Overview
overview
7Static
static
717e7c53050...0b.apk
android-9-x86
117e7c53050...0b.apk
android-10-x64
117e7c53050...0b.apk
android-11-x64
1.html
windows7-x64
11.html
windows10-2004-x64
110.1.html
windows7-x64
110.1.html
windows10-2004-x64
110.2.html
windows7-x64
110.2.html
windows10-2004-x64
110.3.html
windows7-x64
110.3.html
windows10-2004-x64
110.4.html
windows7-x64
110.4.html
windows10-2004-x64
110.5.html
windows7-x64
110.5.html
windows10-2004-x64
110.6.html
windows7-x64
110.6.html
windows10-2004-x64
110.7.html
windows7-x64
110.7.html
windows10-2004-x64
110.8.html
windows7-x64
110.8.html
windows10-2004-x64
110.9.html
windows7-x64
110.9.html
windows10-2004-x64
110.html
windows7-x64
110.html
windows10-2004-x64
1100.html
windows7-x64
1100.html
windows10-2004-x64
1101.html
windows7-x64
1101.html
windows10-2004-x64
1102.html
windows7-x64
1102.html
windows10-2004-x64
1103.html
windows7-x64
1Analysis
-
max time kernel
135s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
31/08/2023, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
17e7c53050f7ea111b2f4d71b553625679eb185e574c3ef92b690927e5258e0b.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
17e7c53050f7ea111b2f4d71b553625679eb185e574c3ef92b690927e5258e0b.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
17e7c53050f7ea111b2f4d71b553625679eb185e574c3ef92b690927e5258e0b.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
1.html
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
1.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
10.1.html
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
10.1.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
10.2.html
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
10.2.html
Resource
win10v2004-20230831-en
Behavioral task
behavioral10
Sample
10.3.html
Resource
win7-20230712-en
Behavioral task
behavioral11
Sample
10.3.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
10.4.html
Resource
win7-20230712-en
Behavioral task
behavioral13
Sample
10.4.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
10.5.html
Resource
win7-20230712-en
Behavioral task
behavioral15
Sample
10.5.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
10.6.html
Resource
win7-20230712-en
Behavioral task
behavioral17
Sample
10.6.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral18
Sample
10.7.html
Resource
win7-20230712-en
Behavioral task
behavioral19
Sample
10.7.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral20
Sample
10.8.html
Resource
win7-20230712-en
Behavioral task
behavioral21
Sample
10.8.html
Resource
win10v2004-20230831-en
Behavioral task
behavioral22
Sample
10.9.html
Resource
win7-20230712-en
Behavioral task
behavioral23
Sample
10.9.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral24
Sample
10.html
Resource
win7-20230712-en
Behavioral task
behavioral25
Sample
10.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral26
Sample
100.html
Resource
win7-20230712-en
Behavioral task
behavioral27
Sample
100.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral28
Sample
101.html
Resource
win7-20230712-en
Behavioral task
behavioral29
Sample
101.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral30
Sample
102.html
Resource
win7-20230712-en
Behavioral task
behavioral31
Sample
102.html
Resource
win10v2004-20230831-en
Behavioral task
behavioral32
Sample
103.html
Resource
win7-20230712-en
General
-
Target
10.6.html
-
Size
862B
-
MD5
d7485794e7f5ccba1dc99efec50eb290
-
SHA1
59e9b3a2d90fd56f7c059c99aa2fe4b856367886
-
SHA256
20489afc109f7d74b993534c8dc08c4dd75b92f93c8197d7722e7ea14369acca
-
SHA512
b589533bfb76cfeed6d51edfffc58540e69213e97aa8f249a6f22caedee92362047b32a79e0fa55b469b388e0a077a6bd2fbbe1d1632d9a647ff460f0a5488a2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "399681098" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CCA899B1-4849-11EE-91F8-F2F391FB7C16} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 505298a256dcd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000015e49348610e2a42ac63317e6e4271ae000000000200000000001066000000010000200000000741106b5412f8cef943d5102ce692802197f2eddf7b350de027eff1d26f148b000000000e8000000002000020000000a1e4e81bf0bae2714ab5fbd1284143bf3b26171053362e73f1bd24fc57d1b2bc20000000e50b9aee5c577093c182b77f34f6984067e2d1458686a907cef7202627db615540000000eae0a7a396efeeaca5a0f691c009aaee4a7e6fc631d0e21d48870ca9e7aba9dfd382148c0b680fec992de69523f8fdd44f4449c94babece33e2c49326751943e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2372 2668 iexplore.exe 28 PID 2668 wrote to memory of 2372 2668 iexplore.exe 28 PID 2668 wrote to memory of 2372 2668 iexplore.exe 28 PID 2668 wrote to memory of 2372 2668 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\10.6.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532d122b29289b1fe3e43967e1b4ca756
SHA16c605985aeb776769522cdc467b9482304cc744e
SHA256eeb562c7f07c9f2caae865e2157d21c77730f39c7136076f27503c6c3a463783
SHA512c6adfb9665c75b0840cff6f43c0af196e4f432b3f78bb792af1847672d9764c07f04cef7781073fd2c9b905e364801639ef4d131cbbc5568867c14f54660eecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506464d3e1dc0cd1ca0f01037b4e9a53c
SHA18c123ce60a8a135e162e2c189167580ad30377f8
SHA2562ed4c97b5efd80170a565c8390d7e1e689bab0829bacdec4f1735b679d454146
SHA512926b9f226d7659d5ad06846fa9691c4ea847a464a3cb5bcb85d20ac9d273e8327d9baf208e0269a44e70915c02b15d6c709295716a5974e9965a4625b680acc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e21257b60fa8235ca3ff1c47a15f850b
SHA161c93a06fb1720aedaee65203940c49de3384c3f
SHA256953058b602317e90edd7b0f9ad981195d981fc5a2fec2a933f0408ed97b85837
SHA5124f5efc333f2fa4ca33a629aa67a14e5973f22387ab3098ef16f6eec342ea08165c68832dedf7abe2c7d7c8596a50f73d5661e577e53faaec23cce8258981b3f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3b20d5ed0b92e602071116ebfd42802
SHA163f3217b477f99f2f1fc277a03a6e0b8c6f4bcc6
SHA256f82717ac4322c89cc917d6d6c7ba888a60aedc5e67c00d97c0a206cdf2707c0b
SHA5123d5223ff874fc4c139bdcfb36c70823be1fb7f089c8cd939b86f0975b7a3a475195b2aeea244c42fe8ba7971789eb54797d48d56cf1bc0387379dd6c3840cbc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52654ffc5bdf8461c2d72a839353ce5bf
SHA1d2d551f9bce053a333c381a8ecfe66727d9c3691
SHA256adf6242d099a9485dc718b28dca42406f19275100d9b8098fa6e058d21fffdbd
SHA51220a7ec97eac53655c4962bf943d4d980613921e3d99a51969a9e73379732bba4a49bd81efd1645540a5d71fdecc5b91d37a2a48d310fcc6f22f8f11672c5bd9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5121517e2a1b044431dd4ac79d9729a0d
SHA19775dcf86f1d6696ac6bbd6bd25b29efd8bae269
SHA25698760506835077fabffe6157d28155552d7c98dcd0c0129f0e199966fba66394
SHA51229f840f862199408146c21890a3824ec03d57ff8035fd86867a387bee2308737fed8425139df55ab7b8fded8fae2427c5d106228247dfb1f090e4524d8bbb64a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5fefb259d0217321f87f36ae320d6c2
SHA182328c6f7320a2e4adec166e115200073c63fd4a
SHA256c24b0a2b18fb5e0c39bbe59c094e41a66329263451ff27e8dbafb9508e4da46b
SHA5123ab59620f8be00bb6085c6575a6d5361d2fbd5e2ab6a925366236794794a6ef0538616fbf3b868c71b0a4d9afa513349eb7aaaea6463bb606261319467b51834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538c049f6156027befe6c6a221d8fdc0b
SHA12a2c34c1900f00c50414930e6c1ae46cb3b05e30
SHA2567bb9daa07e0e21a54fbf13b0309e61d9e08424a3d5e8bd4672edb0bbf4c893fb
SHA5121591f43505cc5d67230f4eccb69fb35b2f88c5058817fd3c026200aa13ab555d67bb4d30c06e198a1add204fdac74ebc856bc624916d5aff7e230a1006d9b05e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594e29be7e49fee0b0b260702a2bc5733
SHA14cfd99cf8ab9e475e6f5354c67378e55dce5bb97
SHA256f227ac9a2cebf43a401bd2ec325706b6784c6f62df74a92c4810ac93ca0ae9f6
SHA512fb6750460b0ac2e23d4a48c89ccaf60535ecf6ba167449352928c8827605a420170a9d0cf1cc7441dcb604e520d652b0cfe82d6bb9322643d00c9bdddf1d102e
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf