Overview
overview
10Static
static
7476efe162f...0c.apk
android-9-x86
10476efe162f...0c.apk
android-10-x64
10476efe162f...0c.apk
android-11-x64
10license-ru.html
windows7-x64
1license-ru.html
windows10-2004-x64
1license.html
windows7-x64
1license.html
windows10-2004-x64
1UserDict.pyc
windows7-x64
3UserDict.pyc
windows10-2004-x64
3_abcoll.pyc
windows7-x64
3_abcoll.pyc
windows10-2004-x64
3_sysconfigdata.pyc
windows7-x64
3_sysconfigdata.pyc
windows10-2004-x64
3_weakrefset.pyc
windows7-x64
3_weakrefset.pyc
windows10-2004-x64
3abc.pyc
windows7-x64
3abc.pyc
windows10-2004-x64
3copy_reg.pyc
windows7-x64
3copy_reg.pyc
windows10-2004-x64
3genericpath.pyc
windows7-x64
3genericpath.pyc
windows10-2004-x64
3linecache.pyc
windows7-x64
3linecache.pyc
windows10-2004-x64
3os.pyc
windows7-x64
3os.pyc
windows10-2004-x64
3posixpath.pyc
windows7-x64
3posixpath.pyc
windows10-2004-x64
3re.pyc
windows7-x64
3re.pyc
windows10-2004-x64
3site.pyc
windows7-x64
3site.pyc
windows10-2004-x64
3sre_compile.pyc
windows7-x64
3Analysis
-
max time kernel
135s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
08-08-2023 22:09
Static task
static1
Behavioral task
behavioral1
Sample
476efe162f8ca4f0c7ad83f3602ac1ee661f97312fd00d71d765469425dbc60c.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
476efe162f8ca4f0c7ad83f3602ac1ee661f97312fd00d71d765469425dbc60c.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
476efe162f8ca4f0c7ad83f3602ac1ee661f97312fd00d71d765469425dbc60c.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral4
Sample
license-ru.html
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
license-ru.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
license.html
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
license.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
UserDict.pyc
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
UserDict.pyc
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
_abcoll.pyc
Resource
win7-20230712-en
Behavioral task
behavioral11
Sample
_abcoll.pyc
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
_sysconfigdata.pyc
Resource
win7-20230712-en
Behavioral task
behavioral13
Sample
_sysconfigdata.pyc
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
_weakrefset.pyc
Resource
win7-20230712-en
Behavioral task
behavioral15
Sample
_weakrefset.pyc
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
abc.pyc
Resource
win7-20230712-en
Behavioral task
behavioral17
Sample
abc.pyc
Resource
win10v2004-20230703-en
Behavioral task
behavioral18
Sample
copy_reg.pyc
Resource
win7-20230712-en
Behavioral task
behavioral19
Sample
copy_reg.pyc
Resource
win10v2004-20230703-en
Behavioral task
behavioral20
Sample
genericpath.pyc
Resource
win7-20230712-en
Behavioral task
behavioral21
Sample
genericpath.pyc
Resource
win10v2004-20230703-en
Behavioral task
behavioral22
Sample
linecache.pyc
Resource
win7-20230712-en
Behavioral task
behavioral23
Sample
linecache.pyc
Resource
win10v2004-20230703-en
Behavioral task
behavioral24
Sample
os.pyc
Resource
win7-20230712-en
Behavioral task
behavioral25
Sample
os.pyc
Resource
win10v2004-20230703-en
Behavioral task
behavioral26
Sample
posixpath.pyc
Resource
win7-20230712-en
Behavioral task
behavioral27
Sample
posixpath.pyc
Resource
win10v2004-20230703-en
Behavioral task
behavioral28
Sample
re.pyc
Resource
win7-20230712-en
Behavioral task
behavioral29
Sample
re.pyc
Resource
win10v2004-20230703-en
Behavioral task
behavioral30
Sample
site.pyc
Resource
win7-20230712-en
Behavioral task
behavioral31
Sample
site.pyc
Resource
win10v2004-20230703-en
Behavioral task
behavioral32
Sample
sre_compile.pyc
Resource
win7-20230712-en
General
-
Target
license-ru.html
-
Size
34KB
-
MD5
ac6e15df193c7135c916f85fd48afecd
-
SHA1
bc11e538662c15a478b3cbf8cbf0873b8f19ec9e
-
SHA256
a1b20292621b8ba67ddfb61802bd12bade68f6b930ac6ad61e89c047a1f91c22
-
SHA512
bcd3d439b0b25ba3de815f00ff92bf3545578d90d53adacc2b272b60ee8bf3d65e460d87fbdc56eec32344d8be567b1f7384fb9c8b0934b24cec39ce05b7c8e1
-
SSDEEP
384:8JF/uQenaw/h+pMNbK+v5AKVjZI89GThAKJPrLqCu2WVgqxk/d1NDlCPjOB4WUen:4e9hDbE4nGThAUTDmI4WUE8Z+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0cae32545cad901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002a91d4b999c9854dbdd04be1b9b2202d000000000200000000001066000000010000200000005347dcc22ffb8138639cd0ce598b7eb821476bf4c6661184a3d061da606b3153000000000e80000000020000200000000e1b6f7efd1c6a64a139323b450b09cd2341a1028c5661ca14675b096a2833962000000000a6c460d60dab5b76ed3fef97f683c995cad6387866bedabba632dc5f297bf340000000114424cbc548c73c24efa04469347de42eaf1eae30d1bd56dc6976ad631c1cab746f048a237250d7267b250587d97f25d44d34f5c6a05e17ed5c127cc05c6eb8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "397694469" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{51190231-3638-11EE-B619-CEADDBC12225} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 2404 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2404 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2404 iexplore.exe 2404 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2404 wrote to memory of 2372 2404 iexplore.exe IEXPLORE.EXE PID 2404 wrote to memory of 2372 2404 iexplore.exe IEXPLORE.EXE PID 2404 wrote to memory of 2372 2404 iexplore.exe IEXPLORE.EXE PID 2404 wrote to memory of 2372 2404 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\license-ru.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2404 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd28ebfff190ae21eaed31bc11f330ea
SHA16cf40d6c57a6123c23c4fa5b71fd3c5786964d07
SHA256cf1ac77af519413c4e8f14e4d0d8263b4f163d48836aa2f5bc6e1efe9f6b5277
SHA5121ff4f3be70a74b5bc88a19faf7e2dfa87c6434d23e5f4655806106c66b6059e3ac9417045c7d4b271daca7cedf5775d966c5e2bf04a803a166c69532d82ce769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597f8756793e833244c2ebf0e0de3de38
SHA1d6e0ff6409864e7ec47b3304361dfc5572843470
SHA2560c5d3e892bd8b33df8bae90bf409b163c76f9051681ef831bc92b39b36b508c6
SHA512f2502d1c5d4f2df998e7776bbc6bb06f5099525f06043124775d392b2a6b229b7387a1ed3c269917def6e52e386ffbcc022bbb0438171184377967c8a90eb5b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d90e0141164ed44d69b1f61ecabf6ee9
SHA1a1bf6d4a7639d07166cd280fe5a912856ae25434
SHA256522f4a17b0507fb5abc15a69b25862a6e0708ded4ffa398a100d69e4e7846f7a
SHA5125e6777c4e251465cfb9f9c5496ff28e1a704c2b84af618558c316af31812a5db523962bacf03d01c7f9b0fedbb0fd70bd7d59c16c4b4c117e209d04c4da04958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5812be49bb380f3152b186783f61afd53
SHA1719c6588439b73659822c2ebb8ccc3360dbbecfd
SHA256fe9c36bb7af845576a5342c05ca34cd910e33bb3b4c4be1dbc3a14dca97b6d6c
SHA512862df6ff8bdf27191edfa24edb91638ed9bc0e9a5319deca982d6ea18577c1759468b80d1308891f10d9b64c36226e76787e2e6b38ef24c6ccb631df0087def4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526cf98b849db1f4943b93e7e5622a13b
SHA1f0292f36a77e51286ec47d251d294618c03e36c0
SHA256bcd0869ed6241f01a77b2abc4212b65699bebf63797a2512d8a61803933cd120
SHA5125c9dafa30a955d765b924c1fa73c732ce205c961fbc7d8d6879c99926e860b604dd2c12c74887ffa783b213ac71dc1fd7ec3117ec574bf3ecb822c5b2abf92db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f79442fe23bce1468f65030821214e3e
SHA16a602cf00c7d62edbe2ee5c630176f238f9b1aff
SHA25620d2175aea75d3c7eefedd3376693aeb3742d0ae735fe29e83e121bf85cf9218
SHA51206dbaa05b3518db0fee9fe24c033824f02d0793f590f18666fc82527f14a5b7334d8a32b9851f1f4b7e7c5be19fc85de4e6848ee63a62b57319d649b3e6b58b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ec930a86b18d6c7e6ac98eee39402a3
SHA1883357b08a2bf835c36c4ea955892f161457123f
SHA256028f32f869f2dc18ee667e4f0fe1d85d861bbc0a0948fe932f4cd4f500a78156
SHA512e6e6b6e54d0aa3eab618fc3d44e09fd50fe5ad8e65e487d512d50dee9f739c5a631c60de1346a9e3dd72fa733f47974c977ad4d0b5a1f55d332f45e450589c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d184890881dcd407bbf5fabddd4922c
SHA11638df4597fe6c346137410fbe007084045836cd
SHA2563a6e4521b7acb342d96bd841c82b14e6f96e3a49818494a92a838027cf9bc787
SHA51298ac9337c1e22f62226babc759bc91260ea61dcf9d37747d53349898e9457be418b37d0009e77441b62da4d97179af0b417dd09d9709d5b15365869e1d5066c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7540d71f9d5ac6210cf1ff741c49fc8
SHA157936c880c475ba9d331f59e659fc1b48779eadf
SHA256cff90da075537214222662b3a1ab1627a3d5e1b40d58ecab99550eb27b8f05c7
SHA512cf1f167196842abb5b863b14e18afc93a36f1710a75b48b1cf0b390ac87baf9bc848a6f8d84c6ccaa701b4bc025c26b2e54c4d472481ea92cf2b1dedf35b3644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5464551513c8efc2029b2706326bb2812
SHA1d0e8efc6a88e304b7515d773bc9faadc8695d774
SHA256148947eb8ca889ba1f3020a4f29c9f3d1f895b501e9ceccc856512d2894a365b
SHA512b3f4d21c5acf81f490a9c79396aecade3edd184befb80639cf39ac7715dbc102ae6d9c3474fd283f32fb9e29f7b9e68f2ecf337d39be9aa67216d3e8ebd10c4b
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27