behavioral3
Sample
clockDarkTheme.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral4
Sample
clockLightTheme.xml
Resource
win7-20230703-en
Behavioral task
behavioral5
Sample
clockLightTheme.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
ic_content_sticker_location.xml
Resource
win7-20230703-en
Behavioral task
behavioral7
Sample
ic_content_sticker_location.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
ic_content_sticker_location_60_percent_black.xml
Resource
win7-20230703-en
Behavioral task
behavioral9
Sample
ic_content_sticker_location_60_percent_black.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
ic_content_sticker_location_black.xml
Resource
win7-20230703-en
Behavioral task
behavioral11
Sample
ic_content_sticker_location_black.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
ic_content_sticker_location_emerald.xml
Resource
win7-20230621-en
Behavioral task
behavioral13
Sample
ic_content_sticker_location_emerald.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
stella_e2e.xml
Resource
win7-20230703-en
Behavioral task
behavioral15
Sample
stella_e2e.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
stella_wa.xml
Resource
win7-20230703-en
Behavioral task
behavioral17
Sample
stella_wa.xml
Resource
win10v2004-20230703-en
General
-
Target
clockLightTheme.xml
-
Size
3KB
-
MD5
2235609a58ada82f2110d941341a720d
-
SHA1
d3b06251eb8f131034ba1ea3b0db982cb31bd813
-
SHA256
d89ab1d4bc636a73d64ef1d8976d517f13449a11af28d70e88ca3d0c40e114a7
-
SHA512
ff7543b27941add4a92579f1a55f3b40a16cd8ec8cc43b678b229be38a3878267fcdbb80b040e91132fd938082c47e6e237f62ac3903422ad9499cf7164228d5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ab35dbc53fd45498f88cda789e11c5000000000020000000000106600000001000020000000b2ba5e1c0ee8b0a8ece2a79df5578978d9e0d5fd995df1dd646a1b12bdc8b31f000000000e8000000002000020000000cb46e7adbb52b8859f3f5a5052deaf90399e00b97af169e90eafca981d2775f920000000bc4b15116bdf9d7e2cc825e341c746f04cc1f683023e751bfdd1092eacb2d1904000000070351cb60230a1f7dd59a8bc63c714cc7b1628700c0452a50b70a371ed2839a1ecbf3969c5c5bbfd9a0cbb4053aa34700c185b1d556d9b567054dfc307185f94 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "395321210" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0942b4433afd901 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2859459355-424593036-1984306042-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6D9ED8D1-1B26-11EE-AED9-6A6389873578} = "0" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2200 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 1256 IEXPLORE.EXE 1256 IEXPLORE.EXE 1256 IEXPLORE.EXE 1256 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1100 wrote to memory of 2324 1100 MSOXMLED.EXE 28 PID 1100 wrote to memory of 2324 1100 MSOXMLED.EXE 28 PID 1100 wrote to memory of 2324 1100 MSOXMLED.EXE 28 PID 1100 wrote to memory of 2324 1100 MSOXMLED.EXE 28 PID 2324 wrote to memory of 2200 2324 iexplore.exe 29 PID 2324 wrote to memory of 2200 2324 iexplore.exe 29 PID 2324 wrote to memory of 2200 2324 iexplore.exe 29 PID 2324 wrote to memory of 2200 2324 iexplore.exe 29 PID 2200 wrote to memory of 1256 2200 IEXPLORE.EXE 30 PID 2200 wrote to memory of 1256 2200 IEXPLORE.EXE 30 PID 2200 wrote to memory of 1256 2200 IEXPLORE.EXE 30 PID 2200 wrote to memory of 1256 2200 IEXPLORE.EXE 30
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\clockLightTheme.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1256
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db45f8647322894a92be7c3a0c39fb96
SHA16c870100d3da8772d30c826a468694274860ffc6
SHA25608b229eb6176db5bcc51f79a245671b5f4cb732dc7c64a8f9bd2992be667bff1
SHA512a5360eadb1481b3d1770aa08f97b347a2a1cb6831fc994eeb404d3e7241fa9916730e502defa44af11ffac31ed0e5614203b464f2ff00658507e5765c69d44dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53145db1af12e65eec54f028edca3cef7
SHA1d5967e3b40fed9e4b505565fd738d1f1640f4a80
SHA2560bc170e54640c1d96c358f80a84e865dbc906a3592664bce4e74012ddb0c1623
SHA512b3070a8c3d548f13268af513f77cf4497b87554674779d97a82ea13eb8b598ed1cf1ed2e6d4e678f16e1d3a8b68651eb93f391e838f873cc3db548f60ac35076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b15aaef7098698e500d96eff429d68c
SHA12f63571bd99dadce578d07fb8e4f9dfd5d65bb0e
SHA25638a6ea8aa668c8db839c16ab063f96583de09d35267f7f811bb226fb5dab32f0
SHA51201e2377872cdbc7dabda8b10afe10675c3f11be753cdab3d4842c5e25eea8478ba1a47391e59ba0cd4c13d9b94d21f83dce69a55e836bd3874edc2e85865a850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2a8d40ac80e5bd35bdedd119be80826
SHA14617772b44cbc902b2a45ec1d8e4c868a2c48d1f
SHA25665b4105f0211e07a1904de9e616ea3b6b84cd4e1b7cb438f46ea8cde5c1f576f
SHA5122d062656efd5a2361bded084b6a2df67f02e3785b4b093eba9c27ca9c1a034aeb63813ebc37b8c592d7571b6622bce827eeaba64f70a749a8ee36c2ce103e3c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519ff86cc72f6fdf6ef1788d8aa964416
SHA131e6a3f6194a7aa51a2a21d2bb3ad32421ce32ec
SHA25640527b58077626f1c88e7f491cc306acda6e6bbdba7a5ae247463f4b14d3f66f
SHA51286448387f2601866152ec6f5c6f0bd7bfa0bd2d975e4cad0b3ce36aae53771300a9946f5828d9c1daeabd9e25580aad87fd16543607e69294a1815721a9efd65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd2f879569a0b21751ca6400367abc85
SHA18f2b80ae6241ba378e4582afef1404a1696b3433
SHA25627537009bd1329e204fafef44ba62bced18f02037863669a466b5a1c9a621329
SHA512eef88f191be23d14c9ebae23f50914ab7bc9bedea2e5a8a6200f8a3e28ad1d73577b25b3552ebb32e7235910a93f10f2d0b553c479cd37961ac2b97c0ee6d990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ffc7a8b6e70856d2cc6b25e18cf0976
SHA1974b73cc97ae379071b3d065d69f95c16b2a7304
SHA256edf026405bbe2f36c61efffddd13a0fa3cddc883b5f7ec8bbd31a32ccf02b47e
SHA512a35d22636045a6a9a27b15d22fda8dc7dc9c1347db5524da892b45419e156bdffcc14d0a95cadf18d837503ceb75ad98a3d53337dce2f26b9be8f67449853325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5141791a933f03e5c8108fc3ece709c90
SHA172aaf22dc61932e0d57742f9ae24a0f29d28795b
SHA2569e16ddaacbb1525bd5a5cf31253437c1582a2869e662987a0bd8b44071f69d46
SHA512d99f0eddf49f09fc2c7be88eeb8551797b89d6e38fac966917b2f4011a8443ee50a1e63819f497e98fe60a23a8089f484cf31aae836c115a6a1cca496dee9a97
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JHFV4GXP\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
606B
MD50b604875bbed749bfae25e1017b8170c
SHA167ea1ad5441d9f1452667fafe845733d039c32b1
SHA256c0923ddf17a73509d12d6fb040a938f4db0daab0caf23bf69adc48309ed0f244
SHA512027c46e0b455b51d12f125f722ee1b9dcb6deeb4f5467269377bb8aa8b9687dea2b6273c2f1166ea853e1ac66ed8e4833a423f157934675917493d8597ad8553