Analysis
-
max time kernel
134s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230712-en -
submitted
29-08-2023 07:37
Static task
static1
Behavioral task
behavioral1
Sample
chrome-update01255.apk
Resource
android-x86-arm-20230824-en
Behavioral task
behavioral2
Sample
chrome-update01255.apk
Resource
android-x64-arm64-20230824-en
Behavioral task
behavioral3
Sample
license.html
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
license.html
Resource
win10v2004-20230703-en
General
-
Target
license.html
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E42F0441-464E-11EE-B49A-CEADDBC12225} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000e8664bdb653864eb3b20ffc0ad3b02100000000020000000000106600000001000020000000e5cc052bad0fee56427e6a557293f71fdfca415a8e47566ed1147632da832c6a000000000e8000000002000020000000d24eab552f2514b48da4842eb085cf83808e9fec38c7d10234b6fcac4175eef7200000001a099eecfac280ab5554c5775b85dc320e713a5d07bfa577b385d27a30d8dd4f40000000242691aaa1f9019f5aebb09b59cc1b926a07e36fef67013dfcd26723fe9f8a3dda344ba833ba69f137555be629bac7ae14de99239ace44153a488b40ff4bf481 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b02415b95bdad901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "399463384" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 1480 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1480 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1480 iexplore.exe 1480 iexplore.exe 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1480 wrote to memory of 1732 1480 iexplore.exe IEXPLORE.EXE PID 1480 wrote to memory of 1732 1480 iexplore.exe IEXPLORE.EXE PID 1480 wrote to memory of 1732 1480 iexplore.exe IEXPLORE.EXE PID 1480 wrote to memory of 1732 1480 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\license.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1480 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7a6f0e42963901da44edecc450a2119
SHA126bd3f48e1e6aa598f9a4137edd7dad04d83027c
SHA2562de675d2d21d1ff428ae1f51e71e711189455f62757444e0c6c3ec7b38aecb61
SHA512db9342ae00b8d9b4ffd6d3e2720390f057a8dbdfc7d914ed2a6a1577ad97119ca0720bde5b5c9ec7f0932fb293a3ead0a32c7345062349c1ef2bf433b1987125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507f22acdfd0c6268c0e4db8836e8b723
SHA109175e7f43423a474664aa605c6cd9ca558837d5
SHA2569442d1291afe0e1aadafb7313554b1937286c6d4fd9cab8964ec642f70600d59
SHA512e057877dd6a4996e859bbf899792478a372607cd0e64c076f88542feb46629c56aa9d7f4561b517bec2d0c1586643498d8c50ac0db41241f1a445be83b5cd24c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583b64ffce214e1249fb3eff86dea8896
SHA14afedadc055aa1725612573a412cbe03e9d21be9
SHA2560ac165795e0148a81d4eba2dfddbb063e608dcf4093124c2a34d591676aa622b
SHA51266b88f95c0d4b15eaee8ad9284b8a82b6daa4e7655b6eff6f3e1be4159e95dd50d43597b4f82449887ddd1864d2ffda9d74848ed3384991bd7ef5dad098d62f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565422c99c7dbace8963b6f1ae43be936
SHA1f6a025822605facd71664c992a40f41fc68aece0
SHA2567ff2ca73b2f093c4581791951a38d4de719e0ab3928ca59027921beeed5d7007
SHA51247090d6e871a2dbfdafc1199e6410b24c0aa8a2fc4bda2c024b400b56a194df2d6dddfbf39f02d9dd40025a40d81298947122e0da752d971f3be48fa4a7b53f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df6dc7b223b36adc7ab4191d9087900b
SHA18b2b5fb8954ca8aaaf24d0df59640fc2e8a466ce
SHA256dda19b49b246e0df54bc4054aab01168a89812118e41ab71db785f0f41ade091
SHA5121980792664d7b5188efb08edea2d98e043fedd6f8d306c384cf57e50af4829a1f037b10dfead69a75a644b1e1a78905b255d6d998cb67b3b0ee8a64b0425f1ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54454bcd13a9d004fade62508c4dcf979
SHA1d5b1a98b9856f03bd0b75fc81661cb4c246cc306
SHA256e30ac54e0952218b00b83ab899ebdb84930ece8c86093be3792ceba221900c95
SHA5123662b158d0a4482513848e28d4bf411fc5d54bb563f294a12f279f4fff72596406cb11011a6d55918eb17840571c140ea082d1d5111b735c43383f40778cd526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa0d6bf2b246637330c8cb63a4fc2824
SHA1da7f390cf93c3bdff815a622de814670b616f731
SHA2560bcc9c5229ec1dd38d8f144e68497f7a560235fa3001942e8984340c034bceb7
SHA51225ff5fda6c400233fbfa9f39e4e386df2f2b2e813f4adc2eef46b74f28d99ffe4244594fe4738026c8f3bf3bc171b06e7023609c486de898057bfaee44b7d6f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd2c758ff91f69c3300a99f960dfa663
SHA114ec88eeba8be72ad8f106d7c891054db6288b35
SHA25615ade30349e124228193e31e7cd42e62f180259781d313ac2162c0e96d924129
SHA512b975b95fdf56165778fa50a19abbb070467a8e7a8cdea48d9ee732075acbd8ba96128ab7169d3264ca044c57f4a8ba684e231489e40ecf41c96af702e2bd0bb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59258aa52f4456336ba87fddc0a9f63f0
SHA1ee9a61c3fb427da3fb8ddf317b42cf22e474c7ba
SHA256f21fd34907d0a402332d5497c6c80852c0b45649c891e54a83f5343236dd8ae7
SHA51277fd74391729f444d80540db87a4ed838a27c1ebb05f16af2fa00ea76f600e62f15c6d4c0aefa22348d5bb6bb6241f0d8d847bfdd347a2d0a962a3b851b13f92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a03d43627312fe98abf5b173f2c865e9
SHA12f672ab3e78a23aa2ecd38bc26dabd9cf927cf42
SHA256e3b30a16b8fc8e28c74c20a58cb0affccc27c4b0289b2a4fa922a503c112b396
SHA512523aac6544d4aca0e7408617b97f657e97e96890eeb381b2341ac7ddf2e02e4ae7cba1fb8b562d5f34b956f7b2db5f97e653365290b58224bb9ec4ed5956fd4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfc853187aca8288546d1c4b736f3fbb
SHA19b35f564bce46e30476da443abf13507b5cb7ef6
SHA2566177251b269db8bd56299c41920ab8caf34a55e36fdd6731d28f95e709ba36ff
SHA5121aae21d6cfece4e62fe73ebf2d0767837d800abc6fc683fb46a6ee83cdaadf27e7d269966dbf4675cd6d7a1a249d62b51f938d60680501978eef4c1c251b2006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5170964a95c15f6f727c57da232123a30
SHA10af9471606f1e80c3207a4f83e5bb154aaed11a2
SHA256dcc8790b8d3f57e60b3f1fc89cf926c07d2a90dad55f3e3a886e33fb329e22d5
SHA512d7c15e31abe04a33874f79c83c02b3fb098aca2f9c97e80e6d88fb38540bf9ce3ce1bd6763997770c7bee2cb7e383e0a26efb656f966c8b3a6e4a03a92c01488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c1cb9972885e54a8bdf409e2cf71106
SHA1c042bcf7836b88794866e7a9644adbcf318f0707
SHA256b6afa75caf2a2d62952113eda6266da26478f08507fa2fd1eeff6fe0da27f262
SHA5122b3594b2555b60ca98de6a4c301599193a03e66075a99091bf355dc4378a44f5523211a500c2380fea424b4c14090adcf24f37398a8ec03061190f69fce4f157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5761d6e775b92e5e440e2f3acb7616744
SHA1aae638b7e1772c34ac5405cac619dcb7f9b5b940
SHA2565757b96a205e0e0e097ed1533bb34efb3ee216bc8ca016c203563a51573b05a6
SHA512640d175f31858249b7987e0306eff59054a744891c0a17ac7f414c4103a2ffce3607816c2f35ec9d9c08e2e874d7407cd7dcfcdbc6c5c035fa935224d6f013c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9b2ea737eeef6c1145ddd3fb99df2ac
SHA17d0c8d0c694ffdf250993c2ab28c8429112560b5
SHA2567b24f1eca9c72f51a4ff5d6a0a0eedcfadc2038bb26a4ba2da31369f3b02f4fd
SHA5125069ed4581059cce7a85cd6901495240fc2e1a94bc030f269613f3c4cdb3ab252035c32575265faff5fe8c6d184b411f0a968efa41ad41a6a0cc955266ad6a21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cec05f876b5cb69a2ceaab5b26f9fbe4
SHA1a717cf9380d498ed6a5f76a3ad714bcd1893e099
SHA2562efaec5d93e27d3e056623bcbbfdce09ce492de261398948a9988cd11203a31b
SHA51255158de170e7d162261235542cdc47e61feeecc0cb3c8e3d9b07ec56f8a4e4ff8399a09a3efcc9b52bda85e2e3ba84d3906dd7224d8283ab40512e866568aeb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2ed95fe9439bfbe0936a4392f7f220e
SHA1f3b051a5611d0157c2485c6b6b68b6362ffc788f
SHA2562f80779eb30f3ce0ccb74ad173c35c4f7d70d9f3123e745d3500d7f0eeae754d
SHA512513a19d0214adbc82c5f35162587c866b8d23c2a7fee2e8a18d274ad743838000cf4df8354ebf5dfbb47cfd058af8b3b7d86b5187cf6cfe66453dcd4db5228e1
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf