Overview
overview
10Static
static
76f740ba69a...ae.apk
android-9-x86
106f740ba69a...ae.apk
android-10-x64
106f740ba69a...ae.apk
android-11-x64
10license-ru.html
windows7-x64
1license-ru.html
windows10-2004-x64
1license.html
windows7-x64
1license.html
windows10-2004-x64
1UserDict.pyc
windows7-x64
3UserDict.pyc
windows10-2004-x64
5_abcoll.pyc
windows7-x64
3_abcoll.pyc
windows10-2004-x64
3_sysconfigdata.pyc
windows7-x64
3_sysconfigdata.pyc
windows10-2004-x64
3_weakrefset.pyc
windows7-x64
3_weakrefset.pyc
windows10-2004-x64
3abc.pyc
windows7-x64
3abc.pyc
windows10-2004-x64
3copy_reg.pyc
windows7-x64
3copy_reg.pyc
windows10-2004-x64
3genericpath.pyc
windows7-x64
3genericpath.pyc
windows10-2004-x64
3linecache.pyc
windows7-x64
3linecache.pyc
windows10-2004-x64
3os.pyc
windows7-x64
3os.pyc
windows10-2004-x64
3posixpath.pyc
windows7-x64
3posixpath.pyc
windows10-2004-x64
3re.pyc
windows7-x64
3re.pyc
windows10-2004-x64
3site.pyc
windows7-x64
3site.pyc
windows10-2004-x64
3sre_compile.pyc
windows7-x64
3Analysis
-
max time kernel
134s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
06-09-2023 22:01
Static task
static1
Behavioral task
behavioral1
Sample
6f740ba69a5020a316d67e0341179ad03f9820fdde6501591255e9e98b06c0ae.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
6f740ba69a5020a316d67e0341179ad03f9820fdde6501591255e9e98b06c0ae.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
6f740ba69a5020a316d67e0341179ad03f9820fdde6501591255e9e98b06c0ae.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
license-ru.html
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
license-ru.html
Resource
win10v2004-20230831-en
Behavioral task
behavioral6
Sample
license.html
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
license.html
Resource
win10v2004-20230831-en
Behavioral task
behavioral8
Sample
UserDict.pyc
Resource
win7-20230831-en
Behavioral task
behavioral9
Sample
UserDict.pyc
Resource
win10v2004-20230831-en
Behavioral task
behavioral10
Sample
_abcoll.pyc
Resource
win7-20230831-en
Behavioral task
behavioral11
Sample
_abcoll.pyc
Resource
win10v2004-20230831-en
Behavioral task
behavioral12
Sample
_sysconfigdata.pyc
Resource
win7-20230831-en
Behavioral task
behavioral13
Sample
_sysconfigdata.pyc
Resource
win10v2004-20230831-en
Behavioral task
behavioral14
Sample
_weakrefset.pyc
Resource
win7-20230831-en
Behavioral task
behavioral15
Sample
_weakrefset.pyc
Resource
win10v2004-20230831-en
Behavioral task
behavioral16
Sample
abc.pyc
Resource
win7-20230831-en
Behavioral task
behavioral17
Sample
abc.pyc
Resource
win10v2004-20230831-en
Behavioral task
behavioral18
Sample
copy_reg.pyc
Resource
win7-20230831-en
Behavioral task
behavioral19
Sample
copy_reg.pyc
Resource
win10v2004-20230831-en
Behavioral task
behavioral20
Sample
genericpath.pyc
Resource
win7-20230831-en
Behavioral task
behavioral21
Sample
genericpath.pyc
Resource
win10v2004-20230831-en
Behavioral task
behavioral22
Sample
linecache.pyc
Resource
win7-20230831-en
Behavioral task
behavioral23
Sample
linecache.pyc
Resource
win10v2004-20230831-en
Behavioral task
behavioral24
Sample
os.pyc
Resource
win7-20230831-en
Behavioral task
behavioral25
Sample
os.pyc
Resource
win10v2004-20230831-en
Behavioral task
behavioral26
Sample
posixpath.pyc
Resource
win7-20230831-en
Behavioral task
behavioral27
Sample
posixpath.pyc
Resource
win10v2004-20230831-en
Behavioral task
behavioral28
Sample
re.pyc
Resource
win7-20230831-en
Behavioral task
behavioral29
Sample
re.pyc
Resource
win10v2004-20230831-en
Behavioral task
behavioral30
Sample
site.pyc
Resource
win7-20230831-en
Behavioral task
behavioral31
Sample
site.pyc
Resource
win10v2004-20230831-en
Behavioral task
behavioral32
Sample
sre_compile.pyc
Resource
win7-20230831-en
General
-
Target
license-ru.html
-
Size
34KB
-
MD5
ac6e15df193c7135c916f85fd48afecd
-
SHA1
bc11e538662c15a478b3cbf8cbf0873b8f19ec9e
-
SHA256
a1b20292621b8ba67ddfb61802bd12bade68f6b930ac6ad61e89c047a1f91c22
-
SHA512
bcd3d439b0b25ba3de815f00ff92bf3545578d90d53adacc2b272b60ee8bf3d65e460d87fbdc56eec32344d8be567b1f7384fb9c8b0934b24cec39ce05b7c8e1
-
SSDEEP
384:8JF/uQenaw/h+pMNbK+v5AKVjZI89GThAKJPrLqCu2WVgqxk/d1NDlCPjOB4WUen:4e9hDbE4nGThAUTDmI4WUE8Z+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "400199575" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F7B01961-4D00-11EE-83C0-7AF708EF84A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8091cfcc0de1d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bbd2da6efca7814e97bd67c6ea97aa8b000000000200000000001066000000010000200000009b67ed13ac2a423a7406f4fdaa57ae736611951628f313f62f47ae6d7b01bff9000000000e8000000002000020000000f972edc5cf487f78dbf1181fa8d2750e3ab337d7237f0b8a2d3c0d85d6a06e6120000000f5cacc02238653ecc6af497e7180239cfb65078f0fc17273e204b0b88c32edb740000000351a2407a9c3637ff94a6871a7b333a0f9bf1eed44997fb1af1f25ac8823bf4a7003306aead292810e6063685cbd8580e1799fc666f0448aea53bc9c054a09b7 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 2124 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2124 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2124 iexplore.exe 2124 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2124 wrote to memory of 3064 2124 iexplore.exe IEXPLORE.EXE PID 2124 wrote to memory of 3064 2124 iexplore.exe IEXPLORE.EXE PID 2124 wrote to memory of 3064 2124 iexplore.exe IEXPLORE.EXE PID 2124 wrote to memory of 3064 2124 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\license-ru.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2124 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546e2ad698b8f29264536914daa3b80cf
SHA105e87e6d9e211f7636b3b3884159dded134ecadc
SHA256c279dc2dd72f3e389e9ef72b55b1869fca69ad031ea4ee720e45df9617444e77
SHA512807e7915a3341c7f1221aaafc79ba3a88a96e299893492f7179ceefd49c01cf993610c55cea9224fae674aa0028300e1ff0ee11d079c0e0731e71073cfa92b0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9e542318a00421a520cb8b3bd89d3c0
SHA1f4e803a7361489af97de80d2ae25f224bcc3e84d
SHA256324932309116b0041f068b594f04774bfe0807e113656c88ba0f7364160774e5
SHA51279657c82ee802a2f99c58e293ca15e9d65d53c2d00ea737b8bba79440fca959ab8541c3e0c0bed3551390258df103511753632d7d360a179806a1cbfea2f6ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4a1b1cb757a7ef7f902ba87381e94b3
SHA176e4b7534e4a83fc0bd5e8b59017519ebe235a44
SHA2569dcf0043fc746844a9c40b557eef315e93f64015f450efdb06a0c87fdb9c753a
SHA5127afdb8b89184512a91a0471341d4d9447bbe28c1823eba87039ab3d2d797989a5f99a9e60e475c58e6409055f03b939106524514343bc903473c887637c095aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58aa083ba2322e96513a2dde237ae14f1
SHA15abbe591aff8dc0dec761645128201921623e663
SHA25636259478ff31893bdefcc8a47850aeedb1156f23ef21e4b29f5fd85f2e75756b
SHA51281f173e6be0778ffc56df4c47431595097722209cf93e62c27b84652b7272a47df7032eade0b60542b7d6ac846d00cadf1346383f03cac2fea30ed53d631a908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534a4eb394618178131569f153d235a53
SHA113ce3dfb2d9fb98b013a0b3d8c435e5017038e24
SHA2568577c2ed26c8570b3692aa0ff6d1bbfce3dee98efbe83dad297985acf8c99f56
SHA5127b9881ce9e93a7344dab713c2de4ea6fca2f614813c2d414d29a2700dff6751ff43bf8344dd278f1d6bbc3c5521aa6fa2e5dfd4760f1cf01df6c9e25df296c72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8d718d5bb34bdb90402a86ec16dd355
SHA16856dbc7158db891fd62b392876d4f294c4266c4
SHA2562906d1f74d0b3d8eb24471998cc26774d96333a67ea9789f9be2c67ae05fb34e
SHA512468e8909e9e7ddeb07d8562f9dad0100dca0fc6e1785b916fc72ea8ad08764d752c8498bf7952df1d55d99b101e8633c7e7162c337de65b202fcfb41626c0e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8006ab026000f2dfe4eeceb2733a5bc
SHA1fc29ce8164e5cab0a837145569365f831e305f76
SHA2565fa1b400a5f1bff2a07d71e56becbeae44ea25066acbd63a14d65c4f198674e0
SHA512e88d32d58f7826f5fc410f2874430f0686f80223f07356ce4009f4ab8c2054d62e0927d9871191cc505ee8e0f069544eec06e4587c076aa966700d442fc803aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5389e9df02719e00a88dfbca16b8dce58
SHA1975152335ffcf346c0b8eebd000177cb3816713e
SHA25658c20c1a7f489303b4a7644f35f1276b58742c468c47a73bec6bb401576ee2b4
SHA512dc932edbc4330bf8b8353a52652b4fa4238b6135befa0ce32797285f9130c5ede71bfee778f3053b05568f685a9e2ee031ac080a07edbee7b15d89a52c1dceb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bd1117ca6834589585aa66a220c9cc2
SHA160441f8a78890bd1ee83ef7e580fa3e8eae9fd70
SHA25648e0c3068415a444117fbc48485e218f19f1bdff5aaa7e7fbcee1fbf73b36a7f
SHA51284b976f071fe8fd64e84bc0d832b2517e93e8b11da897351d655d03ca2a7041e18c1a8d17a3ce19ad06148081d2d039d7bb154be64d228a1ee5eb0794bdf1770
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf