Overview
overview
7Static
static
7GB_b19741fxj.apk
android-9-x86
1YOWA.html
windows7-x64
1YOWA.html
windows10-2004-x64
1changelog-ar.html
windows7-x64
1changelog-ar.html
windows10-2004-x64
1changelog.html
windows7-x64
1changelog.html
windows10-2004-x64
1clockDarkTheme.xml
windows7-x64
1clockDarkTheme.xml
windows10-2004-x64
1clockLightTheme.xml
windows7-x64
1clockLightTheme.xml
windows10-2004-x64
1credits.html
windows7-x64
1credits.html
windows10-2004-x64
1e2443.png
windows7-x64
3e2443.png
windows10-2004-x64
3e2445.png
windows7-x64
3e2445.png
windows10-2004-x64
3e2446.png
windows7-x64
3e2446.png
windows10-2004-x64
3e2447.png
windows7-x64
3e2447.png
windows10-2004-x64
3e2448.png
windows7-x64
3e2448.png
windows10-2004-x64
5e2449.png
windows7-x64
3e2449.png
windows10-2004-x64
3e2450.png
windows7-x64
3e2450.png
windows10-2004-x64
3e2451.png
windows7-x64
3e2451.png
windows10-2004-x64
3e2452.png
windows7-x64
3e2452.png
windows10-2004-x64
3e2453.png
windows7-x64
3Resubmissions
06/07/2023, 18:35
230706-w8fqlsdg43 706/07/2023, 18:32
230706-w6mfdadg35 706/07/2023, 18:27
230706-w34kgsdg32 705/07/2023, 09:21
230705-lbqjfabd66 705/07/2023, 08:59
230705-kxxdfach7v 705/07/2023, 08:41
230705-klwmrscg9y 705/07/2023, 07:15
230705-h3aqhscf6z 705/07/2023, 07:13
230705-h2e9lsba95 705/07/2023, 06:50
230705-hl6fvscf2t 7Analysis
-
max time kernel
102s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
06/07/2023, 18:35
Static task
static1
Behavioral task
behavioral1
Sample
GB_b19741fxj.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
YOWA.html
Resource
win7-20230703-en
Behavioral task
behavioral3
Sample
YOWA.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral4
Sample
changelog-ar.html
Resource
win7-20230703-en
Behavioral task
behavioral5
Sample
changelog-ar.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
changelog.html
Resource
win7-20230703-en
Behavioral task
behavioral7
Sample
changelog.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
clockDarkTheme.xml
Resource
win7-20230703-en
Behavioral task
behavioral9
Sample
clockDarkTheme.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
clockLightTheme.xml
Resource
win7-20230703-en
Behavioral task
behavioral11
Sample
clockLightTheme.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
credits.html
Resource
win7-20230703-en
Behavioral task
behavioral13
Sample
credits.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
e2443.png
Resource
win7-20230705-en
Behavioral task
behavioral15
Sample
e2443.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
e2445.png
Resource
win7-20230703-en
Behavioral task
behavioral17
Sample
e2445.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral18
Sample
e2446.png
Resource
win7-20230703-en
Behavioral task
behavioral19
Sample
e2446.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral20
Sample
e2447.png
Resource
win7-20230703-en
Behavioral task
behavioral21
Sample
e2447.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral22
Sample
e2448.png
Resource
win7-20230705-en
Behavioral task
behavioral23
Sample
e2448.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral24
Sample
e2449.png
Resource
win7-20230703-en
Behavioral task
behavioral25
Sample
e2449.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral26
Sample
e2450.png
Resource
win7-20230703-en
Behavioral task
behavioral27
Sample
e2450.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral28
Sample
e2451.png
Resource
win7-20230703-en
Behavioral task
behavioral29
Sample
e2451.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral30
Sample
e2452.png
Resource
win7-20230705-en
Behavioral task
behavioral31
Sample
e2452.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral32
Sample
e2453.png
Resource
win7-20230703-en
General
-
Target
credits.html
-
Size
3KB
-
MD5
64ecc35282113e2de83eb80221a9c379
-
SHA1
236417851a07204647043cbec1570bd2c86d1b3f
-
SHA256
98573f2746aafd2c7dd8313b12021da2fc47d7b0111a1a0b79eab18c4730fae9
-
SHA512
39cbeae68f7ce7d22510c22c6542168969ed789c6ab66d9d41c3d443fe0815c84571b833eff7e4f5139a61b7776114ec7194c1d1d87b2c7058ad5b51381212d1
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0BFF8D21-1C2C-11EE-96AE-6A6389873578} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006c29dc726ce5b94c89351546d5dd24d40000000002000000000010660000000100002000000082526f6edca0a3bed12820a0a3ef57d489196aba9054d8c6d7f0ae03aee4fbdd000000000e800000000200002000000037954c74a413b31d6f4ed66f618a674932064995e82391fb69d741507f006f9c2000000096847bb122c7de4b1c0070846f9384fd22af4279b1b3b8fed6bb3729355dede9400000001905dfda11f60d94e1dad943d11fc8dd1aa4eee9fa0399f938efd7f7056188bc6aa4f731869423a126496eacc6cfbdfe2cd786e9770be6980b57781e0367ab95 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 200b8ee138b0d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "395433575" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2304 2052 iexplore.exe 29 PID 2052 wrote to memory of 2304 2052 iexplore.exe 29 PID 2052 wrote to memory of 2304 2052 iexplore.exe 29 PID 2052 wrote to memory of 2304 2052 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\credits.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3179de744b5285689ff6d7c770e974f
SHA1ee85468eb11261c9525ead3bcf205ddb5ffbb831
SHA2569a868fbd8cc05e669f1f94059613824c2f408a02a73304b7ea5fdaffd5d6cc66
SHA5129997e608197420f32e9af39198f991d1cb93a5613108922aa4760704ce15c4310de624028e38fd37f3067184be49e213d8c995c15f08fd7322318ee709b1931d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57de677aaaf1c2c92cc4e515fd49f5f4d
SHA1c24391fcd1515a4c24ea7541a51eeeca0d2217e7
SHA256dc1d7104f1ce0a9fc933888a8fd0a3f55aa5c795b9f476a864adc1e7408f9591
SHA512ee2f3719c954ce4cf05d5b9df344cf110a2ee1d5e21bb8e81c426c88f6c5fa972c68da689eab3eb8b61d600d691cbbd8b27168eb5827fb87102e5e4b5c513f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5506b26cf38d1940f26e412f98068daba
SHA15f34fa2a41653e8b333c57f23c473a7b9090d9ba
SHA25648fc68efa73d36f2f4557daf11e5cb66290d29526d77c90dbee8a853f0932b15
SHA5123b703004c48d2fcce33c5b9fdac5a344d2775bad004ad57a0b7d25f8e883a4bffcfa34d5e31d85b1bb47302df4012294dcc21d8695f7378a437fad4c583a0e36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed9187bd2e16ede24b7e38a13ffa6624
SHA19deccfffa92b9e06e2750c43cfa2c9801a59bd12
SHA25614fc65ab8a1d6f92bcb20a54ca190fd10a577e8ccb199478e2a7fa9b7c4762b1
SHA512ee96eec9a7a8d8918baf5cd47fd1cb4f39b1f2fdbc5a26ab75b7f532b86ffec0b2725c42e562f4a6979da7c492345b091370c19bb881c0260adac8ed8a022a95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5838879cdc5c7c7b27efcbe8cffabaf62
SHA1466a7788c60de8976e19d8f53344a88d0b512d80
SHA2566b544ffd6d54fc3dcacdfed122a878334806b47916c3005e16205c4e48cb7e7b
SHA512e25e5830b4bc64f846c9ce96d87b104c2b0697115efb58e74a595cad6be5ecebfa1bd7d140c02a303cf210164870d84cbcd4cdd3c94c6c3450b00e601509946c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a9dba00db95680e13c8e7c11bb09350
SHA138c5ba086b8ceebc3f2e076c8433e873adcc9563
SHA2569029ce4d45a2388291c1bc8c8624605aa1b644c1d1d6d2b22428cf8cb1d7f86e
SHA512f9ce7d8ae33d8aeb9b04e40329c2f7161ae284eca20bc54c2b59b4ed30869f031d17193d148bc859abc0525a7d7126150bb89f42dd3372ba4275fd6d5ad370da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b33392c4ca1ff50cf195f3942dcd1b27
SHA1f701d73954d8817d4fcdd6fba036589afe902684
SHA256590b4984fd4627380eaf4ac16eae03b678d88a40f6ba223d0650ccaf94e4b0ed
SHA5123d5eb7433741e59cbedb7722326fee40e7553df0c3b7393946279ce06ecf63ed8a2a010e28630549d308dd9d97dad4e315278517db43829a2f52c0d37d2b9c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5958e46c45c5636c2fe41edf14b00bb56
SHA13df3fba0ff9f6659892c4547089788e23ace41d2
SHA256096757aeb3f76eb0642fbe9c1229300fd9fad2b7af3a191100b5853d35f37596
SHA512195d78e50822eae2ef8bf585ee2606b1d31922433fd2b35df40ef2ee8feaf094e4f354528a6593b4a91e248e3ac8d6d868b445eca3fd097675162cab7253c8d3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ODRCOPYD\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
606B
MD5b5ce705f34ecbe1a2be3cff93af3643d
SHA17d42576b6e6cb9546c51e59271b602c4c2675a72
SHA25601f5c988a2f91caab6bb5e2085fa5f1c82cd1e48843218df14a60490e9a468f6
SHA512010a78583b9334d654f0a6118d224e0379b3244aa486bfb4e3d7b0971a337ba4b040a66770430d36977518761b680d5ba8b6feb9a7fb02aa692f4a8bd98e9068