Overview
overview
10Static
static
7b6b59a54d6...0e.apk
android-9-x86
10b6b59a54d6...0e.apk
android-10-x64
10b6b59a54d6...0e.apk
android-11-x64
10callout_11_shadow.xml
windows7-x64
1callout_11_shadow.xml
windows10-2004-x64
3callout_7_overlay.xml
windows7-x64
1callout_7_overlay.xml
windows10-2004-x64
3callout_8_overlay.xml
windows7-x64
1callout_8_overlay.xml
windows10-2004-x64
1callout_cloud.xml
windows7-x64
1callout_cloud.xml
windows10-2004-x64
3callout_de...le.xml
windows7-x64
1callout_de...le.xml
windows10-2004-x64
3callout_shape_2.xml
windows7-x64
1callout_shape_2.xml
windows10-2004-x64
3callout_shape_4.xml
windows7-x64
1callout_shape_4.xml
windows10-2004-x64
3callout_shape_5.xml
windows7-x64
1callout_shape_5.xml
windows10-2004-x64
3callout_shape_6.xml
windows7-x64
1callout_shape_6.xml
windows10-2004-x64
3help.htm
windows7-x64
1help.htm
windows10-2004-x64
1help_cs.htm
windows7-x64
1help_cs.htm
windows10-2004-x64
1help_de.htm
windows7-x64
1help_de.htm
windows10-2004-x64
1help_es.htm
windows7-x64
1help_es.htm
windows10-2004-x64
1help_ru.htm
windows7-x64
1help_ru.htm
windows10-2004-x64
1help_uk.htm
windows7-x64
1Analysis
-
max time kernel
134s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
07-08-2023 20:32
Static task
static1
Behavioral task
behavioral1
Sample
b6b59a54d67199717390a8f67751019b65be5aa791c2a605a564c897e21fe90e.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
b6b59a54d67199717390a8f67751019b65be5aa791c2a605a564c897e21fe90e.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
b6b59a54d67199717390a8f67751019b65be5aa791c2a605a564c897e21fe90e.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral4
Sample
callout_11_shadow.xml
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
callout_11_shadow.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
callout_7_overlay.xml
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
callout_7_overlay.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
callout_8_overlay.xml
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
callout_8_overlay.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
callout_cloud.xml
Resource
win7-20230712-en
Behavioral task
behavioral11
Sample
callout_cloud.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
callout_dest_bubble.xml
Resource
win7-20230712-en
Behavioral task
behavioral13
Sample
callout_dest_bubble.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
callout_shape_2.xml
Resource
win7-20230712-en
Behavioral task
behavioral15
Sample
callout_shape_2.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
callout_shape_4.xml
Resource
win7-20230712-en
Behavioral task
behavioral17
Sample
callout_shape_4.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral18
Sample
callout_shape_5.xml
Resource
win7-20230712-en
Behavioral task
behavioral19
Sample
callout_shape_5.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral20
Sample
callout_shape_6.xml
Resource
win7-20230712-en
Behavioral task
behavioral21
Sample
callout_shape_6.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral22
Sample
help.htm
Resource
win7-20230712-en
Behavioral task
behavioral23
Sample
help.htm
Resource
win10v2004-20230703-en
Behavioral task
behavioral24
Sample
help_cs.htm
Resource
win7-20230712-en
Behavioral task
behavioral25
Sample
help_cs.htm
Resource
win10v2004-20230703-en
Behavioral task
behavioral26
Sample
help_de.htm
Resource
win7-20230712-en
Behavioral task
behavioral27
Sample
help_de.htm
Resource
win10v2004-20230703-en
Behavioral task
behavioral28
Sample
help_es.htm
Resource
win7-20230712-en
Behavioral task
behavioral29
Sample
help_es.htm
Resource
win10v2004-20230703-en
Behavioral task
behavioral30
Sample
help_ru.htm
Resource
win7-20230712-en
Behavioral task
behavioral31
Sample
help_ru.htm
Resource
win10v2004-20230703-en
Behavioral task
behavioral32
Sample
help_uk.htm
Resource
win7-20230712-en
General
-
Target
help.htm
-
Size
53KB
-
MD5
883888def347f0db8dbdec1fe82be5c9
-
SHA1
f54280a3690f373a05cf438ca12c3e482bc1ed8a
-
SHA256
766c2b736da4683d0f7cd5927cab1441dc13bca47af33b0911d5aaaa70da6ab2
-
SHA512
4538af3b0b7b2786461d37ca6e3b93290ff9d6a6b7820f7dd3bf3840414c06e0c271786a91e5164d8767ecc66645f9a09599af661ddc39384717dbb80d9cc546
-
SSDEEP
768:FWAtJoDQSUPSEXVe5wSsRz1K4I8Cnsro7:b6kxPSGowS+E4I8Wsa
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{92BA7891-3561-11EE-8D41-7E694F6CA729} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "397602237" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b14723a8e389564aa88fef2378dcfc63000000000200000000001066000000010000200000001d01795ca0cd4145bd46c319434852ac84b2da3476447adcf2f1ca7db882b0c7000000000e800000000200002000000004bb564d3044f762fd12ca4826ace197885ec10785cb02cc773cd130e579db7c200000002b3177e0b9e8d37ab1239448d561c1a0cd602be4bebc3a48fbac97afd984e74c40000000186702e7788c49f6b741fc924b8e1344b40c05249da2331f34355d2304274dd719e950fb4bd76e119006d482753e0022f7cf624a4ac0321793f1841da38a7186 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3085a2676ec9d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2432 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2432 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2432 iexplore.exe 2432 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2800 2432 iexplore.exe 28 PID 2432 wrote to memory of 2800 2432 iexplore.exe 28 PID 2432 wrote to memory of 2800 2432 iexplore.exe 28 PID 2432 wrote to memory of 2800 2432 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\help.htm1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f72401726a2ec180c81732f54c2bbd71
SHA1f256c63e2fdbcc7e04999ecd3cbd0f79884251a0
SHA256bc1c663c52545a005b44f456b82474af919938bdcd64dc62583acd88ce5a9d00
SHA512772627d3d21c637434ee5b7d7571db86798c8311fbb0b99c46b723a2069df19a2b5caa170835b31d53184283a1fcc3ffb64b944f365afe786c1e9e44dca0abb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db1ad7d1f7f2415c51d12a05950aeec2
SHA1d8b7bb55c77c35a60714bb278061f248e207ea49
SHA256d9628fd2d9cdb6951eca31554c757447dba9cb471b3b3a244080a6503710bbfe
SHA5123616f4febdead83520595e87c76360229ff0df8b84ef7a172115a2f6cee0ffa94a197657f4e03eff5ecf66423dae4cb61114c4edbcc0d3929fc82ec34b4c5dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b92dff919a015e7c3f57f3a8dfe00ba
SHA117efdee26a247c175612d41b709fb41c3e821e3e
SHA256a44a7b13f2a08a09de7ebb2ea84278ba1ca1418615f63edf66867a953d2474da
SHA512436f9c63e4f17b9909da79b9540d1702ca6670ad7806e54484686d83339c2289e1f1d47d6e0e53e9d7a4235057f1998906ef3776be933d22e79fd79ec727dfc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dee5ace99fd9c407b91f44e89dee6da
SHA1c04483bc5e01ce21dd92e23b7ee8f7eeaf6d2d4b
SHA256995833b9b6b737bff45122e65bc9351043e8c5b22f27031744cdcc52d1853ac7
SHA512915c736c25eeaa33cefaaeafeba9ce18134f375f4eb267e5a457508aeea1a21520460c6117081ea6bea9abf05bbeacc962d6e69629cfecedfb4118dae3e439c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5bae8d418fc2d18d9bd4fefab1078dc
SHA13ad7fa97831f72da72b480059514e8bd483e4368
SHA256c6c3522b65b75c084df51ea449800e6239655e819810e0a67ed0fa00d1b5ff9d
SHA512ba1a9b98bc938f36d9b74fce3d594d1193025786b0696b7c3d8edede5c74a1ebee4305cf8e92b0ece0ea5047f2d2e4390534e6310ec09d145bf3925d5712424c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db8c5bbf11e368ad339bc46c3cfae9d2
SHA1ae16f3c9a53fd0386406855f220a1eea25b01404
SHA2561fe84ee19d9e64332f688ac4937a7049475d02bcc7b9aaa6df797ed66dfad35e
SHA51215303fa2d24cd70458c9beea3bc3b7737b56d7cd1d906b5fed4be4d2cdaf6d5f3bd546f11516c0bdb1f7ddb32965a00d2e52f71032c221490008c71ed63ec5e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5141b518b0d8c3fba02eb18c96aded10f
SHA1e2866e58fb478d9b4d0f67347676bc806662776c
SHA25699864a3a6d1bfa862b6151a828c436d106e5d7298d51bb8a589063d9ca65ec84
SHA5127d715f981ea15f1d076993e0aa9e1a717c7e08e59c415cef1533429abb2d9ab81f60e17decc028a7dbfd0976287dd9bfbf2aaa7953ca2eccebd52c19b7fc367f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f509fffa3400ce951f11e8ab1e250fea
SHA18e9633147f810616b5dd4e229094c825fbcfe050
SHA256729cf574d1db3090add75fdafbe4b3a9472caceee48a550c5ec87e922b3fa3b9
SHA51289201b59680b17240fb24f803ba80d726aa4e83c2e2e117496cae0ca2a0a273f4ae584d203fad5604e67a79f188012bb42fd25f7d58a22aa78d73e9c1681a87b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57746966855e8adc64e9b24d21a7ea4f0
SHA1634aba736fa94af67dfa04c923aa55daa9c0d10a
SHA256301882c4ea01de3605e8cd880763c80f79c0b7211babc3f857818bb03af970bc
SHA5120659ffa90b6fae4f2a4c24147b3f4c8db1763400441dfb905adeb2e597a5cbb6a605d3b1cc195f3674e3ed0f5592265777d748bec426e10682af89b03cc47565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584c078b491daca98e2208ff098bf97f7
SHA1713daafb409602bfaac467397c3a752609b35b8e
SHA256d40e8f5b33cd60247789e894a7a9309fca1322b2b124d08a25a45dac61aa2896
SHA512ed04640951ade731855d00fe526e4d07255bfe6247806afca6df62a93e55f6f51469c6cbc3cfccbea6184832ef019b461ca52eb2d0bbd56f80968bbc49fc6891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57006c0dab8a1dcb225dffa043aac26de
SHA164f15d831484893c0b4a6f1428de7285559aa155
SHA256f5fd0d899ff3fe34f0175d39c6c9539ba320624cfabcadee01efeb8e6c8dfa97
SHA51271caf413c31c2a71fca9aa60c8a94d2820aaf0c58deabcb5e53d78640ced753255eca2326ddd72264d47ded0ae5723b0a11eb77582943540853feb836a4d0d35
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27