Analysis
-
max time kernel
134s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
04-09-2023 19:07
Static task
static1
Behavioral task
behavioral1
Sample
3dd3a843e1f714b3a6ec6dbdc4307ad52060b06a9fa8344a3826f3c3f067fad4_JC.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
3dd3a843e1f714b3a6ec6dbdc4307ad52060b06a9fa8344a3826f3c3f067fad4_JC.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
3dd3a843e1f714b3a6ec6dbdc4307ad52060b06a9fa8344a3826f3c3f067fad4_JC.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
privacy_en.html
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
privacy_en.html
Resource
win10v2004-20230831-en
General
-
Target
privacy_en.html
-
Size
21KB
-
MD5
a13ecec2c8d84d1a6a37f9241f7ae40d
-
SHA1
2dc04ba7f2543c55fd8a7222a6b8a93f3f66743e
-
SHA256
9b12d5c238f44ff41c19d2ac2281968ee2f1945033a7c426f0d4d69e7af2da47
-
SHA512
c66782304d0738629ec2183d93ef26f84f91bcefb42faea391801dbf79f06f4f754a4d1787b2959d0fb4761540f1e9b6877128253c24fce0af92d77e1912f9b8
-
SSDEEP
384:FFwFwFVFd6wTWgHu8QuFj1Zohr2FACs8Qn3nogUovwghdKP3k3DxJ60uQ:FFwFwFVF1TD1Oh2U5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103c261a63dfd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "400016309" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f908080c5c8cf442941c5db076e34ac2000000000200000000001066000000010000200000006eb22d7ba41c9eb2468b3044a73ffa6eb2b678e8de05cdb78559328127dda6de000000000e8000000002000020000000e623fbc8e76de81304fc3dfb786cd812f1f8d50549f37c7eab8ef1087a2e8f4320000000c1931b105c8ea3dc55faef1ce12128068b1448f283e49a6df047f8d493a0e36f40000000b80abe5b0434578671f8bf0497dce787ae56fdf208da155e69984d13fa48df5b7bc37fc92b251eb385fa77d5c5028e3cf712b804e35bc79e60bc1ef59a4c8151 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f908080c5c8cf442941c5db076e34ac200000000020000000000106600000001000020000000a021c2999cd17416bccde5efdd70a87279647ea38a2b1a475a8fbc2aa3f011de000000000e8000000002000020000000194c7cc6df0f6a90982d1549a4e656b9167fd565d81bacb22056c4767fa988a4900000004177b5a5a9241d73b4db1c827b1db1b74e1e75daf4cda9c55236be81fc02ff4534581057ff361a01ba1e9717eb04932d632eff7162b1cb1e1f332f78a138a3cd3c876189eb38280b7c99986ddab257e30252c737afe174aa14dce3bb632ad004bebe89e0d7a507479a210756d54706341b13132c287a5a31f4f774712c0008754c2b35a79ac1350d1f241d24d9241f3040000000bb6f576e02998094bd2a03481d809d478ef06ddf30feb9d3f40717a200516816ed15f566ad5c263349f0e3188505bcc0e5c9dd63a396917cfcc1f78071034d2d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{44F89AF1-4B56-11EE-9745-4249527DEDD7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2908 2792 iexplore.exe 28 PID 2792 wrote to memory of 2908 2792 iexplore.exe 28 PID 2792 wrote to memory of 2908 2792 iexplore.exe 28 PID 2792 wrote to memory of 2908 2792 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\privacy_en.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510c71fe871f02e4cee37a7ff0fefa671
SHA16b80f981c70381699087acd216c5ab5c8363e631
SHA2560701d7d241817fd45449d10ba1111aea3500f38a6a2818a19da7894cab858832
SHA51288fa54abf3bc04a3d47497a2178011d2441862e07bbf1e69449f53043c154d6a1012260c4eb72914460e5614ccea2195a00760b3694a0e9ab9fb0dcd126e86f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510187c6a43d7539dcc21be893523aa7d
SHA1b3e1b640bca9f9b383ddea6fa556d0fe44268a73
SHA25656296bb4369bbb45e23fa4c3d8c6c140f9ccddbcb71a9cef5d735f8ccc9abe86
SHA512fe1ec0051e8cddc757af7e0845cfc1025aad84da6d59fdce2fcb0d57b8463ada3c12c156a2457de0322fe87de4dfb0a9b0ece298fcf3068b9a2940b69a052b04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579315364dc281a6e3677216c9d863c2b
SHA121fcbead73dc03e284483fd5a6270e1465ff0faa
SHA256901150a8b1e4fef2ecc47213833bfb4fda8625eb3397c2b7eed82cdc75db286f
SHA512e15452c3e629237094476dbd73dfdaf107a35aeb1f90f3f26b4b3141d425da5478aefccee7bd75f28a40242c8f3dd35f3226d36f2e800edf0a3ef86032b1d641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5151ee272a23eafb063d422d059bada8e
SHA16145aa9decf54741368e43215ce9cd36126857b0
SHA2565494742ec9a7b8a5d5aee1de4e2bd44231f8ca7f129714d0ddba7e50174b554f
SHA5124ef98b151490522b541ea92d222740b501f220732ec77880296aff7ce8ef0ddfaaaff9cda0c2fe56f0adf240f1d4fff7bf8b61e92b3630e8632e4a127d2f5cad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5d990bd44aef50de9a5d3c6d907b327
SHA1cf75d934e89b2646824ce781f91356a7b6530938
SHA256c835c21a02a3ad182d338fde82a70e69343fea347eb933a2c0a44e7bcefb7a32
SHA512f9969c2efc4a39fd83ed393037f0e77ade9f3a1e4df65c42834a278571f17b29d5413085d5905f7f5e53ee8837b60482483a34c74e05a42f3e74333fc9a38d67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5704913dde3dcf7c10684827537548f19
SHA1b6cd97eb04bcf98784a14738925ee14ef0ea30ce
SHA2567d8f8f6031cd520d2b1584c0cb040501a355c84dd847719eb81d28e6c5095be8
SHA5127e0ed9c25830c4b53924435641edae7e8c28150ff7cc24fe4f5022286ebc7e53e11363ada361d0232335afdbd760f3eab795ff98c7852f1318b05867ddf6bd50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0c5c85630b8cee2aeb67827ce24fb08
SHA1710e26d65f1b58548abb514d18cf5e548f9d95a1
SHA25695b3b0fbb40bafe56b020c049da45e7ef2593b628c326f6f1d83f3a973b2615e
SHA5126062682a6a2a0341e5a2b96792edd21679f30ab17411ad6f37b2b9a8cee50915e3ca38789efc1ed9dd8aa91ac901dd995a75330ef639ba7b4fc90bdc3bffbac8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e02b28387190b96df1f580fee9f941a
SHA1c858dc8c19e3343f576294dd9ff595c45dedf00a
SHA256fd54598eade968643d36309ccddcc4eadad7b85f52df1a4f79f3dcb4392779ea
SHA512e769419e382f0471ebd0bc2ae94e1b0ba391294519171f2f11a4f5364cff34eca56348bb5f38f53b10938869254ad4d6fc36c975a6ea0f400cc5d87196bf359a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b769204689d1382ebae5012606b47360
SHA1834cbd22673397fa72f8f131ca563ae7f60e84e3
SHA256551ff9b3d3eacfd48f87407d026a69a43b86fd3a487dd9422656eb75d5536381
SHA51262d122905ef2a60a0aacd410c39369bbf5a240ad15133686a216261839182f31e4c6101bf6ef2e300b607dad9d4f095050a87456d634f4c0081598bb6a632b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5603cc2e55e75dc213e49deeed7807641
SHA1ed13270338345831ea59f1502df80e7f29c66833
SHA256225fb33e6a00af23ad0ba5b516486cd13b0d99e277a4aaa90a3cc04709a28f2c
SHA5124e812ff791f5ee44efcbaabe50b45913976cfb3efe6a8ae3e606feba81e748434fddb27898218393d674f3fbf8a8c6e84fa7f60831ae8cb271a464c5fec11b93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c27732d4914e0af4d4641f7cd5efed68
SHA14cbb42d1e2c5f659310d3475e7ec154487dc855a
SHA256d8be7832b5215b4e23646461299a09b5e296a51782761046136cf1fdd07d81ce
SHA512a988425e201d427f9f11944de390348d86d6023ff8eb1717b922458ede708bafa63d1c0095e7dbe5539129d22ba58d07d22541143cf80bcad4990d1ada2af4c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a396e05007f383687c183ef2c3f4579f
SHA120af915f40ff048776858cc492a96336ed0176b3
SHA256fff286464513b2277d50106b350ba4ca2c08423496ea33a90a8dd8af10f85843
SHA512bbffbc738e12685882942ab9c72e21aedf734899feea796cb75d6c05f4f871b2269150159769359c93ef23b4f4e2276d95e3cf6814b623c21f1860683dc34dba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518cdc8836a78499165518967d5f79552
SHA12da95cbf2434643cd8084c6c9d434d733b80ac4e
SHA256b3911f915d8074278964b1154ac79fc195d6b3e0c5a9b47d652d3d5d58b4a214
SHA5120f217d01e76a89e1b0e204629e26b881ae93041e3628111deb870e849a00e8958675357310f7af1ca048d724e617f06079b07ce239c4ea76dacecc8dad6c3135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50836d95e2ba4e18c406bcf810c6d708b
SHA171f86c239585fd3adace23d03df3da15d13294b8
SHA25636e6a42693a5a1b0fc0b57280a75640cab980bffef9e30afd04a397d2b35ddd1
SHA5127dbdda9963e280959efbe910215e1708ea1ea8b8b13261277eff715ffadd757f80344e71b1e035619043d56aee16bf73b718840ea1007f226fcf1684f3b7bfa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f0866f26f586d3688d190916f7f48b1
SHA108dd88081e526a46d62e27e720e2e9f874eb1ee2
SHA256417759f9fd86c9de186501a286209a21133a6d335c3bcf5d88952749da281ee0
SHA512e278d8cfb4c0fd64b93c2b0ce4a8d0917b8ee831b00551b9731930d446c22218c98e736c3870fd6484fc748a87af2320eab195bd829769d1701062a6cb8ff107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f6aad742d58239e8c54205a02ee4af4
SHA128988911b753b010d85a831e4e5f1e2efeefe2aa
SHA25603f79e713dd78bf374ee6a20a95b47b6080cd1754da8b02e1e2e6f5e289c2f18
SHA512fd506dededfb51e466050551e557b984e2db7c900c80e78c91d19822d1e89e506efa7b6dec884b93c02d8d1988c61ed7700816041a749dd3ba95abc0eed54b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569f8a85f1d8064a14c44c9ff6b437d9f
SHA1907ab9ce180c53efa6296284b7968c52dda8185c
SHA25687b1aa079ca1514d6176bcfbd61240d4bd52158deb3cd1ce90ad776e3092405a
SHA512ea8943f41d96e39905a7254c53cc0488b82e1e8f4729741d89370b58cd264d224fd14a67834ef922d94bfd77910e6d9f00e7223f26dea81b3ff8465586cd87fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577338a126df35e50db49e1f2997bf3ed
SHA1576496624baef2a6690b70f524a5c66dbff2ed85
SHA2567247475a72ca10e63bb40548c2967e08df6084845e1e56bbc19487abdffc9923
SHA512bbc19720c60124accf1f748674598a903c3d3b680170c9c17b4f2ddb99de1ded8be7d6f5f94b1b2a44201400b389efe8607f8dd1691e80a9ffa810daba74d4bc
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf