Overview
overview
10Static
static
7332231ca3f...76.apk
android-9-x86
10332231ca3f...76.apk
android-10-x64
10332231ca3f...76.apk
android-11-x64
10FAB-blue.xml
windows7-x64
1FAB-blue.xml
windows10-2004-x64
3FAB2.xml
windows7-x64
1FAB2.xml
windows10-2004-x64
3annotation-xml.js
windows7-x64
1annotation-xml.js
windows10-2004-x64
1apple.xml
windows7-x64
1apple.xml
windows10-2004-x64
3arrow.xml
windows7-x64
1arrow.xml
windows10-2004-x64
3bear.xml
windows7-x64
1bear.xml
windows10-2004-x64
3bird.xml
windows7-x64
1bird.xml
windows10-2004-x64
3boom.xml
windows7-x64
1boom.xml
windows10-2004-x64
3callout.xml
windows7-x64
1callout.xml
windows10-2004-x64
3callout_11_shadow.xml
windows7-x64
1callout_11_shadow.xml
windows10-2004-x64
3callout_7_overlay.xml
windows7-x64
1callout_7_overlay.xml
windows10-2004-x64
3callout_8_overlay.xml
windows7-x64
1callout_8_overlay.xml
windows10-2004-x64
3callout_cloud.xml
windows7-x64
1callout_cloud.xml
windows10-2004-x64
3callout_de...le.xml
windows7-x64
1callout_de...le.xml
windows10-2004-x64
3callout_shape_2.xml
windows7-x64
1Analysis
-
max time kernel
134s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
08-08-2023 22:08
Static task
static1
Behavioral task
behavioral1
Sample
332231ca3fb405b7621611bd22e7016cc73c32d90318753424ca598833775d76.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
332231ca3fb405b7621611bd22e7016cc73c32d90318753424ca598833775d76.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
332231ca3fb405b7621611bd22e7016cc73c32d90318753424ca598833775d76.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral4
Sample
FAB-blue.xml
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
FAB-blue.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
FAB2.xml
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
FAB2.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
annotation-xml.js
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
annotation-xml.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
apple.xml
Resource
win7-20230712-en
Behavioral task
behavioral11
Sample
apple.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
arrow.xml
Resource
win7-20230712-en
Behavioral task
behavioral13
Sample
arrow.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
bear.xml
Resource
win7-20230712-en
Behavioral task
behavioral15
Sample
bear.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
bird.xml
Resource
win7-20230712-en
Behavioral task
behavioral17
Sample
bird.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral18
Sample
boom.xml
Resource
win7-20230712-en
Behavioral task
behavioral19
Sample
boom.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral20
Sample
callout.xml
Resource
win7-20230712-en
Behavioral task
behavioral21
Sample
callout.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral22
Sample
callout_11_shadow.xml
Resource
win7-20230712-en
Behavioral task
behavioral23
Sample
callout_11_shadow.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral24
Sample
callout_7_overlay.xml
Resource
win7-20230712-en
Behavioral task
behavioral25
Sample
callout_7_overlay.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral26
Sample
callout_8_overlay.xml
Resource
win7-20230712-en
Behavioral task
behavioral27
Sample
callout_8_overlay.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral28
Sample
callout_cloud.xml
Resource
win7-20230712-en
Behavioral task
behavioral29
Sample
callout_cloud.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral30
Sample
callout_dest_bubble.xml
Resource
win7-20230712-en
Behavioral task
behavioral31
Sample
callout_dest_bubble.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral32
Sample
callout_shape_2.xml
Resource
win7-20230712-en
General
-
Target
bird.xml
-
Size
1KB
-
MD5
564073fb36287299158db87208c3ef4b
-
SHA1
d9ea8d3bbeee99b3acdc1fbd5f779d329783852c
-
SHA256
888e1f6b188d57d2bb5c86656872193e2dc882672c67ac53a1c6828ee95f40b2
-
SHA512
77ad8ceaa1784c765eb3ac3cd2d8da442d5bcaa8086e67de4baa929d020ffd90895fe61710f285d6668235188b9520203b86c986154815cf5de82b29c4b3ef1f
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEIEXPLORE.EXEdescription ioc Process Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "397694405" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2AF221E1-3638-11EE-BC1B-D63E05CE97E8} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000dfff1b3a562844db5bcdd926cd82794000000000200000000001066000000010000200000000c40cd4051d8b71feaafcdf80357e23680e7421948f3275e67fc3202f8369ebd000000000e8000000002000020000000929efb37e31fb357c05922a54b64c755cab492f22394d6cd564361133701d9c1200000003d4f9bf1690976f482b2db302e0f0c05972db906de1dae5234bd1bbd51aea0c5400000001f7e820f34c54c3161a515fa7618935cc8a0c63bdca323f74288b0984d5d40ced9f4a1b178fbcf66492d7468e74cfa53e190c81a3f6ea09dd621fcd3e1746e52 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2081baff44cad901 IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
IEXPLORE.EXEpid Process 2580 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid Process 2580 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEpid Process 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
MSOXMLED.EXEiexplore.exeIEXPLORE.EXEdescription pid Process procid_target PID 1508 wrote to memory of 2560 1508 MSOXMLED.EXE 28 PID 1508 wrote to memory of 2560 1508 MSOXMLED.EXE 28 PID 1508 wrote to memory of 2560 1508 MSOXMLED.EXE 28 PID 1508 wrote to memory of 2560 1508 MSOXMLED.EXE 28 PID 2560 wrote to memory of 2580 2560 iexplore.exe 29 PID 2560 wrote to memory of 2580 2560 iexplore.exe 29 PID 2560 wrote to memory of 2580 2560 iexplore.exe 29 PID 2560 wrote to memory of 2580 2560 iexplore.exe 29 PID 2580 wrote to memory of 2204 2580 IEXPLORE.EXE 30 PID 2580 wrote to memory of 2204 2580 IEXPLORE.EXE 30 PID 2580 wrote to memory of 2204 2580 IEXPLORE.EXE 30 PID 2580 wrote to memory of 2204 2580 IEXPLORE.EXE 30
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\bird.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2580 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2204
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cac6048c29b62c7e1a96a04a1d43a79e
SHA14d2f3cac45cfb2f40f0c7cd8220042aef1a5775d
SHA25660a4ff9f7fb5b43ed4deada41cf9c6be3a36afaa26c9d528b44fad5caf28e2ae
SHA5122890456e8c1325624888a062a89b124bc6568e98c63d74ab98a0a03723d99092353e5a40ced11bc32ff70d35bf310784ec47a743f0414eb183b189ad07f8f932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f484c319a478bc09d17740b86f8d377
SHA162506790e62f78ce2490fdd77e1f531888818f5e
SHA25694fb53bb19ba2d0e84320c95e007924f9e2f7dc6e8630a944d8ee0feb74b87d4
SHA51292c018cee17c910441e10cc3e496b01366dfa33f3739ccdf2888e5f338c0c8e5e7f09727bea2089792529269cc169fa1c8927323bc196536feeea74c9096f8f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563ffec45d885ef910a68fd332adc7e96
SHA137c2b4b201ea6791c3b1be15991b69705b85d0ea
SHA256fb8101e2704d1f650fd6a4a53370049997fa63ecacf6929a1f7fcf65cdb4ac0a
SHA5122ed418bceaf2eb80f237c3aef7ec454e0fb912d81ab7b0dfcba65225eb20526ebf641bd5d639a163d28f26502a5989bf7c750356610bd2ed5972a286304365e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b726b86f0aec71a7ada3a1e3377850e9
SHA1a39db7fc9ffe13453916908fb25dcede12c1fc8b
SHA25617d402c42d9a851400493d9d5beac720b9b44b68620602c4461066ea865bec11
SHA512a0dc9acfc72ab0482dabf64025255de7092f36608d2fcffe125f1d4989dd64c739ec63b6c5108851b66121f22c68bbc4dd6ed0fca4258e11eec0eabe148b9ce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565ede77c47988e03868b0af4d4d57809
SHA100f814062e82689b08555072fa34a65ff14f995d
SHA2568e620417451dd3995e8af2bf1c4dc4a9078241d7299c5bbf299f1ca87bd8deab
SHA51274ffa9371233235d6d14c7f81bb9d9f47409432488b9eeb0981e46a3d5411defc68c9612cffab30d336e513f02ff8d559619840e699a87b97249183280772fca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6351dda5b0862e95d270be1facafb0c
SHA18e65afa4983536931eeb197c4ab3f95ec07a6897
SHA25663bf5a3753747bc5b2dcb1117af4d653df00a30fd79a43b5e984043b7af2a027
SHA51223f4d7bca02787e0442aa62f7e062c88d008aae7d486f6f38a623ca01478e4111d4eb7fecf02b544aa032cd844d405bb3f1f70d96072a5dbbdf3b00375323837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55864bbf661284064b99cc522a91dd60a
SHA1d5f9f7aeba864f2ae362bf2234b69261b2dd3f9d
SHA2568ee952238d3a8c666cf5d532040397dbcc3a97292d25b16c5c5fc50ed9acfaf0
SHA51256a2ca1d330433c277356c631aab3b444ddbb57ab0da84a7a266a86c33b820376a2e66a67a7fec356e4a4eb450018286cdad01fe4ba5642510061027f1eb1a07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52772d78461edaa60578299f284cdc710
SHA1aff42ae080905ef8e3277b0748d3e19da0535f72
SHA2561e283d8087eaf5b207752c7895dd1cc75c72c9e8ec5069deeb5b008600a893dc
SHA512ac61c4bc563d856302d02ca707eba64f417f627fcf4d2a53a55213206a7cc5c88f2f83e6397e1364bb0e363b523509caa310a903bdd7d9cd5228d2dc1136ae2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db0692a039a1e84447f65f83b9a7360b
SHA1fccf2ff2030d7459c5820a5fb763e6387e6f1cbd
SHA25647245f0e143f1e6721b5fb78ac6530e62b92862347f711cd97b250988b469c96
SHA512fbd262c1e8aa0087567bb784bf772d1cf9c111fdab562ba113d9f50fb863049a0ebd8a0071417ece7a5f470d4df7163fb3c7a671e5f0848b79d90ff3789312ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c712e74fccb8d10e47dacecf8fb2fb4d
SHA1b032d846b66c08163d760d123f1b99e50dcc9658
SHA256023871f70a5ce9622170c4dd36e6f53720fc7c1c354f1ed9a0e139d31b3763dc
SHA512306c9511d563af4c13d27c2cc195a99cbe1e76937f7310e700ff338433d2eda41f84f5efea9d159c1ab341ed228eaa861ae38025ade1f397d052c323224245ba
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27