Overview
overview
3Static
static
17-aligned-...en.apk
android-9-x86
17-aligned-...en.apk
android-10-x64
17-aligned-...en.apk
android-11-x64
1ad_h5_stat.js
windows7-x64
1ad_h5_stat.js
windows10-2004-x64
1configuration.xml
windows7-x64
1configuration.xml
windows10-2004-x64
3configurat...ew.xml
windows7-x64
1configurat...ew.xml
windows10-2004-x64
3configurat...ty.xml
windows7-x64
1configurat...ty.xml
windows10-2004-x64
3meitu_came...ms.xml
windows7-x64
1meitu_came...ms.xml
windows10-2004-x64
3meitu_imag...ms.xml
windows7-x64
1meitu_imag...ms.xml
windows10-2004-x64
3sbsontj.ps1
windows7-x64
1sbsontj.ps1
windows10-2004-x64
1xx.ArPublicParams.xml
windows7-x64
1xx.ArPublicParams.xml
windows10-2004-x64
3Analysis
-
max time kernel
134s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
19-07-2023 11:29
Static task
static1
Behavioral task
behavioral1
Sample
7-aligned-signed_en.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
7-aligned-signed_en.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
7-aligned-signed_en.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral4
Sample
ad_h5_stat.js
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
ad_h5_stat.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
configuration.xml
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
configuration.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
configuration_beauty_filter_NewSmoothHight2D_Preview.xml
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
configuration_beauty_filter_NewSmoothHight2D_Preview.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
configuration_filter_beauty.xml
Resource
win7-20230712-en
Behavioral task
behavioral11
Sample
configuration_filter_beauty.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
meitu_camera_function__builtin_params.xml
Resource
win7-20230712-en
Behavioral task
behavioral13
Sample
meitu_camera_function__builtin_params.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
meitu_image_function__builtin_params.xml
Resource
win7-20230712-en
Behavioral task
behavioral15
Sample
meitu_image_function__builtin_params.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
sbsontj.ps1
Resource
win7-20230712-en
Behavioral task
behavioral17
Sample
sbsontj.ps1
Resource
win10v2004-20230703-en
Behavioral task
behavioral18
Sample
xx.ArPublicParams.xml
Resource
win7-20230712-en
Behavioral task
behavioral19
Sample
xx.ArPublicParams.xml
Resource
win10v2004-20230703-en
General
-
Target
configuration.xml
-
Size
360B
-
MD5
1c742edf3beb1e4e9933feb3d8a9a2b2
-
SHA1
02f221277aa3f3c51a9e4ce59156a5538f25d3d4
-
SHA256
ece464e4c3843c48a840d24484a8930bc2ec7a8a6b71842a35d7de551a19ca73
-
SHA512
a094ee17aac8ec3705b98135b5d7a6eb4eb1a8ef97b0d42c69e564aa7f98fdc9443d09710b4dc51f1b4bba3b1b76be055f2621bc81eded388a21df19d9941f89
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "396531274" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2045faa834bad901 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D41C6211-2627-11EE-A95E-7E694F6CA729} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000015e49348610e2a42ac63317e6e4271ae00000000020000000000106600000001000020000000f66888dc0de0d2a23057029ab0fb66bdf9661756e76c5406b6df74d796ea1b31000000000e8000000002000020000000e05211b3f227d95cfce9c967b0676fc8aac8cd65a6f8dc94374259897df66e722000000069d7311c2b41bcbf85f62ddcabc4cec5c0ab6262d3b9db679238a6ef3099f47f40000000a9cdbfd76b2de8c6796e3ada8c02af7154300b59e781d4afbe182321e56f926a38b9758818508120468c8c66c897fbebd2f84b218eee4eab9aa189b7e3607e57 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2084 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 1036 IEXPLORE.EXE 1036 IEXPLORE.EXE 1036 IEXPLORE.EXE 1036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2488 2916 MSOXMLED.EXE 28 PID 2916 wrote to memory of 2488 2916 MSOXMLED.EXE 28 PID 2916 wrote to memory of 2488 2916 MSOXMLED.EXE 28 PID 2916 wrote to memory of 2488 2916 MSOXMLED.EXE 28 PID 2488 wrote to memory of 2084 2488 iexplore.exe 29 PID 2488 wrote to memory of 2084 2488 iexplore.exe 29 PID 2488 wrote to memory of 2084 2488 iexplore.exe 29 PID 2488 wrote to memory of 2084 2488 iexplore.exe 29 PID 2084 wrote to memory of 1036 2084 IEXPLORE.EXE 30 PID 2084 wrote to memory of 1036 2084 IEXPLORE.EXE 30 PID 2084 wrote to memory of 1036 2084 IEXPLORE.EXE 30 PID 2084 wrote to memory of 1036 2084 IEXPLORE.EXE 30
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\configuration.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1036
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed02c4b56935862e5718036fbac62865
SHA17ea93ca4378edb8f78266fdc470c272193692304
SHA256b7fadb94d7cb485e462f95f62652b850d12b4918d3450b0cd938a1460c8dc994
SHA5122dda4f17379c0504e8dc387c10805893c13315f1e78ae0093e1566f4c34b879b6ef84f8c19d1ba0429c305345c1f225c07ad400d9a21a9fae905f4d195541eb0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UORESFNG\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
608B
MD5b6228a1c397f068631a21b6e270ecbdf
SHA1edfd9f28b235d9b42d4be2f62f26ccce05c79a97
SHA2567e6c2dbe66c2117426c83608bc6bdc78cde9ff7fb821d826e4af0660f459de21
SHA5125b5078fa8ae1e9d9e46495346d302bce9203b783b57a95d7205041aa9a82d8a808ddb29133f028503e21add80694d0e4a6de114237e4a0ba8b27abec4207393f