Overview
overview
10Static
static
7081794e3f6...b2.apk
android-9-x86
10081794e3f6...b2.apk
android-10-x64
10081794e3f6...b2.apk
android-11-x64
10closebutton.html
windows7-x64
1closebutton.html
windows10-2004-x64
1core_wrapper.js
windows7-x64
1core_wrapper.js
windows10-2004-x64
1lynx_core.js
windows7-x64
1lynx_core.js
windows10-2004-x64
1nd
ubuntu-18.04-amd64
slardar_bridge.js
windows7-x64
1slardar_bridge.js
windows10-2004-x64
1slardar_sdk.js
windows7-x64
1slardar_sdk.js
windows10-2004-x64
1template.js
windows7-x64
1template.js
windows10-2004-x64
1Analysis
-
max time kernel
193s -
max time network
255s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
22-07-2023 15:37
Static task
static1
Behavioral task
behavioral1
Sample
081794e3f6be096f8496f1c2b44d8a3fa8ffa9aa604865b9a8c0bd128e8367b2.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
081794e3f6be096f8496f1c2b44d8a3fa8ffa9aa604865b9a8c0bd128e8367b2.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
081794e3f6be096f8496f1c2b44d8a3fa8ffa9aa604865b9a8c0bd128e8367b2.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral4
Sample
closebutton.html
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
closebutton.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
core_wrapper.js
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
core_wrapper.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
lynx_core.js
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
lynx_core.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
nd
Resource
ubuntu1804-amd64-20230621-en
Behavioral task
behavioral11
Sample
slardar_bridge.js
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
slardar_bridge.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
slardar_sdk.js
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
slardar_sdk.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral15
Sample
template.js
Resource
win7-20230712-en
Behavioral task
behavioral16
Sample
template.js
Resource
win10v2004-20230703-en
General
-
Target
closebutton.html
-
Size
981B
-
MD5
c8efa039f4f84b2705a8e3a3b31da61c
-
SHA1
669749429feda1599c4ee980cfd67fbb1a54c1a4
-
SHA256
494693c2ac56ecac1a2588c25631e1bf71211fb0f06108649a983c879315b1aa
-
SHA512
db6c9817469c937a41eedbbbdaeb21a0860fa5228258978fe59d29c75ab1497b8d1a0ceaae2b236206d6935e186deaf0d83a73791658fa68a985dfc5c314aed2
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b14723a8e389564aa88fef2378dcfc6300000000020000000000106600000001000020000000b1fdbe96a0dd5544d58fc909c4b3e63bfea51309cebca7d5199ff49782744b55000000000e8000000002000020000000e9c27a97ca4ed1040a6e01fb1b551e039731049d4b367c68113bb0b1e229bbce9000000040d0d41d01d3dbad76b4f8627221ef2d16061a00c2d8329f87c9a1f270bead4ef69ea65b41bb00b704beefb5044b9d0d59a490693d3ffa6460b319a2b441627cc078fae41f4f35927177e6cd3a2828799d145b527bcd7d637b7b50b892dc556ee8796f1250005f212c42109002da83122c4c26f6913dc9cb07349a2ab4e935b3e2d878b49810c796498618b0a284214e4000000015559eff0b82ee58c403db8c9a98443d371748c8aaf59d761f88487d5765ccb7aa9a034b5b06090d61d8813d2243679ca1fdc9bb09ef979ad0144b4ba0983c95 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40949eceb2bcd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F5A7BDF1-28A5-11EE-99CD-FA28F6AD3DBC} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "396805356" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b14723a8e389564aa88fef2378dcfc6300000000020000000000106600000001000020000000f27d807a70a0e3f309af7459b1252fd090cb70d95449398fb4cb85d3f436d8eb000000000e8000000002000020000000c3a55b86d201cadbf92172d382c129afaae4e5c3faefdd190b75ccbedabdd9fc2000000077c3a34f53f32789f0d8bbca7835f69829d513753a9da9d05527c7c862067b8740000000715907db11f9a3ea521660a5ea9f2359c3b0d30d5ba32f3e096b31356ae7accc23a0cae7de1f41be207f2b198277c9b5f007ae86974abd4cb1704216088fa1f3 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid Process 2828 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid Process 2828 iexplore.exe 2828 iexplore.exe 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid Process procid_target PID 2828 wrote to memory of 2796 2828 iexplore.exe 28 PID 2828 wrote to memory of 2796 2828 iexplore.exe 28 PID 2828 wrote to memory of 2796 2828 iexplore.exe 28 PID 2828 wrote to memory of 2796 2828 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\closebutton.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2828 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2c8943ffd0fc79ac5d967a64bd7bbbd
SHA1cadc8ace0662fdd1ce40d785b522c9754b7a7112
SHA256895942fa60c4451877b1a26b751e42db261980a7319c220bd9a37b160988d6e4
SHA5122476179e125db76f3d3accbed2a3c273a57d1e4049ab029fbd3f94e0da1bb35914d9befa6cb558ac19ba1e1407ea968adcc8c5f53d2566ed69857e8f91738450
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3b6d179b8aa00743968a786f1e1231f
SHA18e9eff0cda7d1ddf3ea30e39106954ff609db29d
SHA256b7715d96398503006545c204f047b5210d32738688303dbbd1491e7456157b12
SHA512a0a5c5911de74119aca53fe357de815876495b549f3d98ec0573bb737db8085cdee1e253e4566a9e8041413455be311acb24b74ee28cc29b438c03aa8a6647d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507ad549ba5dad733ff03d14b67a0a288
SHA196c1511d1d21b502c16b6f4ca2f4f321aa82fab5
SHA25674c4af8677eeffbfd48eca3721f6f254b5e9f832d3638be4a0e73b3af9759357
SHA512d3ebd052d55af5f430e9f7ff6f8a4d5c99ff949848b51abc8ca25048aaf53ed671fd14630f838d1d23d2a6f1c777cd5ee90121bdf4aa9f577a8b9b7bf2c58047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4fdeb462b4899ae3e55a989b56b2765
SHA16287da7a1c9e24326e0c82c2b0a9894bc85e2f7b
SHA25658d1a19ba8f02d5484127fa2aa12bce7f94cca50a3e7c3871d6fffeb110bb689
SHA51287700ce67ec6fda6ff38c95c13e15f89d8d9032dc3ee1616d94ba6c875b262ff99c43074ff962e47893e445226b2c5c92a09d844ce51b1af7b1c3be71a6874f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcb7a404dc05beeed6f4ecec89cc4f7d
SHA1aeac86eba31c85d1882becc0ee9ccff7af8f5752
SHA25678ea8b44650d44f6f985beed3d51e957164c443bdb61599967db3867f29561f2
SHA512f67756399c818b1901d39c4ef10e051d7cd0ea4eaa32387b4d3ed9a6d5ee4b992302f799b0030decc81b51a5cb17cdfd1d042edecd4de9bbc0f41e708fa1d345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3e9b8db5dd35763efea09b73cdd8654
SHA105b22c00c3b88d19f7eff2962a2c13be3279c225
SHA2567aace54199b69f7d070015e71f77e5dc63bbebe094bbbe0f64325c0d93417d3f
SHA512d8dc6a431ded0e9156b8b0ba20c31ac7401535d9af61036f331db3ec6dd0d4cc774cef61d879e9f49eef979bbbd71d06919e2e6af7994fe77292039ab2614c6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ec645f1d66bdf976c9ebb14c1b899f9
SHA1a35fc4b8046177d2acd41546cbd8609320e942f3
SHA2560463a2a8c7246d71e4519e404c9755569891c6b7915df2bc34f70c5e68338c4c
SHA5123112691bb827cbafc9ea0d710575188aea689f006bcc89cd027a395ed4154845cd7aa6c3630f7a9bf705680f3d1c7512d5e08dc0115bcb2b361242e0e08f318e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a8cd1fa62472873983df301533a7fc2
SHA13dd0d79c3624ba29e040eb1042bfed1779c705f5
SHA25600394160eb9ff2eda83bb65a549975ce1655540f102cab4b4a6764f61e3e1d4c
SHA51251f24851ff81baee9d79f27bf1d56d9944332a55eea0790df27f99f4c85e7360abb6f22145fa2be32e7745da53c4f7e9bf7e6103daad9cd95aea882dccf7dac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2aa73b0eaf62c156d017c7e25990300
SHA1285e175dd692404feb1ad0423fc1dd854de937e3
SHA2567feb705244844df5b1572f95db8dde9a9fbeabb1036c5b60ff8c33d5ddf90324
SHA5123b8ed74694c37af14c874c8df9ee785c7187e18695f338fa8fd798cfca6efde4359035c0ed11a04ab808453b28c64a80b974c5f5efb350d1d1b4a5c078aa27cb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3VKWFGCX\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
606B
MD5058c13081cd70c25ad4998dcf3ccdbbb
SHA1b7909ef618fcab5c908504fcea24c03d0b6e8063
SHA25604a6b04fc154fea98e8a69225d11d83d583360e49f866f71678f6b7704abe029
SHA512f579466dfbae8b3ffc592e5368ffeeb239f1e0b10682e48724036fba92044f489ed05386b81dd3c1c79aacc547480d43865cc509ae0b811806d97d39f5a89a60