Overview
overview
10Static
static
10MyDiveDeals.apk
android-9-x86
8MyDiveDeals.apk
android-10-x64
7MyDiveDeals.apk
android-11-x64
808eba805c9...ac3.js
windows7-x64
108eba805c9...ac3.js
windows10-2004-x64
108eba805c9...002.js
windows7-x64
108eba805c9...002.js
windows10-2004-x64
1144.9655be...unk.js
windows7-x64
1144.9655be...unk.js
windows10-2004-x64
168.a0c7b2ab.chunk.js
windows7-x64
168.a0c7b2ab.chunk.js
windows10-2004-x64
17.d78e4aac.chunk.js
windows7-x64
17.d78e4aac.chunk.js
windows10-2004-x64
1AFFIN.html
windows7-x64
1AFFIN.html
windows10-2004-x64
1AM.html
windows7-x64
1AM.html
windows10-2004-x64
1AM_Pass.html
windows7-x64
1AM_Pass.html
windows10-2004-x64
1Alliance.html
windows7-x64
1Alliance.html
windows10-2004-x64
1Alliance_Pass.html
windows7-x64
1Alliance_Pass.html
windows10-2004-x64
1BI.html
windows7-x64
1BI.html
windows10-2004-x64
1BSN.html
windows7-x64
1BSN.html
windows10-2004-x64
1CC.html
windows7-x64
1CC.html
windows10-2004-x64
1CCValidate_fred.js
windows7-x64
1CCValidate_fred.js
windows10-2004-x64
1CIMB.html
windows7-x64
1Analysis
-
max time kernel
119s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
12-07-2023 11:56
Behavioral task
behavioral1
Sample
MyDiveDeals.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
MyDiveDeals.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
MyDiveDeals.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral4
Sample
08eba805c9ab2000a0a618d12adac1d62c01b41a62b2f86c7babe9f0ccbb3ac3.js
Resource
win7-20230703-en
Behavioral task
behavioral5
Sample
08eba805c9ab2000a0a618d12adac1d62c01b41a62b2f86c7babe9f0ccbb3ac3.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
08eba805c9ab2000a0a618d12adac1d62c01b41a62b2f86c7babe9f0ccbb_002.js
Resource
win7-20230703-en
Behavioral task
behavioral7
Sample
08eba805c9ab2000a0a618d12adac1d62c01b41a62b2f86c7babe9f0ccbb_002.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
144.9655bebefd6cee9a3bec.chunk.js
Resource
win7-20230703-en
Behavioral task
behavioral9
Sample
144.9655bebefd6cee9a3bec.chunk.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
68.a0c7b2ab.chunk.js
Resource
win7-20230703-en
Behavioral task
behavioral11
Sample
68.a0c7b2ab.chunk.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
7.d78e4aac.chunk.js
Resource
win7-20230703-en
Behavioral task
behavioral13
Sample
7.d78e4aac.chunk.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
AFFIN.html
Resource
win7-20230703-en
Behavioral task
behavioral15
Sample
AFFIN.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
AM.html
Resource
win7-20230703-en
Behavioral task
behavioral17
Sample
AM.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral18
Sample
AM_Pass.html
Resource
win7-20230703-en
Behavioral task
behavioral19
Sample
AM_Pass.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral20
Sample
Alliance.html
Resource
win7-20230703-en
Behavioral task
behavioral21
Sample
Alliance.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral22
Sample
Alliance_Pass.html
Resource
win7-20230703-en
Behavioral task
behavioral23
Sample
Alliance_Pass.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral24
Sample
BI.html
Resource
win7-20230703-en
Behavioral task
behavioral25
Sample
BI.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral26
Sample
BSN.html
Resource
win7-20230703-en
Behavioral task
behavioral27
Sample
BSN.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral28
Sample
CC.html
Resource
win7-20230703-en
Behavioral task
behavioral29
Sample
CC.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral30
Sample
CCValidate_fred.js
Resource
win7-20230703-en
Behavioral task
behavioral31
Sample
CCValidate_fred.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral32
Sample
CIMB.html
Resource
win7-20230703-en
General
-
Target
BSN.html
-
Size
7KB
-
MD5
b24be79adda1bd97b70c23023e99285f
-
SHA1
b55ba88e823eb3a95797c416b2ff80d7be6c1689
-
SHA256
5f499bc8163c7ec6cbb60ff4405d668700daa8766286e3836210f90a9dc70c38
-
SHA512
00e4d04123fa0f77f9e863605bce5864ad39deb647c176d887af2527d93bca5b7f87c3cecfb4ea50ef9513a06148b5381da7cecfaa16559e33178205d3a199b5
-
SSDEEP
48:RJJBmgFWGj6TdGruKvbSQHj+M63vJBnOsNXKjtWP4RC5Q:OwWG+RSvbHjQvr4jEPGC5Q
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{193F7671-20AB-11EE-9081-62631ED7C805} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b560baeb882dc64aae4acff703adb14e00000000020000000000106600000001000020000000faccd789df73f8b0f44af224471506da94e0b2db5e93849d2f5c6c915cf16f7b000000000e8000000002000020000000fd2edf177653ed66b1a3d39b2cef280bf86921cfff5e1a4d7af2b30105f4a0be2000000050b4290085c1cc53e362cdb7d0ad3d8d498d94230dc780f543a080acff0e60de400000001c8b96438525dbc79f559a22fc54e5a5ecbccc88e437899041771362bcef4ee58bd5a06d4ad88c2b75fcf8f0120472fe1b85374a09e021269451f59cb5c978b9 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "395927948" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0204eefb7b4d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1305762978-1813183296-1799492538-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2332 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2332 iexplore.exe 2332 iexplore.exe 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2140 2332 iexplore.exe 28 PID 2332 wrote to memory of 2140 2332 iexplore.exe 28 PID 2332 wrote to memory of 2140 2332 iexplore.exe 28 PID 2332 wrote to memory of 2140 2332 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\BSN.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2332 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2140
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511b55d8ad3d0fccfcbb94eb104e0fcca
SHA14870aeb90ed60dd6d25cb237c3dd7b5480a8ee32
SHA256abcd89a7349c345b80a31063726cc682f38f67ab878ac5be690fcf0a88538498
SHA512e21e0cbc6e67202d37b913c68380839434a6c565ac980383c5326330045e2e79317da6be5a0fe1da7fd15bd5bf3a090907b5e75d0440bf1b31b2091000a87a21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5397739f11cce59cd1ed7b965003d96ad
SHA13462989b7bdc96c27ed6fc627dbfc044b044b686
SHA256baedfdcb52a46cdd01e1eadd550bc6e7dcd9efa0dbbc078190c2105b4c1eb2f6
SHA512680422d1426861f08ed59fc2bd327e4b9c267f2f5999b8e02a6a1dd9bbe0691b2a86cff80f0ad950e801515a3fde7867ebd56b02a7badfd5456825792a954775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6848c56a34f03d55503503dcdbba727
SHA13afe1bd5cf2bae6de223539baf63dcada1c81a0b
SHA256201af6fe173b3290ba67645db5d72c101f2242133f92f310a5ddd76db5ed3448
SHA512ff11239df001e21dd78a5b191e59a69c8033e876e2cde480b13e88de578e3c0f7dc1428faacb1c0f3913db50b41ff530b24b8ed9ae800813e8ebe55cf2d05161
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a12bf11638c3c5b67a802315f74fcbd4
SHA1b377a57246ae55d51eac9276768552fc232888ee
SHA2564028be14af08888d9bf38e3aced352a411f79a52272193fb02ad344d9fd29b9b
SHA5122f6d68bd24dc187650bdbfc88da9fb12d3da0cf228dc06a32487c49e3f81b855e20de1147d636c94716944d271bd60df6fa9a6d6ffd87e093d2a91fd5c861217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c85e0294db1ba28d40028694df5955ca
SHA1c0fcaa64221d24c67acff8cea73f164c159a2a39
SHA2561cd4e476351127dd9b8a9d199eeb6e6f03cc4cca52a6082c5f3c0c7bbce0e386
SHA512ab84fe1f6be256d2193173b37ec0aa44992d47aac36287370d877afbdd1323a786bcb76323491ad62e904dfd77a5cba53480e9bef2696e663807b236fb556397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5116cdd6439ac79566f5aaa7c99d2d94a
SHA14a963261b9dfb1026211654f86ade2d889d788f8
SHA256c50cfe0781e369a149c4308f8d43bed06051e02833d1a7acc5e9f042a03b5f02
SHA5127328bbb62bac4e48dbb1f932283337e4f8bd3cc4c5f2631d3c0565c7131aea73d9abb7e352031a8e6684d3e8852bf447d01a504f1e656b1c4647e6d9d92e9394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540668a109ca687ca5b8d690293e0c560
SHA17d2885a2abb028bc4e20517b7b1323f4e267d588
SHA256364a425caa3495a8961cdbdbf3d51b5d62f45f0a3d7104ed80a67e7191db937f
SHA5129a885e60c87b01725063cbf49ab198bf7168bcc6bfd46e53dbbd7a5b3ec451421f75ff6808cf2d2b27ca1aab66445ef49d40c73153abe0ec5e4886df8973c372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce2c048ba103c0a1a96d9975bbd5d163
SHA174be7fd638895e816708954fa4603325ea3643fb
SHA256f86061e15978bc86ac665269c808e791795084163b14b855355686d09c7547ff
SHA51212f24e7a69bc3f31914fded75f9f63d960798c701ef1cfe559c0b5aee05090fe588992a2674fea4b4e6a0bb2cac9dae703d4eeba0bde6bb80c99a885e8edfd59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504449eaa6399e53cf3c187dddf0ce1ea
SHA19c6b8f6944b09cca28f83b002bf40dbed72da039
SHA25615ace81c89fe5ea359eb2ffa73ac758cb66e694be5290e4869168c4b95d971b0
SHA512006ca63baff695dc560795bad642b0bced531d7b52080a557e5d476743a91d9af2f0a58042d0dee6f7d6b17d4dde3c974a54a5f6a132c09ea745298627915986
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XZEULFN0\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
596B
MD5360ca131b7a744e4c32ba5c9d00a2462
SHA18c99379039582a1996c9feb5aff7be206634411d
SHA25696aa4fe9d74a38c46392810307d1c76adcb13c50b2acc03a64b4029dd0dc5b29
SHA512c99586739cc907ecd2a2f8c62808be0161a0e3127b554e27897d2951d523d591ef5fb66bb6df3afc20975d6f65c996736d919720d6b1adc6d249cef1beb2a42d