Overview
overview
10Static
static
78319695f2a...64.apk
android-9-x86
108319695f2a...64.apk
android-10-x64
108319695f2a...64.apk
android-11-x64
10closebutton.html
windows7-x64
1closebutton.html
windows10-2004-x64
1core_wrapper.js
windows7-x64
1core_wrapper.js
windows10-2004-x64
1lynx_core.js
windows7-x64
1lynx_core.js
windows10-2004-x64
1nd
ubuntu-18.04-amd64
slardar_bridge.js
windows7-x64
1slardar_bridge.js
windows10-2004-x64
1slardar_sdk.js
windows7-x64
1slardar_sdk.js
windows10-2004-x64
1template.js
windows7-x64
1template.js
windows10-2004-x64
1Analysis
-
max time kernel
134s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
19-07-2023 11:46
Static task
static1
Behavioral task
behavioral1
Sample
8319695f2a7a4c2f6050d922dd1760a5e8731064.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
8319695f2a7a4c2f6050d922dd1760a5e8731064.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
8319695f2a7a4c2f6050d922dd1760a5e8731064.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral4
Sample
closebutton.html
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
closebutton.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
core_wrapper.js
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
core_wrapper.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
lynx_core.js
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
lynx_core.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
nd
Resource
ubuntu1804-amd64-20230621-en
Behavioral task
behavioral11
Sample
slardar_bridge.js
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
slardar_bridge.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
slardar_sdk.js
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
slardar_sdk.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral15
Sample
template.js
Resource
win7-20230712-en
Behavioral task
behavioral16
Sample
template.js
Resource
win10v2004-20230703-en
General
-
Target
closebutton.html
-
Size
981B
-
MD5
c8efa039f4f84b2705a8e3a3b31da61c
-
SHA1
669749429feda1599c4ee980cfd67fbb1a54c1a4
-
SHA256
494693c2ac56ecac1a2588c25631e1bf71211fb0f06108649a983c879315b1aa
-
SHA512
db6c9817469c937a41eedbbbdaeb21a0860fa5228258978fe59d29c75ab1497b8d1a0ceaae2b236206d6935e186deaf0d83a73791658fa68a985dfc5c314aed2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 406ed7d036bad901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000dfff1b3a562844db5bcdd926cd8279400000000020000000000106600000001000020000000015c27fad31f31b4f0d2aba2e096197ff442fafc594bdea131507749fb189d56000000000e8000000002000020000000d3a9fac1bebbf5c62e2c66b459ca78e9faddfd169230da168106967cdf6e5125200000003e04e1bafedc86bf22ccdbde7bc7437179126585ed1554f9e707b7725ed8ebca40000000bae1cbb2e7254b94fc1083fc7af897635d6adbee640ff6665e55586947245a9c18f0190b4338de53afeaaebc58cb34fdedc566328828edaa00efd07d735b9f17 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "396532200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FC078D21-2629-11EE-B6C7-CEC9BBFEAAA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1424 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1424 iexplore.exe 1424 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1424 wrote to memory of 2176 1424 iexplore.exe 28 PID 1424 wrote to memory of 2176 1424 iexplore.exe 28 PID 1424 wrote to memory of 2176 1424 iexplore.exe 28 PID 1424 wrote to memory of 2176 1424 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\closebutton.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a1e22afbd7012dfbfe89736b5285136
SHA149b8652c8a1e3e28344ae927c6ee85c328fba4f8
SHA25622121d94b9c2ac647b89cb841e99b59daa920cbe1b46f1c1db5e643b10a1e35d
SHA51214f9889ab236a3a6e8453304391c1139684c410a882f60ddd4b5c3cdee27556535fe16a669ed207024e4dd8b820f20e1a635fd7892c1fbf23ee84c134b3682d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd32d3b87ca59b900d9a317773a88991
SHA19e697a8309f9907cf4af2c036effb4713effb28b
SHA256f416a69683904544c573842c788ea8094476b7bd101e3ff635983fb6deadd241
SHA5121ba80b7287fa3b35f049f6bb656e937edb976fcb6781cf1ca8afe00fbb18af8ce38cb65b51215c25c6f211b08b3ea980a70b9c9369781b312020cea0fd323605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c7ab01481d9139ad912da583797f863
SHA1025591caf22f1ef4bc50d126db37d9597109bc35
SHA256afb62d64510710b7b59ce3cabd75cf68075b45c18f7fda1d45c1d569a2b7bdbb
SHA5124f10ba3d35aceb159579e7a3a25ad348381aeacfecc9de2e71dd74387c4519507f1488fbe0e293cbaba6cfa79f01849bf2d51853396bf27be17a01488fb888be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b451ccd8570baa616c9acbf2a30c12d
SHA16b95c7766d749443172c77a23ddc2c7ffc17cbe3
SHA256e9010aef51930362935c03d5c39da5b16adf5c20e8f766e08541952687fc07f3
SHA512de25e77f1e68b0b37fffdc733b6ae21c673fbfa3410d42304b7b6d079abf672dfdf596220b508c90fb0f14bbc5762e9131bdd5cc60de4b5b1583c5a1b3a3c4f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53742355bd7abdb4e3d8393ef43643e3e
SHA10deed4852a2d5f3ac4c5589d121bc229cc4fff6a
SHA2564c1839e6cf43b2805c7713d6a7e782d39baa6319f9094325b303fe320dabe1ec
SHA512f22058e01bc1c630ee523da805bfd1300189321e02a218684176565c7b75909070f82fc697f991725ff9004df4bf96e39ac0ea318402e7eaf917d19c6fbfa53a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574d3745aa7a803b405079dfb544a4c57
SHA14e3420794ce829ae297a7e8253bb9017fb74c159
SHA256a4ab14d99eac378e6bf6636069302c23b7b76a7de50af36fa57bc0237048f060
SHA5123fec76ea7bc3eebead088e3f19a0533c1fe9436972493537c4ab92ce5bf547719f0e2eb2fb0345122b0edea0039ef951e5e960cb0e4d166e28b41153777f1448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3f6f6734bee2ae487de28cf7949afb7
SHA143bafe6191caaf74a8bf0e18edec7e3e725c6b52
SHA256d0e4010af49c6e010a32a5551facfc53e96028bdaf38edcf88faeeb32593946f
SHA512080ce29d0892669644f4897721ae1552472c03013010a04f6bb73f3d9b6c488f202682dbc98249c94399246ec75191da3df969886e694153705b107ce968b848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6cd72c60947ff78b3ffe5dc4e14672c
SHA17994c8741835d0b1521fc368e05d03637548c5f2
SHA25683f432e9a1bc6c0f08a6691f659a43f0109dc6d589f908e49b47c48131fa5b13
SHA512cade2944a85f5b90ba15d90b2c1ff182a35d899b53f003bac4943a92f248a90ec632ada4ae58d5af88b8dfd6e367022a636ba1c4dafc2c7f3208fa719a79104e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f62fceffcc551d8950d29b0bc9031e9
SHA10f4b3c3a30f7ea44a345083b5a8d917626798b68
SHA256755eb8d3f814c579fbb0dea3398add0ce25167c484fc2091ec890cc2d13b8fb6
SHA5120da226add2eca26140c8c5967800b99c93198d6b5b2af1e78e2bbe458b3d2ee6751fb3428b68b0d134728ed28dc084d0247d484621f9206cbcb9767def946e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdb39522382471a3f0fc12d040baf5c2
SHA1208132fa78209d0cd4e80279d3c50e7f51a46fb8
SHA256a9e60fb6b5e9a451730ced852b6e070404d9dbfb3b7de0668e2ecee0c83cdfe8
SHA512090b4f46eceb0e6bd3223f55e27f0d5a8e6310788dc3ed2e6df4a53f595f50386b06566ea57a7bfaed13db00903504592d0df24690ab72b966831ee9a7844eb0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TGCFYHZ3\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
606B
MD5c37260fcf1162f93d2f21cbf670d1dad
SHA162d2cbab3fe6eb6065a166fde87cf6c6c4d76b9e
SHA2569f5fcc1cbc81a993b58eb864b982f6dc57c00b3a0a0ab4855ace1802463d0b4f
SHA512f50d17603626b9b71b8a7522c14e22997f5f56ea7bb15141594b3360757866c3a3095f66632f315f4a2d83a747bfbb198f7f749eb14f3836b5464ef411eb6b99