Overview
overview
10Static
static
738658ac74d...b8.apk
android-9-x86
1038658ac74d...b8.apk
android-10-x64
1038658ac74d...b8.apk
android-11-x64
101bf84a89-2...c0e.js
windows7-x64
11bf84a89-2...c0e.js
windows10-2004-x64
1ad.html
windows7-x64
1ad.html
windows10-2004-x64
1aps-mraid.js
windows7-x64
1aps-mraid.js
windows10-2004-x64
1assign_lab...l.html
windows7-x64
1assign_lab...l.html
windows10-2004-x64
1blood_gluc...l.html
windows7-x64
1blood_gluc...l.html
windows10-2004-x64
1blood_gluc...l.html
windows7-x64
1blood_gluc...l.html
windows10-2004-x64
1blood_pres...l.html
windows7-x64
1blood_pres...l.html
windows10-2004-x64
1consentform.html
windows7-x64
1consentform.html
windows10-2004-x64
1diabetes_r...l.html
windows7-x64
1diabetes_r...l.html
windows10-2004-x64
1dpr_report.html
windows7-x64
1dpr_report.html
windows10-2004-x64
1dtb-m.js
windows7-x64
1dtb-m.js
windows10-2004-x64
1edit_insul...l.html
windows7-x64
1edit_insul...l.html
windows10-2004-x64
1edit_label...l.html
windows7-x64
1edit_label...l.html
windows10-2004-x64
1edit_medic...l.html
windows7-x64
1edit_medic...l.html
windows10-2004-x64
1edit_track...l.html
windows7-x64
1Analysis
-
max time kernel
135s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
07-08-2023 20:29
Static task
static1
Behavioral task
behavioral1
Sample
38658ac74d5516bb56c20c604b95306dab9fc707c5662501225a8a6c18e3d7b8.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
38658ac74d5516bb56c20c604b95306dab9fc707c5662501225a8a6c18e3d7b8.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
38658ac74d5516bb56c20c604b95306dab9fc707c5662501225a8a6c18e3d7b8.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral4
Sample
1bf84a89-28f7574e191c74305c0e.js
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
1bf84a89-28f7574e191c74305c0e.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
ad.html
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
ad.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
aps-mraid.js
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
aps-mraid.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
assign_labels_local.html
Resource
win7-20230712-en
Behavioral task
behavioral11
Sample
assign_labels_local.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
blood_glucose_entry_local.html
Resource
win7-20230712-en
Behavioral task
behavioral13
Sample
blood_glucose_entry_local.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
blood_glucose_local.html
Resource
win7-20230712-en
Behavioral task
behavioral15
Sample
blood_glucose_local.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
blood_pressure_entry_local.html
Resource
win7-20230712-en
Behavioral task
behavioral17
Sample
blood_pressure_entry_local.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral18
Sample
consentform.html
Resource
win7-20230712-en
Behavioral task
behavioral19
Sample
consentform.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral20
Sample
diabetes_reports_local.html
Resource
win7-20230712-en
Behavioral task
behavioral21
Sample
diabetes_reports_local.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral22
Sample
dpr_report.html
Resource
win7-20230712-en
Behavioral task
behavioral23
Sample
dpr_report.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral24
Sample
dtb-m.js
Resource
win7-20230712-en
Behavioral task
behavioral25
Sample
dtb-m.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral26
Sample
edit_insulin_local.html
Resource
win7-20230712-en
Behavioral task
behavioral27
Sample
edit_insulin_local.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral28
Sample
edit_labels_local.html
Resource
win7-20230712-en
Behavioral task
behavioral29
Sample
edit_labels_local.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral30
Sample
edit_medication_local.html
Resource
win7-20230712-en
Behavioral task
behavioral31
Sample
edit_medication_local.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral32
Sample
edit_tracker_local.html
Resource
win7-20230712-en
General
-
Target
blood_pressure_entry_local.html
-
Size
2KB
-
MD5
1cdeabe6877fd1045588c42a174a7e01
-
SHA1
376b5eec8b187c05c562e65dea56622501840f77
-
SHA256
2f1b3beb96e982fc3a873335c5117682f212f870d5fc4ee6e0e9c2f9e861f2db
-
SHA512
b3ff351f1ab2a406f8f1b01d6f8ce58052f5edc5307d84c331febe2c972fa3354ecaae2da9f97e278666692ff56a80d020d49c587b184307557b8adfcff234be
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e01080ea6dc9d901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "397602029" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{15B50221-3561-11EE-AB11-E66BF7DF47AF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000081fc177b9287ed4a8181eac127bbbd6900000000020000000000106600000001000020000000cd6f658eb9ed86e1414c6036bfdcda7bac70f4286077716d8208473e5357c0d5000000000e80000000020000200000000b3f0f2922f199824f25d2f7080efd395ac40e0500df904d6a4499b7b96d00ba2000000040fbb04b15e7d5ebcaafd40975dc974e013810f6ce0762d670f41fca47425b0e40000000d7951b1b5ef2f72a75b2b1f69059df92efd0d0e64379b8c556ae26e60084249baf6dc4b83797f51c7661ac4eda3bea1d6b486404de9065150caef8e86f02c0d6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 2372 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2372 iexplore.exe 2372 iexplore.exe 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2372 wrote to memory of 2236 2372 iexplore.exe IEXPLORE.EXE PID 2372 wrote to memory of 2236 2372 iexplore.exe IEXPLORE.EXE PID 2372 wrote to memory of 2236 2372 iexplore.exe IEXPLORE.EXE PID 2372 wrote to memory of 2236 2372 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\blood_pressure_entry_local.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD500437e1a95f3baac051a833804cf3137
SHA11a24a64ff21cd35f29607829918e02a85852c69a
SHA2569151221deff5814bdf2fac3bf9841a15da54c14ebf7e08dfa8e88861cfd2454e
SHA512160751e8afd4bbeac23cb7f4463f12289dd5140b582355486a0aff36b1aab9187cf0951b658cb04591fc407a4de3535935ba5f95a5455f5abdfa5aa4da341a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5744181a035572f80aca0b3ae0e2ab0aa
SHA1f846f776a625dfffd86c6737deafe626522569c9
SHA2565cb56cc1e9a5bc477d3aeca317fcc7359ce088e83770bca19ba4bf649c5e1fba
SHA512367097cb0e2d556c7ce657819e1f2b2f8d62e926d45f3249682a0af5be6636cf25dbfdb31b3d5b04f9b927bc5fb758e38c9155cc394df194f088e5d2b5e75828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a560905b15f5dd8fde2fc7565d0ce5a4
SHA1d7b65143a2ee7e6159639432ce25602ea18f3cfe
SHA2565ed37dd4d47ff0dcb10d5d5c7aebb68b180e2cdda2f4562eada9ff143106af08
SHA512884d58434822a25585b31bb83a3baead44bfe6da397dca7f35a02dbc50d749132e1d1224debf5708bd4b256af9e1cacca5405bf52b36dc68aa7bb7a3d8392844
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587757bb042fb5f670c3163b7a6af2830
SHA1be1a88b0496da497bf436fbbedf5d6a50ed94301
SHA256eac063d32f9ad145f35f1c26b21d59574a3e7cadd7d41afb0ff903fbac950062
SHA512655cf202e70c6ae45c6ae109e6018775af706d14cee5eaa08e287c14bde1d426797ec69cad2e1aec2997fcbf6c0c2884476a27449ace653218813dd846e675c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e9da8d616cb7a1b897ce20983f78112
SHA14f7e2e0e953c18a9841a51793b7796a1eb625adf
SHA256ff6f296b9eb1db2cbb4e715f96574d2baad33baad1601216470c6e2bf56361f3
SHA5129aeb3c13ef87e9c379bb6a7e6a4e46c833c738cf9013dbd5cdc1a8e0d952882c0718b0193ad74b8ac7827ed3c9cde895782a4522d694923c465eb4ed5491c8f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582d8973cca64ed602142c9feda61d105
SHA105cae649ee807d837d20bd0ce8fd41e4dc5872c8
SHA25683b1a5d689ffdbdadd1ea8c066df66fd0ea110ddf6a501a1993a6cedeee6d596
SHA5128b769f667479b9999dc964def7c89eda4868a6d50168be36e54de7090a72e5b2c05548c00d7cf1156b9028caf75c4494fa027c255c45fcf1d7cf8a43278a062c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5effd993ca5a48127d161ef943ead1ec2
SHA118a20b6cdc451567d96d57c812f8cffe4a56069b
SHA25652ef29cf995042e5a7abf304b46a8314241c370ca0d830b81490b66cf36613bb
SHA5126ef8e30f05c364e4be64ff80927474e8bb36abb1aea04ca6ee1a7a9c5d44d69e66a4228c1320c1d80081d97ddcc13b158a16de4099852aafa393d27b7ffaa311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd4037592ab22e24830d88497b41c36b
SHA11357e14f13cf574f43d8b7ef73a53e41717583f4
SHA256ea90c05511c5aa13df17948d57dbee4d013707aa3cbace84b8dfdbd7a1e67185
SHA512fe1d132a1b4e8c70174fc82628e86bfb97fd5469cba57bccee308abac2107aacb5b3598d6b2906aebec9518d476a1f4e7d3b0c4da1cb7722779be46778576a54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59729ff9457a13ab3450ade49f840ed0f
SHA1a2ea75d3e01df33b9b959388df7603d5f3fc4485
SHA25695b750cdb834df766f109fa7b57e79310f592dbac8b305920c60d3d2ac46ad2e
SHA51264f33b8e961b330864be3db92d991902e7fda6139cb45fec7cf07e22347e77035a2fb46b3d282162c5f078c73fcb4ec385bb328d2cbe844fd896f9d2ac76004c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a903808aa04f5cf76509cdb6e385f4f
SHA1ef86c6dc422bc2708b3791c94fc66638136ca99f
SHA2565f5bad803f117b8fc16c258f6beb81416107175d563368321ce34a60274e90ff
SHA512ad10a892b58e6fb69cf24c8bafa48385a7c7f73e8ff03772a107ebad8c0a666d36e713e3c4a51e4255219c456aeeff4ff24b2eef3c17a706d7fb705b71730997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcaa95c8f5e50af8de16a19d90bfc66d
SHA1ce4e9791a22b537136da15f1af20809b60b47574
SHA256832936ceae89a7cd255564017b7b4eb22f0e10dbd2673fdd13cca9e55e4a12c8
SHA512a17e5591b585a2d48f09e3a73d70811839d9f0f93bab0a60485cbc6003bad6be8324d77a4d50e8d9a6eaf158c2d69b0dbdf6bc732364759939a672fae639cfb4
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27