Overview
overview
3Static
static
17-aligned-...en.apk
android-9-x86
17-aligned-...en.apk
android-10-x64
17-aligned-...en.apk
android-11-x64
1ad_h5_stat.js
windows7-x64
1ad_h5_stat.js
windows10-2004-x64
1configuration.xml
windows7-x64
1configuration.xml
windows10-2004-x64
3configurat...ew.xml
windows7-x64
1configurat...ew.xml
windows10-2004-x64
3configurat...ty.xml
windows7-x64
1configurat...ty.xml
windows10-2004-x64
3meitu_came...ms.xml
windows7-x64
1meitu_came...ms.xml
windows10-2004-x64
3meitu_imag...ms.xml
windows7-x64
1meitu_imag...ms.xml
windows10-2004-x64
3sbsontj.ps1
windows7-x64
1sbsontj.ps1
windows10-2004-x64
1xx.ArPublicParams.xml
windows7-x64
1xx.ArPublicParams.xml
windows10-2004-x64
3Analysis
-
max time kernel
134s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
19-07-2023 11:29
Static task
static1
Behavioral task
behavioral1
Sample
7-aligned-signed_en.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
7-aligned-signed_en.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
7-aligned-signed_en.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral4
Sample
ad_h5_stat.js
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
ad_h5_stat.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
configuration.xml
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
configuration.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
configuration_beauty_filter_NewSmoothHight2D_Preview.xml
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
configuration_beauty_filter_NewSmoothHight2D_Preview.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
configuration_filter_beauty.xml
Resource
win7-20230712-en
Behavioral task
behavioral11
Sample
configuration_filter_beauty.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
meitu_camera_function__builtin_params.xml
Resource
win7-20230712-en
Behavioral task
behavioral13
Sample
meitu_camera_function__builtin_params.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
meitu_image_function__builtin_params.xml
Resource
win7-20230712-en
Behavioral task
behavioral15
Sample
meitu_image_function__builtin_params.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
sbsontj.ps1
Resource
win7-20230712-en
Behavioral task
behavioral17
Sample
sbsontj.ps1
Resource
win10v2004-20230703-en
Behavioral task
behavioral18
Sample
xx.ArPublicParams.xml
Resource
win7-20230712-en
Behavioral task
behavioral19
Sample
xx.ArPublicParams.xml
Resource
win10v2004-20230703-en
General
-
Target
configuration_filter_beauty.xml
-
Size
3KB
-
MD5
fa59d18bccc7555afa1914dbb6e46530
-
SHA1
5d26f679b5308d46ca6f16464fb86e16df151dc0
-
SHA256
f593d5b845fc1d321e13b77475423c5f275dbe771c4d743dbc2f8cf6378545ba
-
SHA512
0a33bf3a412a27b35a29e18f62a037af56a0c100e7ff2ed20b5e893afba29bf32716fe4d06a85c2d2e947539d28c2609262fdb80627152d2ac0646606508dc48
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0000fbb234bad901 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "396531291" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DE2B5D61-2627-11EE-B3B8-4E44D8A05677} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002a91d4b999c9854dbdd04be1b9b2202d0000000002000000000010660000000100002000000051a10cac1c81371d3846ab5f114c858b423723e203157b868d3c97f29aa19570000000000e80000000020000200000002e6dbd7e5f3c373ed1684b2aff50e59650c273031ff402dd86998e72c518ff93200000003faf40c18b2a9bd097017abe20d2cb647c0f0d550f89d3f262f23b44e550902c400000006228d135e51018e0150ac983d0a5713bf1f9d75b909a04f49da1223eb3e8c8346e28f2034176696e4cf4ec3c72e8265dd6285a5c40a12732c3c257bb91f756cf IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2836 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2836 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1180 wrote to memory of 2424 1180 MSOXMLED.EXE 28 PID 1180 wrote to memory of 2424 1180 MSOXMLED.EXE 28 PID 1180 wrote to memory of 2424 1180 MSOXMLED.EXE 28 PID 1180 wrote to memory of 2424 1180 MSOXMLED.EXE 28 PID 2424 wrote to memory of 2836 2424 iexplore.exe 29 PID 2424 wrote to memory of 2836 2424 iexplore.exe 29 PID 2424 wrote to memory of 2836 2424 iexplore.exe 29 PID 2424 wrote to memory of 2836 2424 iexplore.exe 29 PID 2836 wrote to memory of 2844 2836 IEXPLORE.EXE 30 PID 2836 wrote to memory of 2844 2836 IEXPLORE.EXE 30 PID 2836 wrote to memory of 2844 2836 IEXPLORE.EXE 30 PID 2836 wrote to memory of 2844 2836 IEXPLORE.EXE 30
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\configuration_filter_beauty.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2844
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfcee694c179e460a1b83f4a532f90db
SHA158b07740c0c73acb2963153f5ce3a74950d9eacc
SHA256f789b696e2f23b9acd542831d04e47af6b9e481107a72310b44108848dfadb71
SHA512c44596fafeac4d8b1e198e5091e2cec0e48c69b55cf565354b928f0f4adae271a50e943fe49ada7e562a34ab84f2db4dd44349881ee51b3af870129d8d1cfbdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e758c1ffedf411bd203894a6c1830833
SHA134b2320b1ac94f66883d9b81c9ca321db8a8c64e
SHA256009858c4f67cd366497aa360397ba73d30db81933a274e7e51dfd74a62ebbb3a
SHA512ba5446ffae1b2c984e510ae8d2bce72cf2386b73a25e6800361483faa05a138e2ce39d1fc3f1da5ef532fbcdb0ecb0df6eead02a51b7406e279dae19f5b16278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523f4939a8854d2cd61b403178c14594b
SHA12273157e67ef6876d9dc246523e92c2630f805c0
SHA256a5812fe8a547b014bd87075ed504470256e6e4196c8cb94020e35366bc735c4e
SHA512db8f844a316ac06f307241a3089d4b3e69a66fa7163f31ed9a03777564b50fe9af60d718620bb1155025a1b948aebf381c2ddef2d2582ed3548ffd6e820fb0f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559f19b8242376fd654ce9f1736c86175
SHA100622fc317b499148388ae66f4b3b246541c5275
SHA256d25413fe8912bc1131ab8f833e5753e42c28fb8edc209c8aa09df240cb469868
SHA51260446db56dd43e69632b530065f3a28eb0612dd8155347e3bbeff59d2922e3b0b8c2e759caf8256b7a67e6c8690bd42ac766686d8114b9e29bab0237062e2ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544074a93c0b29836370468a0f2bd5b0b
SHA1591e656d6d40e1b79d1d6ed0df8798f459c3deaa
SHA2568d901adf9cb77fb5e4c25ac469e0a106af358704f916f5745a034c9b3ddac76d
SHA512713ac35e4923a553ac31a04a3c81de322094155549025d4c9222b4bcbee4e787034acec5665536c414c1b420d4f6be9aff08dd5dac71fc713130ad8638c25ccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5681082e68fc920261d44a2f339b60b53
SHA15d676e660c6388b1cfd157308741005ef3234c65
SHA2561cb4ba9706f830e8e126d218c765669c1b7aead4f9aa81fafc1c9f807c0b5c67
SHA512940316a198d0f1f92ba1e06a4f4cc7578d6b62af6aa4586259d9afb91de3b7ad3a7480dddc4901267dec6fd0bdef853ecaba1feedce9fa858ffc9f348c2ebd7c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2AKN11NC\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
606B
MD55c86caeeaf82637ab58bf87ac1d2621c
SHA1baff1ea8328f6f610ba459104338285951035f49
SHA256ea6f262f7d0f04a34f49047e133556e9cbcb61f67793de9ccb73725717fd58a0
SHA512a8bb0d70e99d7ef6368fe80487f46b2a66710e00cb513f63ef5fa37c950b52bfdb2676f6ca9b946fb714657a6d9764d09000a9cbd80d9f5d1a1c0b397342f1fb