Analysis
-
max time kernel
135s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
05-09-2023 01:30
Static task
static1
Behavioral task
behavioral1
Sample
3dd3a843e1f714b3a6ec6dbdc4307ad52060b06a9fa8344a3826f3c3f067fad4.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
3dd3a843e1f714b3a6ec6dbdc4307ad52060b06a9fa8344a3826f3c3f067fad4.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
3dd3a843e1f714b3a6ec6dbdc4307ad52060b06a9fa8344a3826f3c3f067fad4.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
privacy_en.html
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
privacy_en.html
Resource
win10v2004-20230831-en
General
-
Target
privacy_en.html
-
Size
21KB
-
MD5
a13ecec2c8d84d1a6a37f9241f7ae40d
-
SHA1
2dc04ba7f2543c55fd8a7222a6b8a93f3f66743e
-
SHA256
9b12d5c238f44ff41c19d2ac2281968ee2f1945033a7c426f0d4d69e7af2da47
-
SHA512
c66782304d0738629ec2183d93ef26f84f91bcefb42faea391801dbf79f06f4f754a4d1787b2959d0fb4761540f1e9b6877128253c24fce0af92d77e1912f9b8
-
SSDEEP
384:FFwFwFVFd6wTWgHu8QuFj1Zohr2FACs8Qn3nogUovwghdKP3k3DxJ60uQ:FFwFwFVF1TD1Oh2U5
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E0EA2251-4B8B-11EE-8DA3-C6004B6B9118} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90769fb598dfd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "400039333" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002bccc567d90a0b479b49b1b2d43318c300000000020000000000106600000001000020000000e8994026a0e54ea936c7c7d387857a0f416654b934134837fd4e4299bee25fdd000000000e8000000002000020000000d2f42c1cce327b01b801ec4cf1ad7f17d92708ae7ee8e44948d87ae4b86dea81200000007ea77f491e1da7f4dc363268d1af8f516a1a2154b26a04302032b66b016d5c81400000006ade25c3afe645eee420edefc1244ac69d8a04140f5d6819688598c392f4f055e62f8923f96df00d0ce36b07fb21b033edea56cbfcaa26e5d4abcf8a9eacb3f2 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1716 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1716 iexplore.exe 1716 iexplore.exe 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2344 1716 iexplore.exe 28 PID 1716 wrote to memory of 2344 1716 iexplore.exe 28 PID 1716 wrote to memory of 2344 1716 iexplore.exe 28 PID 1716 wrote to memory of 2344 1716 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\privacy_en.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1716 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598fd7051bc15537d3aa2b7a9cddad65d
SHA17fe8e7e35b522222edc5f7f09311fc9bd7573c3a
SHA2560f1fb77148683bc1f3d00082003dc29d2845fa125a93f85c744806340a8a1fcc
SHA512677d98065c93dfdae40368f92f62aa3004e64192585a55401536dc443e266c71d5d23a1c2dcc5d6d323462de1acb07ef7a3f3b240919302c1e65d1d5c017b118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56adecaacab09922c362ca500b7e55473
SHA1f847f438abe9351784299ce8b702741ba9f64fd0
SHA2569ca073501a7290add340ae1ff8d5830c48cea130070a71c5ab3a5438c578cc64
SHA5129d1855fcd74e6ea1113ff4bd2b88de0a555da6db6d872890babde8660ed1d085b1af58d15fdf7a8e9a833eb9d4cf60511c8fe1a8a38b5d86394a66307312a373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5091a9eca51baa03fdac8cf97eb859b80
SHA1e45c0afe2efe7c43c523f5f9dd42a8d5275c06ca
SHA256ee77a84283ec4f391ecbe865c56a693f3847a8007dcf0b4d1796af7114a3b8ab
SHA5123faa67b43c724e768fa0ce87078464ccacd87dd8025c0dc5a4290df184f3f9baf8c1e55e0758a3bcd373b326af7adc2a956221a5f5cad564243372cdb0d661ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dff6eb2b2a8d18fd5df4cf8bc0ef12c2
SHA1bab003e64b4c0ba38156fc10615069de729e854c
SHA256b7765fbe8590916c55d6ff8137b7d947ee4666eea42e8170ce5ce00f5e03b1b0
SHA51212734c64f3c3e58366b59a99d42696c168d22a7c925a1b5212673ac632dce81a4463e15b190ba1cad9232f27ecdbe447c54fb96ba78b84da65de1f5fe86d9afc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a9d4b47987b64bdcf609538a45f727c
SHA163e1599d299b50f7cf637ee2f515531bf13f7515
SHA25606776fb86e001f89364943d25ccaffb29cd2328890ca22c7bf61fab321082f3b
SHA5128961ebd66bb84a72c21486d9f160dc474666f4dfc59f0d4b34ef7704aa164b1d279acd63a46c7d1d69f80037081e016be6af60c3f7d82d5f1ec261f3b88b56f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc62f4e085691aca7a6e916f947de4ab
SHA19229aa03c604664c6c0f9543b262290edbf6d8cb
SHA25637303d3ed96a08bb8f44cdbc3a894aad44ae47b957d99a255b544e34ef830d9c
SHA512e0993bee85c5575499945c0a9f4a1efca3ac1f059906862773ed7391f12083b882519c08c44293f4b4cf43023f3e2656f981defeed75e3731d9fce468d603f51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58906697e20de0ba5ae30e79a4c13d84b
SHA1d419a27e4cb0cc370eed0c51af8982e891601a3a
SHA256c8e0e96f7d64bb3d2042d0876ea0561c9f78e856fd261137e6c85bba09bb722b
SHA5127352e2992828d969fe582c03003a1507c07917976a067c96b3e007ded49f8a2be0150afeee173a987fb82fc417f919301bda36898673bde36f900a648bac8854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567bed56871f3b3ba2ff9b1da197f2221
SHA1d89f618238f810f0f0ef0af160e4d00c0f553a43
SHA25673aa383d9b12e5967fb18829e3708af48c42a959c3070f8e894819bd45078bc8
SHA512de00680e958f0b5e47a0e6f094c8bae0873ef2ba95b019e910004385e7eea09386e65af7c18ed3b2a1efa61b461e177c29adbc8e11c0114c35a89bc4dda10beb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54641d6218096ed13825afb998d12dda9
SHA1331d8ba893ea4972448296a7914f445992695ff4
SHA25611503ac18d07cc4aa72ce73a16ca86a2968fce533bf6d96f2487402a719ffc49
SHA512eda6ef34d2dc8588732905ae1b330bec6d9db5cf67eb363fc7c7b5102fbdec532b289cb675b7e2933869b78e016b6a004d548144e8f6aea10bee6f20656f4473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bf205b0a01933f4a39ddbad5aa4bc1a
SHA155b00b96dde21ad88e496b81f38eef97f9907ca2
SHA256bbf61b4a19438861210b5c5a4d500e883d8e2d03a26a90852108a7a8f772a8c8
SHA512f4d7b9436871ae83730f4a6d58b7d6155fbc09219a527e70cf74e0d0cb7b479273bff6bf53b48f89ac6412d184d203e58e94f5e676f701b8b1e00a65e2e92c5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5138c2ce264e52be2a62ee5f2004f63d8
SHA1120c22b18d7406ae9c23a4906a321cbcdeab359d
SHA2564ebbed9661ef291c415dc956e44f4b9a3f9f6227036cc36a4c4e6fb053c22a2a
SHA512c7104b488e4561db03cb4fd75e5a747c905b2e5c1d8ead2e2f5f3b1ea8542dec9b719fdc04427a0eb1f694028ccaf8145ed6c77a3db5136738e69b27eca739ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c17bf787264cfbc3709ed43d36f47058
SHA1ab8067f5f1c8b9b8de70413ef2a4f459c5d3c29d
SHA2561cfaa359972ae195f366271a5170e476af4454010e29bed95a4d4322030734e3
SHA512ca61fd0564aed2e66f2f31f0eae92fc1f6655c14a3e0f0978d2890d1ba9ad822d0562156ca9ba54d0404b735999ebbf627d3dcdb47fe79170401365f8d0cb87b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cd643b9340b00b140e334d51daee80d
SHA1d3b2a4dc854b41a81b22804a2fd925fb4b821f8c
SHA256fa2e59eebbf6d59578ee401e6396fb6e99b3a984659c19b6d05093f9ccef9599
SHA512a99778d01dd06b81c0993d1b52b9e507ac5e31c0b825520e818847e412fd8bd7b1703c2b030b748f51c4900dec52beff11a88fd7632beeb5367baf1fa8deb96e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e59b31500cb9060b1fddce0d4b0fd71b
SHA1899fe6262a056b42004dfdd8d809d905e9292e72
SHA256f33f995d432053f580dbd14bfa65fe8a6ec0739bf309f56d3bd4788505488f1d
SHA512cf886ddf180c7b9abfe1de1eae4a732d5477813e7ddd89b1c9c0d084835a1a51d46a79a175812928198559c77cc8bdc1c37fd0a84fc571d8c44493e2dc372ef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598e9c97edad44d2fd31360c9428787d3
SHA12fb9b34319766d706f82472aa186c2957bc8fcf7
SHA256e182c53501547864600953e703ed8fc5d393bd94f68f9b3d615d5b4a143ffbf4
SHA512214f38c671aa584b8a4268bc86a1440ad1fee741c7f048ef8d89663f99382d2e672ff131a5c61f2a70022d56254cf937645dd5c84474caa0c79d429f71a4b67a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552a7d860b9644d10394b16eb156d6622
SHA1d27fa6fe9df0b8d14b9413f431630ce023bf0c80
SHA256c56aa90617c3e47383d9fd71b9f32e2ba8f1ddaced03ab96e094a1b37eccb927
SHA512f31dfbc91ca943c8227eaf023761c1c7a370ca00ff43d6df5cea7025c9ad65de5ab331dc67411f72e9d075d2b3604d794a8418c7aaedd0d146509cf2385442f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515a6b01171558d95a7da720d221192db
SHA15e7f6634cb1b16cbd937dcd8d3f9a437e0e343e6
SHA2563f9eb6dc084d4096b2c658c8e233cec48e1a89660a14a5568dab32beae3abea0
SHA5120d7ef89c3db9bd6052b68af213f9ee5efcd15a2e2855de679387103d7680550cef71e1defe605526065d82d3ec43e0d743378a8066baacd1b60eb40492f2a5b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcde49570bb283268960fdb8ab6e9fc9
SHA1ec62a1e9b79e3fe8e82cd662dad49982f99cc388
SHA256ba7e44742c603a9451624917ae9e66aaf0c939baad968a5fb699c8ae1ef02299
SHA512185d931e66d247fcc7d26fb5359fadfcd55365e0bc5ff76e8e157446e28750e670cc183c0f1b1ec6db410beeee6afa978aad7feadfc1dc00dd9892eba528b1c7
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf