Overview
overview
10Static
static
7AntivirusA...-1.apk
android-9-x86
10AntivirusA...-1.apk
android-10-x64
7disclosure.html
windows7-x64
1disclosure.html
windows10-2004-x64
1myps_policy.html
windows7-x64
1myps_policy.html
windows10-2004-x64
1origin.apk
android-9-x86
origin.apk
android-10-x64
origin.apk
android-11-x64
disclosure.html
windows7-x64
1disclosure.html
windows10-2004-x64
5myps_policy.html
windows7-x64
1myps_policy.html
windows10-2004-x64
1policy.html
windows7-x64
1policy.html
windows10-2004-x64
1vpnservice.html
windows7-x64
1vpnservice.html
windows10-2004-x64
1policy.html
windows7-x64
1policy.html
windows10-2004-x64
1vpnservice.html
windows7-x64
1vpnservice.html
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
09-07-2023 23:49
Static task
static1
Behavioral task
behavioral1
Sample
AntivirusAI136_DZAPK.COM-1.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
AntivirusAI136_DZAPK.COM-1.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
disclosure.html
Resource
win7-20230703-en
Behavioral task
behavioral4
Sample
disclosure.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
myps_policy.html
Resource
win7-20230703-en
Behavioral task
behavioral6
Sample
myps_policy.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
origin.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral8
Sample
origin.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral9
Sample
origin.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral10
Sample
disclosure.html
Resource
win7-20230703-en
Behavioral task
behavioral11
Sample
disclosure.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
myps_policy.html
Resource
win7-20230703-en
Behavioral task
behavioral13
Sample
myps_policy.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
policy.html
Resource
win7-20230703-en
Behavioral task
behavioral15
Sample
policy.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
vpnservice.html
Resource
win7-20230703-en
Behavioral task
behavioral17
Sample
vpnservice.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral18
Sample
policy.html
Resource
win7-20230703-en
Behavioral task
behavioral19
Sample
policy.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral20
Sample
vpnservice.html
Resource
win7-20230703-en
Behavioral task
behavioral21
Sample
vpnservice.html
Resource
win10v2004-20230703-en
General
-
Target
policy.html
-
Size
34KB
-
MD5
5006b2ca11128f570cb0d02c472f5c4a
-
SHA1
4bc29748b81396285f6df954efb0d708f73025a7
-
SHA256
efd83e19fe889b7af1ab18a31cd519e27eaf0abea42975a82f15afefb272f08b
-
SHA512
c761233feb68832ba595a06b18a889a5a79c4f8305dad5c1616b0d88032e2569c95e0d415c9b8b7d4e2d519ef0eeae590d26ffca386cd748d1b015932093a3b6
-
SSDEEP
384:rWnYCJu/yJMBAK/c9Yn3Y+9X01uLp3XPYsTmem6bs7OE3YZVNCmj1SYSr3QPRz:2YwKY0v9wsxfblEEnx
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "395711556" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2086a91bc0b2d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{45BEB751-1EB3-11EE-864C-66DBF85D7F8A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006c29dc726ce5b94c89351546d5dd24d4000000000200000000001066000000010000200000002649c7e5bfab8e6039a88d02a2f4dba1a4b540f13759c63ad4b2a2e56c88158c000000000e8000000002000020000000edfb91de6232ec2bf8f6f7798e91fbd3293bcbba36faf1ead0783bce2298ddf5200000000e7d311f74fac4bf69f0f981838a1b2a995712e6532741f33ac041753b731e29400000002bcb3316521a8be10444367b8694417b2a724a4d44a02e4157c803d06f7ce3874c6842f6a7a315aadb3cec4a6da8c7c64e4a718d650d89519d059e3e7bd82a54 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2172 iexplore.exe 2172 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2172 wrote to memory of 2984 2172 iexplore.exe IEXPLORE.EXE PID 2172 wrote to memory of 2984 2172 iexplore.exe IEXPLORE.EXE PID 2172 wrote to memory of 2984 2172 iexplore.exe IEXPLORE.EXE PID 2172 wrote to memory of 2984 2172 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\policy.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec04345ae0fd19dc7764ca9e7d077053
SHA1c368d4cad2298cc5489f3cc3b30966e21cb47fa1
SHA2566cf97c578f650e9f3cfcd1e1c9108b9a143da4e99505e5aaea988fa95eee402a
SHA5123386f049380060f6f7345fccc2f3b1b558d797dcfadaf3b22bb82aef8c412b1056599a3f1b00ac122d3d83f16725bf4fb1d48ba4d585891f4d14781c0eb01c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59361b93531a940cddf582c8c297a8d91
SHA1ce9fa0f6195c2543f6b35f4e983b1c4eed85813f
SHA25658af814595597a3c31065537376830bda197c08797f2be05a944542785ca0c00
SHA512e517792275eb4dc177ffc79a9eb1a839d49bdad167770f4562e4dfd925a66f220766bad39fda3664350151daab54f06d09e7982911a0c185359f1af674e48942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5357fe04be68f0d4f2ef6db13ad1cd0e6
SHA16aa7ff5c48c1dd4f85b1dc374ff8118ae75f3a21
SHA25689872feedabd7e437b683c554b92b23f12abb9177716c6448f0c15c6b07abba3
SHA512c3e4b0e17cb6cff3d196d964798db9684a1afc412dcecc0532ac2abf6bf1b965ca12403cc48446e01a351e53d00ab23d3626e834ac76df839a424fac7b1c874f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c1d7aef7f09a1dfd21cd12a073da8ea
SHA141f3143bc464e7091a033d793d8617e55296bb45
SHA25678e18309524960f735e27c3a20975085e9e384284f6fd3dccc6689770be66e3a
SHA512e8086c4e18ae708221f23664a127e7f6ab69aee3fe1512b274ccf6c6290c89a654ddca2f0eae3c1848eb7399e0ecc921708d56ae9f231091926fc5f554099b4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c4b4e3f3b0b0ef6f5f1254cb114430a
SHA1ca64591f70837ed1966ec37a7f5bd9e52d9bf13c
SHA2560cf92089b0b565cfed0ced1b6ac53fb67383a370cb66abecfa0296a49b7eca53
SHA5126a50ca576978b3f60c6de5f10a7c846a8a6e0d362958a011b4038991f7a09a9e5bed2dd9eafa6b88e9caef60bec53025e21c2cd6e75f4077aae8b99ba2787ae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512206109abc21f884cc038343c731af4
SHA1853dbb448efe083214db9f59dc4cf73d82159eac
SHA256d6ad73e052c58af7805a37b9606392fdbcdf184f8a8ef4d011ca8ea836200cd0
SHA5126b9e747b100aae6a5861c38900bb9207d4e748ff3b11a42e172a73eaccb6303334f5cd3e0eb1212535b438177aeb575c8045d9c72172d366b6bc4ba8e927582d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5596cda574a2111ff14aacb684ce57784
SHA130b42fb4670d2ec05a4bccd593cd6b5ef0025f98
SHA2565f2b7c992f9784fcc12fb48f5539e6178222a9f159fa7413cc024282f8e971ba
SHA51200d990fc6bc1f61169b48d136d071cafe8e9c27d38488985f5ad16ffcd5fbc203532dc94510556fe206f2c0d8403cd07956ff503f1f340bd54f4adf60dd0967d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a422916e769dcaf2d6e8e850a736055
SHA14d9bf2fe689ff9e38b4fad57c0467ed45d6725f5
SHA2564dac11c2f73f03093951b6a8653344890e9143aa10aa3c7f71e7a1e367f35b9f
SHA512957c0255e046d8e885340b817f564a6dc65780a8059189c6cfed02f306ebe58d35db34c5e26fda763e546f5140a83401879eb62995c4254935454eab84f45f91
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
601B
MD54a169b080220fbbc7c50b909801dafc0
SHA149d933b3dda0acf616210d3581ce8e91894df205
SHA256ce254f3da859bb2fc2e8ff8921451ba6290495caaaa282f8946a41d0cbb64dcc
SHA5121ce772397aabccbcec529ad1a352f12fbcbedb4d85a6dc3f60550cf3aac164d1100198280ea20405daeac094e1253f618379409c771635099126ec8878e069bd