Overview
overview
10Static
static
7629fa8669a...cd.apk
android-9-x86
10629fa8669a...cd.apk
android-10-x64
10629fa8669a...cd.apk
android-11-x64
10closebutton.html
windows7-x64
1closebutton.html
windows10-2004-x64
1core_wrapper.js
windows7-x64
1core_wrapper.js
windows10-2004-x64
1lynx_core.js
windows7-x64
1lynx_core.js
windows10-2004-x64
1nd
ubuntu-18.04-amd64
slardar_bridge.js
windows7-x64
1slardar_bridge.js
windows10-2004-x64
1slardar_sdk.js
windows7-x64
1slardar_sdk.js
windows10-2004-x64
1template.js
windows7-x64
1template.js
windows10-2004-x64
1Analysis
-
max time kernel
135s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
16-07-2023 01:40
Static task
static1
Behavioral task
behavioral1
Sample
629fa8669a4f94e20b68cef2c091c06a2a2293407b1c4370b6e1b3f157a974cd.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
629fa8669a4f94e20b68cef2c091c06a2a2293407b1c4370b6e1b3f157a974cd.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
629fa8669a4f94e20b68cef2c091c06a2a2293407b1c4370b6e1b3f157a974cd.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral4
Sample
closebutton.html
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
closebutton.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
core_wrapper.js
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
core_wrapper.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
lynx_core.js
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
lynx_core.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
nd
Resource
ubuntu1804-amd64-20230621-en
Behavioral task
behavioral11
Sample
slardar_bridge.js
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
slardar_bridge.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
slardar_sdk.js
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
slardar_sdk.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral15
Sample
template.js
Resource
win7-20230712-en
Behavioral task
behavioral16
Sample
template.js
Resource
win10v2004-20230703-en
General
-
Target
closebutton.html
-
Size
981B
-
MD5
c8efa039f4f84b2705a8e3a3b31da61c
-
SHA1
669749429feda1599c4ee980cfd67fbb1a54c1a4
-
SHA256
494693c2ac56ecac1a2588c25631e1bf71211fb0f06108649a983c879315b1aa
-
SHA512
db6c9817469c937a41eedbbbdaeb21a0860fa5228258978fe59d29c75ab1497b8d1a0ceaae2b236206d6935e186deaf0d83a73791658fa68a985dfc5c314aed2
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B687DBE1-2379-11EE-A3E1-7E694F6CA729} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000e8664bdb653864eb3b20ffc0ad3b021000000000200000000001066000000010000200000007a5040895f206d636453124932d0ca28c283141f531f9c86569ae226393e8184000000000e8000000002000020000000f28180fc0457ca2671c722b2d356ab1aa2a76f99a2664592bdbabdfced32c3e59000000017155d24b5ebabfb102e8a5a277b01b22c022efe2d0a6b2eae874d48b3acfe54422c16a165249d98a5346a066b59ae0785dee1889d6d7bee2e6fa8f3d042419749530c54480dc8c7bfcd866007a5cd3f46cf16a9066ee3ece3113b4cc59fc2dadaa261e6f36b23ba609ec8fb51b17c78808c71548a974bbe36ad192cb13eab41098896460434a24617d3e656bc4443a940000000c046e501620f4e2723fb5c5692a9cbac2eeaef517d57dbba43f137c8b47032bdccb7ac052bdca72a93ac8578ced060d0a219a79727b5985a871e3045cc8b91c8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "396236590" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 000d218b86b7d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000e8664bdb653864eb3b20ffc0ad3b02100000000020000000000106600000001000020000000ece468e4fc1fb19c6e9cdb0935dad3c1ecf259a46d939443fc4ca1387d33c5cc000000000e800000000200002000000069f64c8823ef86c5ab9a7dda32e83a7130f57192b2d66e12c2dc4684273821a2200000001b5987208850074f93c34a4f9de9d096efc068ae18c73962f020c352dd69442c40000000e593f24a494733370de542172add5a1be2adeaef2c512bc3e76f480febaf4ce7d3012baab8ce6809c8cbfa463dea8350f0ae9a0e8cbbc5c6bd38029e5dc9f600 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 1400 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1400 iexplore.exe 1400 iexplore.exe 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1400 wrote to memory of 2544 1400 iexplore.exe IEXPLORE.EXE PID 1400 wrote to memory of 2544 1400 iexplore.exe IEXPLORE.EXE PID 1400 wrote to memory of 2544 1400 iexplore.exe IEXPLORE.EXE PID 1400 wrote to memory of 2544 1400 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\closebutton.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1400 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fd2903a7985389ae9e6c44cb2e016a1
SHA1398ac043971878dfbb82a5be1d8f4549d7ab93d1
SHA256f1c4deccb6e1a3ca2f83551fc20a75f4042a7ac73f6bcb2b7f7bd7eec8528242
SHA51220e500e07e84a7ff01298144a94c8add996978d0dbd43c2326376e6381166d42b8da65a764d0a2ff2a8cb644bf1e145542b6763312c99827cf4b5acc9299f458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc46c02b517e132a57f738450cf456d2
SHA137e1cfcf18367df46c0f36eb864772db6dffb559
SHA256c1846ea629ee6b15f7baa126cba897e892fa8faf3881b7a4ab693447c3dfdcd7
SHA5126e7333d3087a0b9aa58aa4107ca78490116ec80aedd3ed1758a19dc4abe2b5f8a43104c03d4b052f06efd43ac059c11e24fd22e0501453ec5986d99c5ed36472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c0a28c9beed64a761d5291528069d8e
SHA176f5648dc3fbf7e980d90e91824f9ce06a49c733
SHA256c2c07662ecc1b779208316e45beb46b915420aa5f64c966245b368d289ba0e00
SHA5124004c84c6993e40b391724b4bc273596dadcae1df0fa083d1662fb8953d1a8509985111197ae6347a734c147a64d466f287727626e2c6ede30f36db69f7c8a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56928d3aa8308ba691fffbbc81e84e9b3
SHA1a3a3998f97e629861d5ad0505354528b3c3fc8e9
SHA256436f12cc609f58c1846242b791295a6325f09339fd0ec3e86dd93683e59361c9
SHA512427af97b4562b4f1b7dbbfa568d6f75a01902da8b59bec51b3541dd7492f48b0a418634fdbc67358a895f0b81b2b5eaac9bd906ef74c79b97da69792c61f4d4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d403ad8607b58c600f0faffd952e43fe
SHA12d1a7c616e017e52ea4e266a460205f19c741c7d
SHA256d130ac20f6b8a3ad3120c438031001ebba0b5edbf06a5f5c504cc1651c94476b
SHA512e80edc651a1509b519571905fd616ad949bee3a93a40f8b0334423361944a174672a192a11142a006cf12bdab1d58346ded3d70580d7681c88c8e61457949ea7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e9cbe37e47a34d7013b11e99e97dd85
SHA11e5bd21579b41b043c0f2804a6e7e6df3ba3e681
SHA256ed57df54fd5770678b9e359797f433ccf6fdaebd1942d17fb66e82d3f74ca4a7
SHA5120bd6d539f4ce4178444b414163ff443b4967c45541694ac9e9f325d59931b69bb2a14c8e2c40a7c14085b2118acdfb0d856806d2aafb04eba1dd998dd688a654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1d7ba3eddc5bd090ef6763ffe13b47d
SHA1ffed7fa0b07617a31e627ecc2fad691032b54dd8
SHA256833c1cb50d37f5383890d34a5776e55eab9993023cd616ae83724ee4b92b4320
SHA512253a48ca8fd69d40fc632bec35fff2040678c016f3e6fb058194aaa9a3a06123010e342189fa5cb633bb26c805015b2e24a772374ea6bae9be6c871e3fc57719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3cc3234a525f02fd616125ae118007a
SHA144e4e7ecb922b1c62a47dde62b9315ae74a37bae
SHA256120f47f985cfaee9355124e246b0cfc7cd6826193d64a4df47b71dd0e1b45d34
SHA5121b1f209ac5b442ad6b87d53eacc9d59be6f9b65541022f80c25b206373c8350aa74622d3025f5b712c6c7bf758f037e499afcb7615874b8acac47580e8270b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5050ea52fe9c9c305a8aebcb1dd15617a
SHA12e7f25da3df827936d8033579ff08eaf083dec88
SHA256793f3f573ee50e07f7914dc4000ff538632fd73b0e3dfab70af09ac3a5d3a9d4
SHA5128b5156cef14465cb64b249a96cf5d9e56c23b74ed876b2cad24dfaf5eedc2d248d0953f9212f17b183d805f3a79c83d4f1e676120a899e853f9a4c6bc095b8a2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U6AGJ71Z\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
607B
MD5f93ee0f2100ccee335267740638cd1d9
SHA10f8a435b0d88b90877f23110e1373c35cc0a9a58
SHA25689de8e589952dffdaf269cd11beed27fe467fb153be2900bf22c36a3637bfb64
SHA51275204045e5ab6613243aa9990db7668952a35cd705d4b03736cca8fb7e17a94d0825f626f2bea1136b2c358aeaed7ba78de05b3c174f1c088740aa5bf09276b5