Overview
overview
5Static
static
1Mini_Motor...JC.apk
android-10-x64
DefaultWsd...tor.js
windows7-x64
1DefaultWsd...tor.js
windows10-2004-x64
5machine.xml
windows7-x64
1machine.xml
windows10-2004-x64
3settings.xml
windows7-x64
1settings.xml
windows10-2004-x64
3web.xml
windows7-x64
1web.xml
windows10-2004-x64
3Analysis
-
max time kernel
134s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
17/07/2023, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
Mini_Motorways_apk_Mobapks.com_JC.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral2
Sample
DefaultWsdlHelpGenerator.js
Resource
win7-20230712-en
Behavioral task
behavioral3
Sample
DefaultWsdlHelpGenerator.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral4
Sample
machine.xml
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
machine.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
settings.xml
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
settings.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
web.xml
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
web.xml
Resource
win10v2004-20230703-en
General
-
Target
web.xml
-
Size
18KB
-
MD5
08101241b15b53ef0ab908f6d388881f
-
SHA1
ea3e2ad6d71d483c54b12852dcbdcd0baa569988
-
SHA256
15a2c7a9242bf54d3ccb3e07fa6d8f84ba8b303d8877243787a1103009941bdb
-
SHA512
a1ee7f17bb069ac42483d1f98ca839ff1bd06f3fc15cd379dff4aca3732a5dac24dc17e15acc8f8fa39e60e186219f4fd70664f9ea284002274a4ff8609791ed
-
SSDEEP
384:lJJuAr8F1mJ1ayCk5+HK5YaW41DBWTwa6st/tlLvSqwwU4FVXaS7L3nHIXYFXc//:jbpJi91Xbi
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005a31a35914bcf84cb1db54e391e8cdcb000000000200000000001066000000010000200000004d2495c8fc98ac53044898e87d1a4477c707e5d4b4a6ab745c8c6c5be58157e7000000000e8000000002000020000000814375f602ea4950e682e6182901f1ad1927e0cb4ff4cde1aa9dad6878d48ee320000000989cbca148091035f9192c966a6d4ed6b9a1922b1d1faf43d4e981f4265090be40000000e9669e97bf2f217af0bbe0cac82b9aeb2cc705e1166a5902234b9db8255c0f67dc1fef36184575edb9cfbabc0c49e7de416b3c17e9205c9f942e569b4d589e1e IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a04b66f6b9b8d901 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "396368625" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2191E641-24AD-11EE-A2BC-CEADDBC12225} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2476 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2476 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 760 wrote to memory of 2420 760 MSOXMLED.EXE 28 PID 760 wrote to memory of 2420 760 MSOXMLED.EXE 28 PID 760 wrote to memory of 2420 760 MSOXMLED.EXE 28 PID 760 wrote to memory of 2420 760 MSOXMLED.EXE 28 PID 2420 wrote to memory of 2476 2420 iexplore.exe 29 PID 2420 wrote to memory of 2476 2420 iexplore.exe 29 PID 2420 wrote to memory of 2476 2420 iexplore.exe 29 PID 2420 wrote to memory of 2476 2420 iexplore.exe 29 PID 2476 wrote to memory of 2944 2476 IEXPLORE.EXE 30 PID 2476 wrote to memory of 2944 2476 IEXPLORE.EXE 30 PID 2476 wrote to memory of 2944 2476 IEXPLORE.EXE 30 PID 2476 wrote to memory of 2944 2476 IEXPLORE.EXE 30
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\web.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2476 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c5a56c9722886dbea7baa53393ea74f
SHA15d6bc8ffc13d00dd554fe048bd2c42c456a22589
SHA25625c9aadbb3ff08683abd3e785b923a60631f47c0610cdd8931ba676e246e5ea8
SHA5128b9e058c3251931319f2a23e1d0db6d99abac8bd26c9e11f8376919e5b508cc29f052877b95d2181dae923a47cbcd02a347123485387d4dc4737a8453496bc00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b23ad3a0a5e218c40afdfbd786cf956
SHA1c17353643a4a97fa772e6b8786a4175123c60e8c
SHA256a5105965f3e00cceae24adb9e6aa41ff9db9a2d45c67e582774c71ed883a4520
SHA512ec2c87a4527581e0e834a75110cb36379c4b0e1cfc733c54a3dba12ed10ff1c6c5b641cca6955c4a7b54faf35b2176055864d41dcf64adf1708694588c916f19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586ecd4f563bdee7203729a4114fb922c
SHA11aa5c6a576aaf84f80de3227e1c2a8e14774f61f
SHA256977765709e0504d9f1a3ff6632a1d1e098427ad3418fa252557f17140f15a0b7
SHA51217b2b0e7e495bde3d403df1d5eaf5150cea8153785e9df1c1197a403ba7ef5557715539a246be07eecb93d4d3abbe073e7de9e8fe3694b9470161fd6e677f6e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5415771d96eb0a8e43e31ab2c8316cb50
SHA1005303b12d11ff94c09e7c599a69d6550f49e242
SHA2565097b37e97700ea0be384464aafc6edb9cdf23718ebd38a7dde585325de10932
SHA51284ea876993b33195e3045f49f3e2f9a18d81b96a9eee357cdf5f0d3b3f8a2b6fac0b0393137a2cb33b01e2b85bc7820027b3c7bfd3707a4840806e4fd503e0a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2d0052ba9306662c9262f01ec37c954
SHA157e501e33093300866e8d261fc154eb0d4f51263
SHA2561fb7490b146d84dc30ca7838ffb569316818d6baea8c42d89168b78cfeba1a99
SHA512a0ea9e94080110ebddfcf2a3e149bd116edf32002e47cfff9e7533507b7b88240c24e5fef277168e01a7e7eb4c5a2158815b8b6725982c7088280eaee8eb4b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a4cb57e15a0297412ac9c63f032d91e
SHA1554a265278be07c3ce7bc274d07b548b76802433
SHA256e0486fb79a9e1f7e81e288a15535d430f2331c75d1ac85e601dce102292054c4
SHA51290d8b44a27e25fe56d21a4c9e5f6e8834eb17f1fc36017f1aad6909da8eb20c00d87a14b299428c67e8761c26c323d3586f044ca6d8cd286ec2e60fddaf7e94f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e12dc40be8665532a5da19e1bd23a319
SHA142a357b010e5c53b8e9d37b2a08da542493f4b25
SHA256d4a13949ec077927386af4e59e643f6d76aaf20eff962ec3572c5361d94b0a8e
SHA512e07d8fcaf93b644fc921992dce7814171280169152c19856e3dc290d835b2298367061fb4e6ceba2f82a9c36baea4d454940ccfa6799f041995a4c44ea66b3bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bd17e831b92748700c5631784db08f2
SHA1b13e4c44d9e6c02e008e663d6da7a855a68d875d
SHA25629f9ce8852b3dc56562e69a7f0b49347f3ba6b55d17e6702a4d4d76910ab3e7b
SHA512f069fd7ad9652878b0e7ef69a19fdb01f2e5048f324fabfc47fda59ceb897d19fde2e7ff70f2b05ec3da0990b7b06562b99bc9be5f9a9716b62b7aa7fbcfbe5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577f0d520ba30213afb7cebbd0ef46dbd
SHA18fbc8f55663f884fb117c2d833fb9629efc50cda
SHA2566ca7514014031b14263e1947d6eedd8227e725be8a95c3d0e2ec1c43a26e1975
SHA5123f0fafbad0310245363ba840ad4b0c501440b8eea719c084d18cb3296d05ad5c0dcffb2c0b1ebc310c95f03e60d6ced085ac1271e583a65d813d1d6543be5069
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9EM1SEHQ\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
601B
MD5fe090a25cae211cf6758eec58a473625
SHA14aceb9f6d6809aad597cc7ad300f543a1864c85f
SHA256c445d5755d5f7b6517dff7394a92a1da7e13f38efc95543898de4b08bc35dd0f
SHA512c46baf6607ce7d0e1a8417f54b9c97322eaeece15752f46d7015b6126a18bd96234ba20172c11d2e8d21aea33a22359c853a70601321320c58e8e2a80bf02da9