Overview
overview
10Static
static
7c92acc3e0c...c7.apk
android-9-x86
10c92acc3e0c...c7.apk
android-10-x64
10c92acc3e0c...c7.apk
android-11-x64
10closebutton.html
windows7-x64
1closebutton.html
windows10-2004-x64
1core_wrapper.js
windows7-x64
1core_wrapper.js
windows10-2004-x64
1lynx_core.js
windows7-x64
1lynx_core.js
windows10-2004-x64
1nd
ubuntu-18.04-amd64
slardar_bridge.js
windows7-x64
1slardar_bridge.js
windows10-2004-x64
1slardar_sdk.js
windows7-x64
1slardar_sdk.js
windows10-2004-x64
1template.js
windows7-x64
1template.js
windows10-2004-x64
1Analysis
-
max time kernel
139s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
08-08-2023 22:08
Static task
static1
Behavioral task
behavioral1
Sample
c92acc3e0c940224d8db097cfb254cdefdbaa86546e5b1d9363d1db261ec7dc7.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
c92acc3e0c940224d8db097cfb254cdefdbaa86546e5b1d9363d1db261ec7dc7.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
c92acc3e0c940224d8db097cfb254cdefdbaa86546e5b1d9363d1db261ec7dc7.apk
Resource
android-x64-arm64-20230621-en
Behavioral task
behavioral4
Sample
closebutton.html
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
closebutton.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
core_wrapper.js
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
core_wrapper.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
lynx_core.js
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
lynx_core.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
nd
Resource
ubuntu1804-amd64-20230712-en
Behavioral task
behavioral11
Sample
slardar_bridge.js
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
slardar_bridge.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
slardar_sdk.js
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
slardar_sdk.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral15
Sample
template.js
Resource
win7-20230712-en
Behavioral task
behavioral16
Sample
template.js
Resource
win10v2004-20230703-en
General
-
Target
closebutton.html
-
Size
981B
-
MD5
c8efa039f4f84b2705a8e3a3b31da61c
-
SHA1
669749429feda1599c4ee980cfd67fbb1a54c1a4
-
SHA256
494693c2ac56ecac1a2588c25631e1bf71211fb0f06108649a983c879315b1aa
-
SHA512
db6c9817469c937a41eedbbbdaeb21a0860fa5228258978fe59d29c75ab1497b8d1a0ceaae2b236206d6935e186deaf0d83a73791658fa68a985dfc5c314aed2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "397694414" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000e8664bdb653864eb3b20ffc0ad3b0210000000002000000000010660000000100002000000058a381d4f97f9c111a28aac6d88973e2274db256177b195d75d1bf5c422579d5000000000e8000000002000020000000adb5f0fcdceb6df63d60e7becadfb5753e8d91c1808ea55fe6a70b5096d93ae320000000b9e2fdf797c8684b36ad1d9838ce71aa3e364f655f6d2889562ba4437176ff3d4000000072fd9a06bd0530d70e2c4a8602954365b9fffb6552223d227e46e56b5fd48931732b559a311fa5acb8db86aae40762dec521911eaa2346af54dd4d3a9cebead5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0755b0345cad901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2E7AA491-3638-11EE-B986-76CD9FE4BCE3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000e8664bdb653864eb3b20ffc0ad3b021000000000200000000001066000000010000200000001de111cd3fc9618c916e21f2097a6b790a59e06600e45bf92ebb51a65a157596000000000e8000000002000020000000ee7ef762facebff6562d0ef8f2c3ac3be0230233564ac62a97b54684c519aeaa9000000038a87367d462baff6b5f19ef667673a02a517be62a51570918f5acb5fcdbc19ec4125db70246ae9bb962151c0779325be847a09a8b89ad2cc0e08d64926e3050a2330210b775ce7ef0982648e34404e51d7c16f41e0a410eee4f99295393c8019668291b2931fb601f7e505b2d7a60a895f1698e1e355f02a723f364b62173907f128959bf4c56240bca976ec6caf2604000000031516724ef80f371a725a133ae928159ae22fe14e284f249609b652057f53dddac3e0f391e7f48fe2726bd6de0c5c8c346c4301d38fde22c16a11a818ba7505d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2636 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2636 iexplore.exe 2636 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2524 2636 iexplore.exe 28 PID 2636 wrote to memory of 2524 2636 iexplore.exe 28 PID 2636 wrote to memory of 2524 2636 iexplore.exe 28 PID 2636 wrote to memory of 2524 2636 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\closebutton.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b932b92dd8efdd83005e286275473be
SHA130f638325eb1b1abee18707f2b333e7a99946dcd
SHA2566412378ad9e20d186a9d0462ec107d9a335b08dd66bd8ace9db7be235dc01ff0
SHA5129db1f2336bae7963aa028716cdd0e8e99c3bc156b0d72e8a2804371c011cd8f025461d9ab5b12e6a208e1936904610a495f828d85a7f21d9265877b3939ae6b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfefaaa53fbad59543aa16498fbd0036
SHA1e89a33cc70bc1e29a16c0a89292e515535c140c4
SHA2564b3a915ac9ce292ee0d21e9c8cf537755d8f51245b8d4b8cd9bbdf3148bf5290
SHA5129bf8fd7f55233792c8e6ce34d8293adae23b1430cf5610a6ca34a9eba6c5c2a93481827a525775d272a961e056e0d16738310c7e9707c3a349208d8af9ebbe28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc2f8166cbd1cce7f5f58f202ef5956b
SHA15293c462ce0b10180dc9946654d2176883bed7a9
SHA2564b761fc711ed78678eb101b00f685cb071ed36cc332e2a47687026b5fc8f8333
SHA512a26fb7c1cead27668448ede595b3f6b8d5b452bcca56da7515689f1991aa56723379e211a25fad06d98db439871208e22ced821c88d0be00df66168bb0f9e28e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519b2baff07877264337bf4c0bafa01e7
SHA18176f0bf310fb1eb0142882f9bafdb2aec295d31
SHA25694fc554d5a48be5139b06f8af0c1623d9ccc1ffe9dcfdc06845530250fd77004
SHA5123a5754d0f45f7f64f4a359d2358f9ae37c5f99fa6aca61e7cde08416e3a0608fcc9ed3fdd8ff512263fb6427376d78005edcf21b76796ead1f30f46d6b0263d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a4dca36616468f61b104f9f4f5011f6
SHA1f81646fee5381353ae7c124589bb9dd391d40778
SHA256c883ee0cd8033987662917bb113aaa5e66298500b10533a7c0303bb9d23079d4
SHA512875500d1ac8d99e35c61b5dba25fe97ba687b1d7f1fd4ce061fb875618dc78356a47f91009604391e234f93712a80c682721bdb97fbdbf80b164d6671090e5a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5798c944b09d3f73f3aa686daa4dda1db
SHA155a819ea4d1ad41e8d8daedafac0baa063a6037b
SHA256be162bb0e80c20af5f6d50d16ead8dcc2fa0e45d00bc05f66fa9f85bfdedbeb6
SHA512e9d6d2807116c80b4b86e1dbefa524548016b6635acac89d38435ff7fdcea058447e9f6b638ed0560dd1408a65960401ad0cba8921724dfb8a0ebc12f9f2ad1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d1e546989aea7c0933127681bae98f1
SHA1e9f3354ededc5d19d4a31b40681f9f9920011aab
SHA256b74a6e16978faa0ddf0a16dfa45d5e06ddb7f166235cb746deb8b264fe5f70a8
SHA5124ab7aafdc234ac6dff0846037183d57986af195b501bab8c02156c3fec012071e3023762fb400b14b5aee70b8f6ac1fc854e829ee42a4e14096b4575117cec6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584651676dbf56a77e6290e3a0d083783
SHA182aeaa5360a4e81ede27d4019524da96aa9314a8
SHA25696b15751b9d5c695bd9995b9e9a537c468ed279ca1c4f8a65809b580c913db46
SHA512c5f986a6c036910519fe551ccfadb02e2448090b57d443d687ac42137483f9efcc44cf0c3818e5f5b061e26c20101e3cef56903773abe3e98c2aab1dbb8c534f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563dd9dffdb03ef0d32709426e40f871f
SHA165abf27a4390bf18cf86f1a3515334b33ed6c0b3
SHA256a0ba45caa02e38ee5c69fec421adec94b15c02b917e57c148b811635e5547a2a
SHA512d096ec2a9b30ef8ccbd636f82d2f6c183218fe9a6fbe5528cfc3a99b49cbee8455967c8ef73ab663a7ee47b90250db4c13b62bb625368bd1d6e714b05c94c69a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5890792b9f07e781e058914f7a9c8c124
SHA172932b71a72a9143c3a2ccfaf651f5f25f675c62
SHA256713d654998aa05e1fc23b7f88af9d93b26f7940b702c3b9d5160c9df21b8bc13
SHA512f3d4663c5e21c06dfb1b3deb89c4927a01ce556c414e69d60f6d550e6ef55e5f75074a18850ff82bd9a9ff03c460b50117db73c1bc4fa70600958bbae1c45278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1cdc9729f7e0848d155eb6bd4f96e38
SHA15ed77db9a4ba56bca62426dae39fe4217bcbd0f4
SHA2560090a45cf1164cce1abc518b8c1622bc977b9e65c6b29b365b1df478aa5c2ca8
SHA5128c5693a6cd67222e2851cca2b785c081ee7cf430014d0a94039544235e0d539364d8c7d100acd81fc79b251e85d4790b70f0b355b4455ed8f8561e5c565c31b0
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27