Overview
overview
3Static
static
1Commerzban...ty.apk
android-9-x86
1Commerzban...ty.apk
android-10-x64
1Commerzban...ty.apk
android-11-x64
1ad_h5_stat.js
windows7-x64
1ad_h5_stat.js
windows10-2004-x64
1configuration.xml
windows7-x64
1configuration.xml
windows10-2004-x64
3configurat...ew.xml
windows7-x64
1configurat...ew.xml
windows10-2004-x64
3configurat...ty.xml
windows7-x64
1configurat...ty.xml
windows10-2004-x64
3meitu_came...ms.xml
windows7-x64
1meitu_came...ms.xml
windows10-2004-x64
3meitu_imag...ms.xml
windows7-x64
1meitu_imag...ms.xml
windows10-2004-x64
3xx.ArPublicParams.xml
windows7-x64
1xx.ArPublicParams.xml
windows10-2004-x64
3Analysis
-
max time kernel
135s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
19-07-2023 10:57
Static task
static1
Behavioral task
behavioral1
Sample
Commerzbank_Security.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
Commerzbank_Security.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
Commerzbank_Security.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral4
Sample
ad_h5_stat.js
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
ad_h5_stat.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
configuration.xml
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
configuration.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
configuration_beauty_filter_NewSmoothHight2D_Preview.xml
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
configuration_beauty_filter_NewSmoothHight2D_Preview.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
configuration_filter_beauty.xml
Resource
win7-20230712-en
Behavioral task
behavioral11
Sample
configuration_filter_beauty.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
meitu_camera_function__builtin_params.xml
Resource
win7-20230712-en
Behavioral task
behavioral13
Sample
meitu_camera_function__builtin_params.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
meitu_image_function__builtin_params.xml
Resource
win7-20230712-en
Behavioral task
behavioral15
Sample
meitu_image_function__builtin_params.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
xx.ArPublicParams.xml
Resource
win7-20230712-en
Behavioral task
behavioral17
Sample
xx.ArPublicParams.xml
Resource
win10v2004-20230703-en
General
-
Target
configuration_filter_beauty.xml
-
Size
3KB
-
MD5
fa59d18bccc7555afa1914dbb6e46530
-
SHA1
5d26f679b5308d46ca6f16464fb86e16df151dc0
-
SHA256
f593d5b845fc1d321e13b77475423c5f275dbe771c4d743dbc2f8cf6378545ba
-
SHA512
0a33bf3a412a27b35a29e18f62a037af56a0c100e7ff2ed20b5e893afba29bf32716fe4d06a85c2d2e947539d28c2609262fdb80627152d2ac0646606508dc48
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0e52fd72fbad901 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b14723a8e389564aa88fef2378dcfc6300000000020000000000106600000001000020000000c28658e27f2df253afb40bcc442780909796c2727abb8afb2b91a7158685e1e5000000000e800000000200002000000033b393582bbe70e6f3d48e17949f3edd66f8c2b651484f61134e1289544c07e720000000967b224c8afb319d699726b67d0208fe3fad05567d53727b534d877e6fbafbfd40000000b71f92e2bc4fec57938eb275453b4caf5e69982a92635663e3536201f1fdfaa4e771e8e3e434fde81a31ac1e560fac75ec0563ad8990108f3e69480a688c3369 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{025DF171-2623-11EE-899C-6A17F358A96E} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "396529204" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2872 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2864 2908 MSOXMLED.EXE 28 PID 2908 wrote to memory of 2864 2908 MSOXMLED.EXE 28 PID 2908 wrote to memory of 2864 2908 MSOXMLED.EXE 28 PID 2908 wrote to memory of 2864 2908 MSOXMLED.EXE 28 PID 2864 wrote to memory of 2872 2864 iexplore.exe 29 PID 2864 wrote to memory of 2872 2864 iexplore.exe 29 PID 2864 wrote to memory of 2872 2864 iexplore.exe 29 PID 2864 wrote to memory of 2872 2864 iexplore.exe 29 PID 2872 wrote to memory of 2880 2872 IEXPLORE.EXE 30 PID 2872 wrote to memory of 2880 2872 IEXPLORE.EXE 30 PID 2872 wrote to memory of 2880 2872 IEXPLORE.EXE 30 PID 2872 wrote to memory of 2880 2872 IEXPLORE.EXE 30
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\configuration_filter_beauty.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2880
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5479150f67157f373fe593320bbec7c
SHA1566482d32bf9eb8a6fb255951e453c40fbdef070
SHA2566eadb448b3379300908ead04ce2e831efe43f27b860c162efa8976c12b19c550
SHA512ca65468e260b38dce445784a7f8cf61322aa2afd95b77cbbddd29f00019d301e130946cc6ce535e9d656381607b66c332db470057306238cabb1c18dade73a93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3e255d963721aaddcf569f7819fc546
SHA1de26e762796e5ef96f649bb3f8a07a620149f75b
SHA2564d90bdc72887cf77987cf13e6adb6842a7e0beee40647dc290dc7478df03f205
SHA51267992f0dedd8375aafead02276e6c2cb80928e0310dc65cfb9e6633ce65aa3288cb71e704c9b9d35011fc7ef5c80ee2bfb1b5bf70d316ca3ea7e6a61cadd9105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ed71aa3d6901732ff46bcf0e38f4270
SHA10fdcb31157a24f9de5cc088136e4acffc68ee688
SHA256c97b194c1fbf5832de901b3e466625ca8a7a15030938394036f547faede78a52
SHA5125e446b446796e13289f3328edd83b0e970efcd04e26e220ada040db2ccfdba8e977715b372a16bb5d3e1222a856b6816dab76e3901f343b090c49e1a970df2fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510b1cef09b599c98fab42d80f89cea03
SHA1f298f9e3f2187cad11c2840a5425b5a8652aadfa
SHA2560ad3b290b225c083e201a224e221371b09aa317346d509cf5af8831ccd44a4a9
SHA512c1491d67bd8786ed27ae2a564b942732ad5ab8717e9feb6d397afaa86ef19851a8d30b98d96e6d8ca2aeab8a7cfc5cf624caf3df86ea6e5657f7728d14a3a826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d43bf0e58cc54816e9be1623c338572
SHA179aa7d293bde1942f0650f5b7417ba77e590ebf5
SHA256633b1b9ff9a903d65ba323c92188ca0859accd5063862affa24699665d349ce3
SHA5126dd08a07e2a54c2b2b78a1dee2410bb17ffe1ae1bb9164e0fe5da4b89a20022b2023bd66a40cec5ed70f06f75cb802064a1d9b38310a189f437139f2285ea1f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559353f47949928780902875966c84349
SHA178704f636d15d7c9f30faf5113b04b0fd186b032
SHA256b2e43a1e013df508935896b171e365f6920d1b212aa0c0a7a40ea86f002f915f
SHA512271c2632c9c60539bc6bb6857c32efb825212e6ef69abb60d23f5cfb12ef4d3f1f182a68985d51068642508d00fbaed1a60a39b736df56c9f7007b537bef8fd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b68f4a44288504d33d4fe4510e335da
SHA12815f44f73f698a41c84768619edd8ee9f95518b
SHA2561881e5066259fcfbcc8b366a9664c9a4c7fcef87ba4d2f93fa875235a30c9770
SHA512579193ba2b248639bc62664b458511c40446f081e96f2f57f99d4e0eda11701847e16f56b3b4a135ebe3dc341da9a79c830a680922c4e9f3382aa63b5f1cab16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557c8f91b327dbf1c4e212434819f894c
SHA1e1bf6366b2cc92db18b336ca1147b2da6fb8e736
SHA25660dc58a1b321db10c4e28d90c3af741cadd8b7d2778bbf5a02faa89d5e7ecf1d
SHA512b5b335d23a9df58ea2a2abac9d777de41da70e95cc7af19bd0780784b41a30d545b16ebcce008078676126b36ead70ef7ebccdbf512c13a86699a90bea0e8749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4fec7a1574ed34cef723e61a8aae8df
SHA155237e0cbbb511acb9e513a9f73ffa3ee56473c6
SHA2566ae86cd874b7d942f8c295422f91e2d72e693dc782482e1f8aed06463e024657
SHA512cb85e4c90de6ecdffa48a8a7b2331d1702d4cb06571cb5ac8a7df613142d3ffba766005902ce4f12e5977f3e2040e269310c2214771e8e80fc42d97e102d1751
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ULULORKV\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
606B
MD5774763063d191cbc86f98c44fb9ca3cd
SHA1a82cea54b7f81a123c8a71cc2899392dd18cd059
SHA256062a09997d0025b5d7787e560642e15fe83087def42bd915993e794b350b41b3
SHA512558a55512ea32642e207411d305eb0baa9e56ede7cf6138fbbde8961ac69dcb0ee96bac4239f4de28abdc233bfe7b374b45c6885f36c75fa78c9d7b1bc52102b