Analysis
-
max time kernel
134s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230712-en -
submitted
20-07-2023 21:23
Static task
static1
Behavioral task
behavioral1
Sample
95dfebe9de14ab96b82e7c30a1c1cc0f2d5b0b66dbe55206e85faecc9861ff89.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
95dfebe9de14ab96b82e7c30a1c1cc0f2d5b0b66dbe55206e85faecc9861ff89.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral3
Sample
license.html
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
license.html
Resource
win10v2004-20230703-en
General
-
Target
license.html
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "396653197" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000081fc177b9287ed4a8181eac127bbbd6900000000020000000000106600000001000020000000fb3767d9a1d6940ff3cb038c620d544f4e871a0169e73172ac5d535bbdff1704000000000e80000000020000200000009f4aa66900c3da98c87d9bef8245ecd0bda6e8ca65229eeb3a9403281f05ba1a2000000095022b910f0511f98ed4f80d68a257d3f8bdc22080377e8f10faedad47610f43400000009842d48bd3c6424ec748242d14cbbf8834db0b1e6e9365fe29ba2d4d380c073402f1bb85f1db2497b2347ff2dfbd0fb749052fef763cd2da9b8407a23ca16a92 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B36BBAD1-2743-11EE-A82B-7E970D42A387} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00cd638850bbd901 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2184 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2184 iexplore.exe 2184 iexplore.exe 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2220 2184 iexplore.exe 28 PID 2184 wrote to memory of 2220 2184 iexplore.exe 28 PID 2184 wrote to memory of 2220 2184 iexplore.exe 28 PID 2184 wrote to memory of 2220 2184 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\license.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD558fcfc4744c1150027c49d8f5d4c4fbd
SHA1551130f4769c8a056b6b403bdab8ae23e9bfe4c0
SHA2568a50e33a64c38e1150d6c3c4c165bda2faf2413a0eee3a752457d4e83eda14e8
SHA512c7ba23d4926d073e7bfbdf9eac1e54182035630b97f5b32933a0ae9dbe394f196a4f6759b2083f0b3c7a21626d9b48fee6de1412b8e71c7814c197d4262aa7d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566e10fb048887393ab488103390b3d5d
SHA1fef4cf7009b2d7ff6c9feac66b38dffe06114c9c
SHA25602b015e5b249df495276e351eb1c8a1d249073ced1ed223483d0ebaec1a24a42
SHA512fac9a98fa08ffd2a044edccc46da5af8deea7e3530e6921a6914bd510dedc497f75d43c2b6b438286a856662aa10e7eff988bbf84b548b186f94cb0fb3ef2ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549ac8939b16647729aa607a61aa42ff1
SHA13f4bbe8aed37a35cc40d306b0796bc25eb38e709
SHA2562cb66efb053b976d6adbbd1cef80c5276b9458cd0e13908b8e733fe1be767047
SHA5124831d01798ba5912baa722897e556321e04f46c07ab714d3454672e6ce93693a1be7fccc2749f6755236cfec46946ba9ad8a4ac874ce2e9e5a5b6b9d5c9cdd5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e40a18208c58229cdcbc91eb9d83bc3
SHA15f0297970cd575e45def4c81fffa8b977fa95a28
SHA2569cff1f2ca675aac00d7d46b33682a39dc7abaff5d3c9c6b171b71b8f2f9658e2
SHA51287d28bc274c78b67f32ba77101733f6294ad17f469d2658f361e42f0c0be3b64acec11bd121849d11a0de8a0402560fe118e4ee0dabc28c80d4920e16db765c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578f9950e0d6b7561c05bb25b2dd46ee1
SHA1cc4af8348fbb13411e7da363466ecba95641bcfa
SHA256152298a14626c0ea0b371f9a4daa8a9553bd6ea4331bf975b1ae0597226638f7
SHA512d48aef619462bae0f2044622c610c3654eac9cc6f0d029cf2e480f6bab3f3c2d8a000a45cb10541caf3938d2c5f35b120ae1b345af75518c12d9eaa21ea0603d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55edb66c25c1fc56a6768531ae4af347b
SHA16d796d3143289237764e9950d589a71f09bc12ce
SHA256bb069f7f69dc2bb150242e770107adcc390efea81d4c82ba299a0bf3c9997118
SHA512ec7311d30ea94305b50374041acbeb47a27cadb5cd67d3a9fa0c8d7703e23a8e2b366832b4c2a3b84c68c6c652a196be1dc1d167f732ed566292bdd6d076f657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ca772c3ef2ede7c5f1c6a568248debe
SHA117f57b55df3c293e447d45ad978fcd2c1b27854b
SHA256fe4ac013ea85a3f6e656ca059b56e3e183f8c4d5ac9fea60eae1705e58b504eb
SHA5123cd6d053b061f6dc04e66ffc309a00f55b0f5bc65291fbf00b08adfb43ffda37f8bf40f41dd205153882c1a3791bae4b421c119fd8fdd31303309d59b33fc174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5761f7b6010e617b6d65bff6f3d8fd343
SHA1eac13cd7eba8d504dd1da232e27c6d2472a504fa
SHA256e4a85eaf47c04b6ced7434d22aa18531b91d0317f3aaa75c299f71d50c4973e9
SHA512308fbf644e1608d901f10b496d66ecbbfead0a8fc102ab70086f59bf155882a5e82b8c0b5d05318c216a702337c7dcad756b0767b2cba7dd5378a2172f330e6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a17c87ca74df153dd460617674b13c03
SHA1d3606143350a8c8be61132bc78a6d61270651031
SHA2568de60aa7e3a69fee93fa5fbc1a03e92829b9f93220154a41261f0e04ac774f1e
SHA512b07d36308b67af93e89674af7612d96267a03df3f116f8b248f8e359f9642863d0c34f925bcfbdc0ae5767a29387e9657fea7d97c0885ee8e24d3649c83ba38f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4793ca70b5515f58efb015c5f3f7998
SHA1f13cec7ae33e8f3e0cf6b26be398f0fbb61f14f7
SHA256a7dc3573498f20dce680227cafdf25beb955f17a4892cdf364b9994320deee74
SHA5129beb27aacfc32eaa0297a8220a267f92a26188c998e78e9aed2c2c9bb25a71195fd57d5a108fd23d595a757677c0a6676e3cdbf5df08c786985022790db10fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cce715e15070039c3e662092c1ab5a1
SHA131c7a213dabb1eaa6460c27675f505f3940087cd
SHA256cbb42c0c351fb199aa4a10b67592e1df22be28892e296e88f6ca6de51169a889
SHA5121a5931757d64576cff1077a32964ba01f30503acc889e5e8626a1609e2b6bdb1bffce6cfe2e80ded338392b7733b8a6e7faba0f2e5162d65380dd7b6896f68ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507f74a4ddbf8798b5e5bab2d1c8c8aae
SHA1f2534e05565984542073bfea943cc4f44babcc96
SHA25606bc5a5d291b2dafd02fbd5564fdb2889c1282d205c71ad538454da323b0be0d
SHA512fd9ba78c74ae196d2d605b26b6416b6c9eca2c62aac3a57bdcf408c5db0c8fe3d0fcbcdd1954467a1275d1bf7bea208ca28513a47dc49f235df826704d7d0903
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B9M1KBX1\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
601B
MD5d0ae9b7de244acc4f7b1feca0f1ba514
SHA163059eb8db26b13ba89627afe511be5e7d17a940
SHA256f7fbec0df23da1c571aabe803adae88b6b5f8c6144d7f223624b7436cb42367f
SHA5124f9550d2fb7c0880d0c405e281b0f67af04696227cbae71860a2da4fbe3ceea28aab8879dc63ca07383200bcd3c23263ca211148b479eead979b5de3a9e6be90