Overview
overview
10Static
static
7d3ad33fd9a...d7.apk
android-9-x86
10d3ad33fd9a...d7.apk
android-10-x64
10d3ad33fd9a...d7.apk
android-11-x64
10ad.html
windows7-x64
1ad.html
windows10-2004-x64
1disney.js
windows7-x64
1disney.js
windows10-2004-x64
1googlephoto.js
windows7-x64
1googlephoto.js
windows10-2004-x64
1hbomax.js
windows7-x64
1hbomax.js
windows10-2004-x64
1netflix.js
windows7-x64
1netflix.js
windows10-2004-x64
1web.js
windows7-x64
1web.js
windows10-2004-x64
1Analysis
-
max time kernel
135s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
07/08/2023, 20:34
Static task
static1
Behavioral task
behavioral1
Sample
d3ad33fd9a192aea9837033045084cea36ce9c0c812c616d1c405ac37ddbcdd7.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
d3ad33fd9a192aea9837033045084cea36ce9c0c812c616d1c405ac37ddbcdd7.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
d3ad33fd9a192aea9837033045084cea36ce9c0c812c616d1c405ac37ddbcdd7.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral4
Sample
ad.html
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
ad.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
disney.js
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
disney.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
googlephoto.js
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
googlephoto.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
hbomax.js
Resource
win7-20230712-en
Behavioral task
behavioral11
Sample
hbomax.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
netflix.js
Resource
win7-20230712-en
Behavioral task
behavioral13
Sample
netflix.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
web.js
Resource
win7-20230712-en
Behavioral task
behavioral15
Sample
web.js
Resource
win10v2004-20230703-en
General
-
Target
ad.html
-
Size
15KB
-
MD5
52c368fc009579446f8dc67daf8dca87
-
SHA1
fc52b078a9a02847efbf85d10f41b961c85fa459
-
SHA256
9b6cfb0e52c7f7dc99d5f5b7e2a6142fa3ad82d1333f42877eed3d29b0561579
-
SHA512
c80bcefe98c2eab09d4a831e788cd50563c62333d4c8aa81046df2acc9888c5a87da45546c1ee7d40bc7a9d7148075e3029e09e4b086406f6143a589111d1cb8
-
SSDEEP
192:xMejgzfCtmdyPfojYA5D5zniVkG4zhxm45IqTbTD5qRSwpcPt6FLYFieRO6shWUh:flqiO5RrD5qBpWt6FAieRahW6X
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF8EF781-3561-11EE-BF73-4E44D8A05677} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b08173c46ec9d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000015e49348610e2a42ac63317e6e4271ae000000000200000000001066000000010000200000006e3d5bd2f30a325b6736aa39618f10857d55f761bf0930d8265a8f355ae4f194000000000e800000000200002000000036f9cee61d5bd175462e137462bf0e96ab3148b11ef60bf4ccaef489c75032b090000000e005fca43ddbae55ffeda0a6f339f2271e69ee4b6d58215425335848a189d25ef48959e1ad0553d5a5a97aae299de91780f72e629f4bf75f0c631981d70bf13bd5250fc0a49ff9b6441b2e3aac53edddb5818bfd8e0f2697db36ef024cd1eb3ffd3cca1bb5f94ca6bc0372bf2ad514875af1538e9eda1a9afbb8da35ffeba564b1e1e27622e305152efd6ae6df8ec9494000000071b03f7b102cda55e2c5546d526fac7f44f232a3c1970871fc0ac7f267bfcf433aa95867d52ce1bd0aa17ede87f7b1f778283f8cb2078ca6a0195ac5a59b0d3f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "397602396" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000015e49348610e2a42ac63317e6e4271ae000000000200000000001066000000010000200000001b2c39239aa2da7344f3bf7569d0ed17708d9c77a78159e15456622e129fc88b000000000e8000000002000020000000e1b59e8f8ffab4b3da85ebd0b4cf709be870356d1ca5d11eb2aa4507217a83b220000000b0167cd91163801fa65d5ca08fa29dd9cd46c9a217e6902834fd7e3646fbaaeb4000000019d3ad452b987d1b9995c41736ddc9157783d9b8f406c530df8e310336df41fba2be6b82a49f2ea5618d16431b065cb46684d165df389b5e49cf66e6d92a9298 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2488 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2488 iexplore.exe 2488 iexplore.exe 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2960 2488 iexplore.exe 28 PID 2488 wrote to memory of 2960 2488 iexplore.exe 28 PID 2488 wrote to memory of 2960 2488 iexplore.exe 28 PID 2488 wrote to memory of 2960 2488 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ad.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5242d46c9c44e8ba765da85df72c8c9d2
SHA1463257d98e9977c201dcc23e304001dee132183e
SHA2563bc152ea2375f59ba8500b8a12afa9067d0debcdf0114180d3d241d9c0dc2a58
SHA5121fd2ceb34098d0a3699aaa0d38f5e4738fbe272eca8b0865931ae23193fa633d2efc245d76fee942d0b1d03e7ac5170cd0276fd908f7ee2638a0bc991d4dbd72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b757baf6f636aae78cbc04cb0f665772
SHA12c998e4a87962b2a24599f9bf200a3db54c77f26
SHA256f4287d3d960d276cca7b84ab9c326bebf9aba81cc852a7d7583b1244e259da5d
SHA51212c9e701d4cc6a66bddb7325cd7d56c606ff436e54051bdc4f869965cd758007706dee5075db691f794aca57ee67586b46d687a29a19ef0d270643566ea0a817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b87b3cb7311d7eb0d5f02b27594527f1
SHA161e47f473e6cbe232b9152b713dc5180758b7280
SHA256bfdfca340f249040f0e8dd3e1f8ef6a3998900865fe8bfcae64bc559e897e5f9
SHA5122a5dbd61e21b028bc59b0a2861cdf761f9321c06f95b423982041db9355b7b15bc2e669baa603b95fd2ceca175b4cb8cfd4657dba9a6e8ecbd01ad972b2ee424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504b8d789177bf32437241c8f63f3e2fd
SHA1c623ce48b2d083dfde821583e4ff41dd0d5948da
SHA2564be0fd4dba95c8788d08430caacfeac2810dbd3275f221c5ba27d6c44e20afaf
SHA512f43c2ebb41b5c99a57ffc250dcc410d8fee8223c13617b27b033213414d4ff860192f6b9401d88b4b19ccca66b0f772686a8adedd0bec1ecb8156df46b8f8bef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dce74c9703f07b29b6ac229f54361db2
SHA19ab1b0e84f423f49295d9d87c0c9dad82797ef32
SHA25632b528cd9f3c65cf7ed259228a4a76d8f03d70b7fedc417cc1bbc0e868c20a32
SHA5123634788c12ccfc9170f7af48a1cf40baeabaead45cb96bdfd3b772e8d5479b0e1bd40aabb5f6eb344cb9eb88e077fb18b0a2235f7ed3706fe35325098d1b5ea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544f88aa14f3d28fb9c7861559a9e2790
SHA135fa527e09f10456b6bde122f9c63532ffd53f43
SHA256fcc907b777e4d0f5acc33f4216b4bc4a955d5765c80f12c8c230d4448ffebf21
SHA51225c76a567fb5b0c69811298f5ec22a6401ad71a3c9e8231e77c252e0d15a5ba42ab546cc107f52e441ed50f9880cb6a20fdc85feba50d07204f2eda7fb24cade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9266aa2980cdb63c8a29bbf0003f186
SHA18a3eb8ef214afe2dc3f7f4ba2b235de0606461d2
SHA2561eff54fdd60a40b50b0aab7d0fb992e435640066589df5df31b65edecd6f968a
SHA51292f5274ccf2d30d26326a84cbb3c178bf1845bdc78b4e3a1bdc7ea64f746df896950c6ab10b460ef4916606d1ecbc01f089e30be0435e97a80c0e96fc17f9e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a62603bcb95c5bf533c25f32819fb68a
SHA18e1e05454ec57342d28096aaa12c7388170477a9
SHA256fd2c36277835640cb479f539c6800f5f642dddb59574c229d29ba0d6ecec1d58
SHA512ee114b3ee9cb5c3550427a3d5da018efefc19e0bdf0d5495bfc13ff134e8e8b7e56fab4737a224d2b050692e6a526603438423268338e12420f2eddfbaf3821a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0699ac20494b697b649bedd61324150
SHA11c829f22147b0b6e5b828f5a8ed79e28c201bacc
SHA2568d9d3810f62f810b420fa9003c89661d7b0fcfc1df478e6c1d32841d7c7c73b3
SHA51265833d9ca543bfc24005f88bedab08d813b4ab2e148d8c356fd4a8b5eb5ce0702f4d699a9f64f0c640f04c70bd16b556ed75570027267f07f8f7844ffea69006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51763b2778cca804507b2ea087f24e62f
SHA1e964fc091dd2d82b063c81a049c93b3fa4658d0f
SHA2562005644209d72c725fe4ba40fcf3ae67183b565d12735c08f4a53cbf26cad6a1
SHA512f8b4a6c52703989aad51af71c61dcaa2531fb64bd0227bc9aca0a75cba9e8075af252adf7d34650fda8537da497849b2fd425c2614fd56ddd5786dd90ba2e38e
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27