Analysis
-
max time kernel
139s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230712-en -
submitted
28-08-2023 22:00
Static task
static1
Behavioral task
behavioral1
Sample
4662160d5be3dd7b23547e04cd3cde493270181b00c5753a96f4fa7223e79572.apk
Resource
android-x86-arm-20230824-en
Behavioral task
behavioral2
Sample
4662160d5be3dd7b23547e04cd3cde493270181b00c5753a96f4fa7223e79572.apk
Resource
android-x64-20230824-en
Behavioral task
behavioral3
Sample
license.html
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
license.html
Resource
win10v2004-20230703-en
General
-
Target
license.html
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d039c54dfbd9d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{78CC25D1-45EE-11EE-8B12-EA84BFBCA582} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "399421974" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005a31a35914bcf84cb1db54e391e8cdcb0000000002000000000010660000000100002000000094a01e60c86cc74a30e8904daa9f4e0e1e875e4867c69dbb6212b2f9a3f75df5000000000e800000000200002000000064e05d6881856fcb85d1bdb3dfb0086b58195e17cbd1f9906a53044c6598d7ee20000000e1f48f2b01b855a118e3753cb7fab03c9c21f2959d9a47ba3f98c5ba2780fbce400000006db62de4dcc930b4e5b356a0e7dc5ce4f734c43605a8d71f5c3c2e2208ac75269ed4782ae9ff4ab5208e92e9a17603a9d49dc4dbc25f7d0f4b77b5b1c651cc73 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 2084 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2084 iexplore.exe 2084 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2084 wrote to memory of 2392 2084 iexplore.exe IEXPLORE.EXE PID 2084 wrote to memory of 2392 2084 iexplore.exe IEXPLORE.EXE PID 2084 wrote to memory of 2392 2084 iexplore.exe IEXPLORE.EXE PID 2084 wrote to memory of 2392 2084 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\license.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5644f558421f2faf7c0cc48c179f4482b
SHA1001e60b8aff07e1ed8f69ba2c15208aaac824234
SHA2568be5e9935bf943d2a1e27f0b574ebecb559273fa62f1b080ba9d3161de1120e1
SHA51262a6b51e6f71924402fe622fe0eb297652c183e8e5d6f4ee165571bf3ea3c2d4e0e11f7e519ec2c92012022d3eb7012d252c512e6b91e755981574187a0b2677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a75f044b518be1799cba41507fbc173
SHA1f79db1a952cb2e0ebb5df18ad61622368c9e835d
SHA256f491876dbc1cdab2cd2fef98224d5d6b6d4b5ec111605d72a1de588637c95a10
SHA5120fb6bb8deda333362a1604a1fffaa9d0bf903b5e9b510051020162457c73d84b26f490dcd958c5d9f1eae43fef531e7aeefd0221d0ee01f1879a361b3f8a5667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596d1ec6884bba4a4f38dc5a85ec6de08
SHA1ae820a977e4f24282e71016b2e7f2766d779a6c5
SHA25674b05c494ff82ef969b8f35b121a9ecfad798907454e93bfbedc73fa2d175c36
SHA5127a27935efe381db10e4d2982dd7de1bc226dbac92892a937e167b2d5c9cfe392c42149cfd9f100ab7e131b652c476e8f709f51f8c430240179547c2b73f93fda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588207fcf834dd47c3f749bd822ff2944
SHA1ac073a4d9fbaaea8871ebe6446306c18e357b3a3
SHA256d53084f5fefba8500727990ffb21de1c1768651bda2c25441e0c51e736253a70
SHA5127c91af7e8af46b89c76580d50c1546c7d716260dc97ade11a9ccfd0e3f90f6fbe6709af25e3e4981ab4f5d96265e1f8244f2d9765abb2f73e654a8d51b07e998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dcf6ad8f28718d79f062c770c7373b9
SHA1f88ece79c22d8599f60f13c4c51f02e6629834bd
SHA256eb0dbca45708d709d076ab851c91233210ce061a4347b8ba0e47069d032d0aa2
SHA512bebb07bab8c4545017843e8f7214cf1babb55405ace34e01924abf52ea08ee2d407a70069a10cdb79735ca7b33f30f2447b0860070779efa759913591f0c0906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd72d1487026133fa221fecfd3f192c7
SHA165069bc698e1ea7939d611889d01065731a6314c
SHA256104fbaadb0e5a03c95131ee56cd060ac870f885c59ff70f045ca269a325f1679
SHA5126c015dd90ef891cef0066f217405d260d0e70fb58c8c7080a6d633e8f25f6b13c412167d613929dab95f84ba45db3119cea967cb27445c7f8a7cf8cb52fcb918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f38095b0be40324b6f949039ff31389e
SHA109219fad8f1b6bca813a572e78fdd2c7d1624e83
SHA2560fd9b56f99afb42f1145d53337db3160b4bed10cd8a3ec18849936751e8ecddb
SHA51223d585f5ab243b63a50854d0339c83510c7e5fe963da2d7d367e1fd9ead74a9d776a8ed02af77378037fe3e87d72f15bd80ceaa5a91f75e1606c473421643e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e38b45f3eac06ec6ab140994ea1c6196
SHA1e46d3e39421928946ac3ed8beae8b86745fea448
SHA25658d1a95bc290704f5f60047a4608acee65af059e1cec607ba0722181cf41f202
SHA5128eca5a4db8194759d008f4e26a00d1940ae8645659cb70421aa564e533a7fb9d00aa8eb534711d997529995e595dbeae0bc57b25e68bf353e7565ca2b2480ec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f20538b89c3fce5f03b926bb6807eb3
SHA1a8ee17a13514285d1995633235cc22e528a69164
SHA2565a8673bd4d6d9774daa142067b5f88f19f09521f4efdf08e01c296c6220e284a
SHA512ae6c3878c9cf97e466e729bbf67e5aea9be624b18bde2367c1d66906cdd2c295e3730b205b6b228b0d85196dfd0becec143de8b0f82129f3c1328f71e8242669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5804aa3330e58ab55c887a40fc757856b
SHA1aa8ea51b75b3cceba7a96ddc58979de56306971e
SHA256f6b80e045fae9b239e0d8a7e4cc8004982a9f7656cd2161718e45902fefd56cd
SHA5120cd0afd7f436d76107224f38841b33b65cb0ccd0c55bf4fec77279c5a2f53b6f227988c670e90754cb5b11007ec7c132847061274e6d6743ef2d566c6c16f63d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519215c4c294d01ece1ed9e214a397d88
SHA1338fbf9a72cc7c71a726e99398988df0f50c6988
SHA256ee0ce76f92fc38e6703128a2c5a1f49a59ea4ee1ab30774e55e54a87849138a5
SHA51225a131537389db051067dca2e81425f9c3bf78fbbd589a0235c82e6f3fd23a07053f530766cec58ceda6e24521f1ad010a47dd6acfa70847b15b9ae6182c3ab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584be0b7e4625dfe0b7810cbe0ee94647
SHA160cf1d81bb1f92161a5b523edaac06d441d59fcd
SHA256b4601a6e02bf68f5b846a835b3edd9266b73227af52d39009db8ac8bc1e3585d
SHA512d24bda6234adfa5546746c9fc51b0f63dd369d63397192fa90ba9f494969f2ac91f52edf7870c867578d6eedde817e92208ae76d49e5265f1cf9bdce138aeada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b9e301a668809d3da90dd145074cde0
SHA1437e83866fb4478a13f9c3bf196e47a654ced42c
SHA256fa2c0f396fcba01ce14f00a9bb7ae95e66e577b27ddb0dd6c125d2bfe6bb0324
SHA512a671f0e671bea09d7f50ec0c982a6c2bcc79e76926ec75a58190e5e78778c5f134849094bbe624aae85cbbaf8ca250e29af93feb6500a3deac2dc10179031e7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598d53479a2c1a851ddd9518a9b52d123
SHA162fa7425026dea38efba66889a6cbdde187575f0
SHA256d6487e197f1e83166ba97d9cc7afb14417c22537684ed3050c63c75a867f723f
SHA51220dfa835fe5f9a612ec26793e0a9cc7f542bf9e944ad7b16496ba0cd00196b254beddc4562b6083f04de1f6737db2e53a9a809e6577c430347c95c1008c0a44e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5035e0e0583466a813abc4fc8aef2921a
SHA1c7c197d39cc63230be2e93df86507ad1259ebd25
SHA256c055b8a96b5b0b3602e31fdab1e7c96f97d47f4a2b7d571754f5f90f1e32a786
SHA5124fcda333575d1906122ffc73f95722edb21436e0507361cdab274903a222679d7d4692d5310a2ea6d741a9607b182659e95ce1641dd3386c17ddbf245e43ed58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5377328ce3c01a42f5bede0cff84b91ed
SHA12524bd92b9c32b6cdf63e4283f9a7f40dfd48019
SHA2568a13a16571da48372dfc87e47dfb07fca1ed55190e395097a935b7e18fe00b19
SHA5123b9bbabd438fcd949b67f7c4813b669fd24662da22d93ac92d70a3cc297fee7c2d32462913828bba645f1fe8e7c0786cb61df1bbf98244ea2228e669b47a4091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5861b75159becd3f2fc7a0663c87b27
SHA143732be5eeabef9ba428d9bfa73bf181cb430cc3
SHA25636d9bddc1906de6eb4ce18978c0565a9c045b7dae84f91ee44ad4e0cc9a7066c
SHA512983ee3ba3e19d864920d642a736f148f0f9104cb113fc5a19e2c39dec422da04bd46898fc77f2609b45db719965e04967982c4736b55720d5735b02597350d1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51445c112a10ed226e60772fe14b0f411
SHA1c151c3759de09906e281660f3390a1784a57e8f2
SHA256875b5493a3bfeb205fc93e7edff58363d839a6bc821b8753cae222211b529013
SHA512e8621cac1e222859829b6f4582fc55765c9fdb7b58841e5a2bdc40c86edaf52914c1aa8dc804154595d8d078e5e6c2becdba17ce898cb7b23c3e6fc71b505189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea2a50daeb6adfec73bd72dc98779dcd
SHA1513ca0acd1977d11f35d1a7e85f37d68917575df
SHA2566ba740665c9480d49542708060df38deefe10bcf4675e6519e69437c137e4633
SHA512cdefa198ffff2b60e0801d2bb851b73454458d7cb6c6d805e0beda30851197c1cba80c5ab79ac1ef3c8af4f8e6127a8f851911b15856e693a903462a40464479
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf