Overview
overview
10Static
static
7e15e150aec...20.apk
android-9-x86
10e15e150aec...20.apk
android-10-x64
10e15e150aec...20.apk
android-11-x64
10closebutton.html
windows7-x64
1closebutton.html
windows10-2004-x64
1core_wrapper.js
windows7-x64
1core_wrapper.js
windows10-2004-x64
1lynx_core.js
windows7-x64
1lynx_core.js
windows10-2004-x64
1nd
ubuntu-18.04-amd64
slardar_bridge.js
windows7-x64
1slardar_bridge.js
windows10-2004-x64
1slardar_sdk.js
windows7-x64
1slardar_sdk.js
windows10-2004-x64
1template.js
windows7-x64
1template.js
windows10-2004-x64
1Analysis
-
max time kernel
135s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
26-08-2023 22:05
Static task
static1
Behavioral task
behavioral1
Sample
e15e150aecbdac58bf9a81fb23c6f22e4a07c4541064fdbfdcff5c9b6d28ba20.apk
Resource
android-x86-arm-20230824-en
Behavioral task
behavioral2
Sample
e15e150aecbdac58bf9a81fb23c6f22e4a07c4541064fdbfdcff5c9b6d28ba20.apk
Resource
android-x64-20230824-en
Behavioral task
behavioral3
Sample
e15e150aecbdac58bf9a81fb23c6f22e4a07c4541064fdbfdcff5c9b6d28ba20.apk
Resource
android-x64-arm64-20230824-en
Behavioral task
behavioral4
Sample
closebutton.html
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
closebutton.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
core_wrapper.js
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
core_wrapper.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
lynx_core.js
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
lynx_core.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
nd
Resource
ubuntu1804-amd64-20230712-en
Behavioral task
behavioral11
Sample
slardar_bridge.js
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
slardar_bridge.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
slardar_sdk.js
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
slardar_sdk.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral15
Sample
template.js
Resource
win7-20230712-en
Behavioral task
behavioral16
Sample
template.js
Resource
win10v2004-20230703-en
General
-
Target
closebutton.html
-
Size
981B
-
MD5
c8efa039f4f84b2705a8e3a3b31da61c
-
SHA1
669749429feda1599c4ee980cfd67fbb1a54c1a4
-
SHA256
494693c2ac56ecac1a2588c25631e1bf71211fb0f06108649a983c879315b1aa
-
SHA512
db6c9817469c937a41eedbbbdaeb21a0860fa5228258978fe59d29c75ab1497b8d1a0ceaae2b236206d6935e186deaf0d83a73791658fa68a985dfc5c314aed2
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E07EB3C1-445C-11EE-9806-F2F391FB7C16} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70ba2fb569d8d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000e8664bdb653864eb3b20ffc0ad3b02100000000020000000000106600000001000020000000469bf8393d1eb11bcd9d83ba83fcb6ad9d9bdd1da467d33452db79ec3c5b56ca000000000e80000000020000200000000d69c36627987f131e588aed82bdd87dfd38df8978cf7c59b3a639e39edfd6ac2000000018631a552d1a0aa37080a06dfd25701a5c0d5189a44a3faccd31410cf5d2b0fe4000000047599e2b12724ae39dfd186c8f37ecfc5f5a1eb141581a207d48a0068b5a1803542675f1db4e967b897d50bd6ffe5044bfacc63f6409dce2147c990923e424d0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "399249487" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 2196 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2196 iexplore.exe 2196 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2196 wrote to memory of 2180 2196 iexplore.exe IEXPLORE.EXE PID 2196 wrote to memory of 2180 2196 iexplore.exe IEXPLORE.EXE PID 2196 wrote to memory of 2180 2196 iexplore.exe IEXPLORE.EXE PID 2196 wrote to memory of 2180 2196 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\closebutton.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aeda13259397095bf89748a8a37e3046
SHA1263c88bed7306de14306a336bc0524846520367b
SHA2561d646dd52576718b4869237a4651baa5d0f90326cb3d9332d48e23b41537cc2b
SHA5124d15cb78fbd441375e84ea84dc560c7f9fa0e1f2e2181bbbbaa46138dd2fdac92ee1696809ea1ff56ea876d0888d637b4d2e98d298731bdb025902cc482243bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e7602c90ce31d4984e5de707b9c17b56
SHA18aca2ea38375f4b611a491a5b9ea9bbe3507b5d3
SHA25601b7cadadcbc36c1572b8f509f0ea4dd4a9f9f7713b8111b1b8935f3ede2eea0
SHA51270b85a5b82292a6c013b4dc57a2836ed09d80e74207d54325a38307f24bb95cce8625d95ad7eaaaa6ddfaef4dfebf98dbf5cbc78b3532c11ad2d8b7a6844ae3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55403274ea6244c7772c591ce6a50c622
SHA14c891336d896acd36062fb7b63e3816fb0c6100e
SHA256f376d800fd2d31f52836b23fbaaed4e5ea4ee01ad62540cfdbd0536f746fa231
SHA512e4cfa7bb57cbb32ed3bf4f27780c24c23794e068d37a711c182f03c0692e0a349bc8b8c1a52ef6979226f1689f9c89b3c041784382643b5591cafa94837ce280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b84e94b5b8c0f2a978ca404da5ebb380
SHA1a5180c1eeae8f8e224c054f4c0f7ee3fc46c9959
SHA2560ae6b41d723b0f8b72841f041da92cea32811a51e9becad21931e5c51b75f9c8
SHA512c8744e7cc4270bec93237cb2323a59f7b12fc78f8f9bfb4ff26db16592cdd56ed3a58f92af21ee6e90da24376da0f1caa9b30c95a7b9ecbe8572a3700b294bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56a050b926edba0964bb8eefa2b16aaa0
SHA1b1a470c03023dea65f7ff9f4da56c145895e4a1b
SHA256a36501e60e99e9ce8f03c826d22e0ce209efffe3d03e9e57a49cd0eff987dda4
SHA51252095e7b6ca0e0e233c613e6ee0d7b1cf9f1f0ce99f29c37f80269d6e3d23801e97fdc3e6233b91ce00c206fdf6da052315d2488f8370578ff4bda24891237d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55d894c3b1c36e6fe143a33f7934e6fc2
SHA1510a11a3e24c77c1618293ee9d93d08f173aee75
SHA256c824f50ce832c11d06604742aa290e9a8ddc356c9d7b5ba190c1954bbe844a32
SHA512df8982c347d23d7296322d9a10484972022206a901cfa7f321342a1c1ccf359f34aa82612055eeb9704970c85adbdc031ab7a2352a789c8ec4e467b8b877c196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5da83fe4f9ebe06fc62f81d68e1e6bb1d
SHA1e1b1ac8829a0272fe4c4694fe3c991617fd5788b
SHA2567a0ed4f96326c508bc0533759bcbec626bb81c5277845704c4645a9742b8292e
SHA512a9cc605dac3e068270760eee886f8e0b7519fbaa1dcecff6be09eb6d9616e20ebca8e290d4bf9be1c077e2048cda5019d2639b6d77843e115252450b1ccbeff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55489c0a05f82661990fc13d886b76df8
SHA18fe2d9f14dd7808cfd1c618ac232e770d263b6fe
SHA256ee848a9bfb49289a7b62c42bb0b6258e0854dbc94a6708b22575b27212a0b97a
SHA5123d0fa969dd9a0db55fa8326eccaceb1a21e0e300057cedddbeb3e42451b5d4250903cc5c126d0f554162aa1df0944f932eb53ca08ae14a5c3bb4bd1ca295a812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cb88c0281ee624a5ad1a4f29ebc07ce4
SHA11f3d3c6b4e60a9429ac9a7670684c2c37bceca84
SHA256bb52fca196eb5186e98f6f99a5413843f7a342aabc0bc6ea0c77757ec54386bc
SHA512be75bd0cfd963fd40c8bc9ce6ecb29fe2442061af0626d7e46bee6df07bc50c87a6434be4b6d37dc7ce143b71b5b5f390e4ada245f816098326d0a038a1debe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cf673cbce2723457086afde8f92c6c92
SHA1393aa469123e365e72e114bdca573503c0d74a98
SHA25600b5a28a496baa9a0ff30db535b97b688bfbef2e59181067576ac1bb7d46395f
SHA51286d62ff10477dd3e2e6d68a6d35956f744525d8d8926b6a4ff439da12cc99e6e412c11f3731512d23cb0e22adea4c78a898c89876bd36e7f1ba3de5af360b2e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b3dc444b36130f29e94a288bd8987343
SHA179329a9eef559b4540f019dae6dbbdf2db17d06f
SHA2565433debf78557783f34beee0a8ebd4ed37c1f767d5081cb135b30d32a204d5ce
SHA512d8c34bd16e4f28b0aff06ef3a56533a75f4e1769bf5593a980c056f221bde717ca382a32b3bc268dea9c87e2786283cd350522a6ec84948bf049ab8648eddf18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD562565d88a09d4d92779e23df7e83b819
SHA1bbac8ad88482ef85b6869f7f9f9ac64116ae0d3a
SHA2563119459381ba142f1c6d0b42f7258cc7f698a17b2e4603785d3c706ffecaf38e
SHA512cb0bd3c880c7d133c381d283a2ea6433bf8a9d7d309d44244de8d1d555cfe4e0ae896e98eeba717e77afb7e422396dfd36f5bd01b87d8a0c1f81922e92885129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a14c4441c04488ea4b5f043b3f0b4815
SHA16ebc281342f69bf69069297fac515e7a6d37486b
SHA256866d0c58a0cd454ccd0f27b363fdfa91512d5e04a93f88e43fe2aeccf230cd25
SHA51250f2e0ea371767a35930d8f3063c296f0f934f390378a58e0202292e51cbbfe2dedad1fe6681120ff8cca697c15d1945b2699ce68db39ed9237dd82d451fe695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f3718a423610a0f449003cf59ae44d76
SHA141214abd0180de73cf1fb126226eda86be240447
SHA2567dcb21f4d31dc94020f7dbed778f2c835296f2286c39ffb24efb62a79716865f
SHA512a2fa0ca4dacadbfd583b7c22d8bb038a0c2e3dec0ceadb3665364bb711d660ebd0f3a4955968438c2d1164217fc52557a034edcc7f54b91fe6739d1b6904b083
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf