Overview
overview
3Static
static
15CC1246DE5...17.apk
android-9-x86
15CC1246DE5...17.apk
android-10-x64
15CC1246DE5...17.apk
android-11-x64
1DXMMiniApp.js
windows7-x64
1DXMMiniApp.js
windows10-2004-x64
1c.web.geol...map.js
windows7-x64
1c.web.geol...map.js
windows10-2004-x64
1frag.sh
windows7-x64
3frag.sh
windows10-2004-x64
3googleMap.js
windows7-x64
1googleMap.js
windows10-2004-x64
1history_demo.html
windows7-x64
1history_demo.html
windows10-2004-x64
1index.html
windows7-x64
1index.html
windows10-2004-x64
1vertex.sh
windows7-x64
3vertex.sh
windows10-2004-x64
3Analysis
-
max time kernel
134s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
13/07/2023, 13:08
Static task
static1
Behavioral task
behavioral1
Sample
5CC1246DE57224BC8E79182A256B3C1D66CF75E02483B302EA984D25E1A74217.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
5CC1246DE57224BC8E79182A256B3C1D66CF75E02483B302EA984D25E1A74217.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
5CC1246DE57224BC8E79182A256B3C1D66CF75E02483B302EA984D25E1A74217.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral4
Sample
DXMMiniApp.js
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
DXMMiniApp.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
c.web.geolocation.gmap.js
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
c.web.geolocation.gmap.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
frag.sh
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
frag.sh
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
googleMap.js
Resource
win7-20230712-en
Behavioral task
behavioral11
Sample
googleMap.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
history_demo.html
Resource
win7-20230712-en
Behavioral task
behavioral13
Sample
history_demo.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
index.html
Resource
win7-20230712-en
Behavioral task
behavioral15
Sample
index.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
vertex.sh
Resource
win7-20230712-en
Behavioral task
behavioral17
Sample
vertex.sh
Resource
win10v2004-20230703-en
General
-
Target
index.html
-
Size
597B
-
MD5
360873f17631efab5711a2485a069f97
-
SHA1
ccc0f24dfbf2aa330525c2b4e125dac8f06472a2
-
SHA256
c730dc431207488325f5d224b1a899898ba8fd4f3a34fa00695d168405d6114f
-
SHA512
22078d2266ae4162a3114fd163d0a613d8d4de9f034b779d40039b7d79250dc8104c3b2a0deae82810621a9d0751ea5d3f65eaee1b8bd83c30aa85b51108e233
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "396018712" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c02106428bb5d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6D4D81C1-217E-11EE-80E9-FA28F6AD3DBC} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005a31a35914bcf84cb1db54e391e8cdcb000000000200000000001066000000010000200000003d2a291dee0aa684f56706b1b8d2464663742627179f3264260f8480f070c77f000000000e8000000002000020000000bcd96b5c216d3a256fdacd03a386c6ee435496b9744d27d729874ad19add352c20000000d29c2c6afa8e9527efe4453fe80b98d21ee4251c544b0ad70e4ed928ef1ce1d84000000042dd2abcfe6044cd30be4b371ee8565ae6cfb16e47ebc4f5ea5262b4f5b5c1ca13f9ad6fdc3c430f80e8bd14c78ad779b0c8707b2abe2a8a2bda8bb0972f9468 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2616 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2616 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2616 iexplore.exe 2616 iexplore.exe 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2648 2616 iexplore.exe 28 PID 2616 wrote to memory of 2648 2616 iexplore.exe 28 PID 2616 wrote to memory of 2648 2616 iexplore.exe 28 PID 2616 wrote to memory of 2648 2616 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\index.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2616 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2648
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5392a7215a5eabd2200444a033adbc304
SHA1384a4d9b39160c9fa9be90705bbeff053c780cf3
SHA25601f02c63cc05847254df5510f2a9de0f827f0a429e737b957603c28188238932
SHA51298df8894d341acbb21062086e5e27ec48e7f995ca22873971597a74b51cbaa1597ee9930d4a754d7481d207c6cf176129c5791108f5fd482f7733ae7b1a119e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56559478aae0017cabb9c79893094d88c
SHA1782d139118d85b60aecb5a66c0269247aab74119
SHA2568715170da29c7c80da63ec7a5aff71d6c674dcdd70b48e62043227ddff3126d1
SHA512ce79e447733946e7e40c8dfa4c6475c1daaafa5c9f39b824b54b38bf35acbe62820e0265330cce79fca5817f980ba49656e1d24fc55e0f1ba07ab48c3634fdc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba4af7ed85b666f3b0d0138c49268652
SHA1050e4b2833b55793332ba2ab8bfdd8b0d9b3fd35
SHA2562742938b143bdb434552852944aff610d0c569f25027eeef7e341ce7f85e1ebe
SHA51231d4ad7bee864f8ef80e05cfdfceff9884d3db2370692dff284ad52586e68ce3158c3742af5e09129740e92779e9cf797e23c07a1a8064adc81783202b6d0c63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9d21e46f8e50485aa14a3cbe74e51ab
SHA11c579eb1d4e9bf2664b84ec55e319827fde0c011
SHA25609ca79f4d51783bff14389280f1ce222328d765a67fa36c3cd3c6435b04f6136
SHA5129f828d6f7f35ed449508769d6c7ce46880d691140e3fae87e3364ae9fce231570c4855f636927b78ee7e257f724275d505b3ffe235a76176820ac105c233161b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55306ec108b3dcbd0431ae69049cb231a
SHA13c7ddac0e1e2c4b6c480580b34cd152db2e047f3
SHA2562fb8f3acbac208c8f6be8510db8b5990ad6d878b0ce390999abb1b8353d840b9
SHA5129716dc921eef32f911e5ecf4ec9fe33ded34ee193f97a88fcf51f18204ee80744a7da9add26f586f100ed0ae1f35b9be039d576fb569dc6515b35bdd7bd77d0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55363ce77a367c7613f4d95c9e92271e2
SHA183532d22ad3399bd35753c15e654d684916cdd60
SHA256d81e6711ad31eb227dbf4d7f77e71707d54e001cf060ebfc449888ecf0f08030
SHA51260819984e5189b3ea6300c97a94a0740c1c9463ab6a998b5d8cd5b8526af6416fc5c3e30e501a2a59c0883f9efb6222e242ce30f3593a1c008f16d3cac0d3dff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0040bf16c027acf630eac4d2b9ba5eb
SHA1e20185916f2924dfacf768db1f859bdff1a9e69d
SHA256e0333b21ed5853e1532b9e23779679247454ad2db88a0ce46ebbc611d8e6b2d3
SHA51263cfd6f5e477eab1bf87420b2530ba8266493ecd22ca32737a516c8f915ec155041b5f1021ec796ed03a5bbcc3a3928b899e1f1fbf8b98ad96467436916d6a98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a7c8840dc863db48822283336de6ca5
SHA1708871343374e59605b1e183bf0d61a9ea16f6fe
SHA256c9d2ba9af5f08f49fcb2aed8ed7a1c118b1734d0a54b049bb1171b56d69dbae3
SHA512d3b2576d9a14c28f147472f7f447f44e2714411580bd527ed97c57fd49ddb2227d6639c2751f90fab699022e478e39e3153e8de81d259f33f9ee7f374a75e579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5424ff2eb8c07a84e992ced54f92d37a9
SHA14f6123284ec3415cd971c6917febaa5bfdbf61d2
SHA25620408a1faa471e1a67e5717fb15fafc9025c0257b43ab691c6962fe899122d43
SHA5124f4132f80f5d4870c7b48a1d1a607db99200cab8e899d06f5e5549a700cb9b9e68a717591b349ca0eee4f7e5b665f04ec525be02e6a7f5e7ca2ae472b4ebab72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bd5d13899cd9f1e53537b44757ff60d
SHA1b06303b62aaf2e7019b5d5ff3d808f118d331d9b
SHA256900dd4eafee8db70a13607b5df9f2b9262a9e2f4caad4d57553d63a3e9b72a89
SHA512e3267e1f4e33434239c982352d5b28c839e695007c9f27bf3be64a779e31a822286f6777a60a3c33f398ad99e65843e6f18ee96dc068c43aee4c58282a543af0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WEWWZC8O\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
606B
MD50911a922707ac2a5380bedeab4200e42
SHA15bd5aaf8ac7480cbbd1a2e856b60fc60f8aa1991
SHA256f0bf602468e0ac4fa4c405e3d8359be71b8132553f7ee237298f759b234abe61
SHA51298506b802cc337b8f61b831781a0f8bede5aade622ca52285aa968efbbdd722e0c3abe2baace2af3525053d0e0c4f02db86a69a052691dfc87d73c391152c5bd