Analysis
-
max time kernel
134s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-09-2023 23:12
Static task
static1
Behavioral task
behavioral1
Sample
505e9fa3460095e7424ca5e4fa7f77fd97e7062c6467edcc5253bbf3c296b02a.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
505e9fa3460095e7424ca5e4fa7f77fd97e7062c6467edcc5253bbf3c296b02a.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
505e9fa3460095e7424ca5e4fa7f77fd97e7062c6467edcc5253bbf3c296b02a.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
HM_JsBridge.js
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
HM_JsBridge.js
Resource
win10v2004-20230831-en
Behavioral task
behavioral6
Sample
consentform.html
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
consentform.html
Resource
win10v2004-20230831-en
General
-
Target
consentform.html
-
Size
27KB
-
MD5
7a2ed1a6df8839dd8936a86d9edccabe
-
SHA1
7bc1af528444afca678905059cb1ba9fade65352
-
SHA256
d02fbd55c1b5da3fa1f77c52f5633421395a3bf228457521512b37cdacd65f9c
-
SHA512
ea0c3e512b37e340f4c0a49196344f1dd5aef38c469ba124605518e913be601a5b6a92a50f00e962bc90041bb80e51480254c7902032d894b7d24be5aec47097
-
SSDEEP
768:wEh4FOT6bJdK0D7fkvaqF1b6cY4c5rC28c54NTc5Jt:th44GbJdKoncY4c5Wc5wc57
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003916b9f19191c547a3cd833648cc0b6b0000000002000000000010660000000100002000000019ef399b5a66000902ec6a029aa831eb17587d86e990de96792879c02ff164bc000000000e80000000020000200000001c41515ebd764e660fbdb9f043d4a10201e0703f582fd929642c75866e15a94320000000eba76a08c1495aae8441d78980a55b96aca517e70b53b1f83ca00fb742b15f2840000000d44ff246ced5023482c34cd9e033bb48f42cc2e0c37b54b913f7f3c7087378c1a7aff027cf06cf83938d9e1679206387a714b6979ada79c9e00d4b01a2f3b1f3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E7907C81-51C1-11EE-9884-5A71798CFAF9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4086c4bccee5d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "400722243" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 2804 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2804 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2804 iexplore.exe 2804 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2804 wrote to memory of 2640 2804 iexplore.exe IEXPLORE.EXE PID 2804 wrote to memory of 2640 2804 iexplore.exe IEXPLORE.EXE PID 2804 wrote to memory of 2640 2804 iexplore.exe IEXPLORE.EXE PID 2804 wrote to memory of 2640 2804 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\consentform.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2804 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD575aabf0c3b44833f3a81a304807c8bff
SHA1fe30f7123bfefff5c8dabc22bcd5f472127f9334
SHA256838bcc9623b2eb9d3298d20099bf3e71a777ba373a9d378b5a493b132554f1f7
SHA5129456aa2f0cf3400c91218dfdeb3dbcfd8467a728105b0fae6d285f79c902f06473d2be4c9ce3e7c5ac40ae14be8039803023cb66fa341aedc5525f49e460e58a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53dd8bf7262280dbe3e3ab723cbd92ba7
SHA10b41d088f6bf903e77cf3cab9d5380f9071450c8
SHA256a0df38e2d98341f4d3a2d0eea33982f26851dcd8c6793b304c35e376719f60a9
SHA512c2503f3fa0b077c042de75b47b75c0a66ec34577a692831d3216c5c254bce3f15ebb74005a13abd3ec55fbd3202a03dffc334f91ad22b9a5442c9bfb619e7729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fdcb83b84df7fe73d7898bc1630283c4
SHA16762b9ad75926836c9e28e7f2c1ea03495563f33
SHA256279811c40c7b59fd78b99e2a9d4389fbe7e29e235a59e2e2152187bf8d07b44d
SHA512c10110a6be651b25c0e7f58d1fdac429336b9f6214a75190e9855eeb05e29be59bb7d6bd92b03bd95c9a35df0c772d6d664a91076f7f4f2df1701642686ad379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a5b53ba2d20223089c30b28b65f5a9af
SHA1f1fdb13a10eb2309c4b14c90ce490f05182d985e
SHA25636ee93783546ba79396bffcb1183905a9079b69209e8d7dda0d517556ca377e5
SHA51255c0c83db2019bd62a5cef02219124ceb7309724742779eed4f231880a0f453edec258e93b63ff5044b8680f1c98a4e3d39b861ad0df3df155da2ef6093aa321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e839318da08130c55c25de12feb02db2
SHA1bd7c94d4ade03e5aef6951dc8e10779e3764a16f
SHA256069992a34349c9f676cd017e0369ff95a7e7375c756e945ecffc93dff352c4e7
SHA51209212755306e268d77e7e3619296ed2734bddf1155e304d44ac755bab81a9dd26e33a069b04c30ae82132af6161c4c3fcf233e93aa238258eb7df4045d43fede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b042dffec26a16ee5bbc0e97d2ee23b0
SHA1b431084995e90433b2b02a6fa140e0f8ca4bfff3
SHA256a499b070f9d29adb31b47d50d2d95ffd720389464b58be7df042b331d96c95fb
SHA5127d5515e65f5a67e356d9bbad348311df2c70e5d3f8cb0827d0b8fa2a217b688eda3d2c459b16983b147506a6539285c148a0e95a581bd348b51c5238e1c95f5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD511a12f5db3405566271e95339e7b0331
SHA111aa508a07b26109ceff0f5cc167bc20c2c102b5
SHA256fa16cee60d8b1b35aea1df42bd09d694ad1f442ed7f9310a6237dfd242556d1e
SHA5121b0b8318e8620f91ff5643364d78206e29a08e24d2597b7190e301e9bd63c56d4d3833286ffef6a512dbd219945f5e5a8904972c08dce304c944f682880d46ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD595834d6a6d8d63d2c38f904411be9944
SHA18994238acc7bfb8f0d7cd720cc1950e6cac6f480
SHA2561d6639d4ba38de67aea33c0254642569f07166e950ff2b017497358efb50ae66
SHA512f6be97c4f14d0064968cf2bcdfe79b3d7f8e3088cc11b246a9ceb6560096de0c7ed835575d27ea64b4585d51eb19506a9353f4964cdac93386d3d29e9821744a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54d98b60413b68f3eb6055cfeeb544d87
SHA135e0d47176620740e0fe9de801a062509eae199c
SHA2565e81f30871d2f19b304039f1124cb9eb21db8d23ddd3280804cdde05ae5a2a4d
SHA512ed01ffdee2098a8bc8b3ed16133b8077fdd390e4216125d7b59cf5632eb76ae7e2e5cbc9b23e82f583f6c6b38c1e68ddc056c1a4dd84afc36c53d3890d32865b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ea106c30ce7ee106d56fee604d1e034d
SHA1d80ec5116dceb816b2087b8ba8c0c47860df707a
SHA2562d741faf09cfc2f08b062af4244fcca68c9f001d61a1a3be7d4e56adb85cd037
SHA5121bb5f7db905851529e002723e2c5f335ae2c378eeb435f5913046cbb038034ae2da8d5c559eeb6c7ba4f6b535d632cf11114d60b666f4b980193cd108424b278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ba282a56babb8dc646335dac371f1906
SHA1a6d067a4dd1d5b7258c70e9ae0fefed76840707f
SHA2565155ee9e60375b52a59215d5ea94188bcd256699561f1e48b06ec85d9efc3af1
SHA51287e8caa2b5aea6dc188a73acac2b170f900b0828e84071ed48f387d42da19b7a8111c8f1538cb7401a8d82d4cee507af742db32f51eaa4be902a9e7fb208b424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f64bb14de7e9677672db223ea1458e0f
SHA1a4710707f13832a1bf8370006ee6f5b4bcc74924
SHA256fd685a22ff91582347d6171f332a9a77d75bca26d1025ea9e30b08d8f5545288
SHA512c25f6c652bea93e5b75bebc10983ee4b4acf97ac21c1761f65dd649e774f99469fa0413e423f8bb9c9c5b4707b9f1c022fac023967928a6f2cbcf079936d1444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5551845440e84fec31d612242cfb31426
SHA1040d7cce6e7fbbd619a7b7051e87d6eeb52c0a64
SHA25614c275bf751afbc305839f737a665eec2901e6da8682a036fead91c193801c38
SHA512b4772c91975bb4a0b554105ec09ed15e7659c44b41784ba97c47d45ee11ccbb4c7826a4b4b8a13ff3b85c7056041585323209072a21f5f3a033ff7a71ee254cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56cb07886b14daa2edbc27e00e774f5c0
SHA1e8ac201a3808486b1877559a5df2743157a28adc
SHA25624084da138e6083b0c630bfc66c78017bfa7061d47f5f29301cac8aed7b00caf
SHA5120d2bf8888b1ac1b01791a565b1176d1c65293f0bca69a9bdf2a49a3d1024b721de5bb1c3a60f55be6b784a20e07bb26c1594c9aa7a4c72c0c91970b49a5e5a70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD594313d547f7746ca6deda2f48c15e0f5
SHA10a4e25ade9df4601fb7bb61fcd8f363c4b73b986
SHA256eb0dab2334c06c2a24a724b90f03f8a2b865f29405eca3a7e16191261abae385
SHA512b3eb4c6d0c1e59630309bf3f5365280781e5f97c5f5504930f63a159c4604fdf40c1ac960fd6b850f388ab84484a0731174f2b73cd01294781460b36221d0f7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dd7f320e7c657a98409f3a6517bc0038
SHA1a812e6c6009f96bfc25999697e530cdce8e906e5
SHA2563ff871f63b5c3675c948a96deb68340a21bd7144bedb8cec000c2fef3f425a17
SHA5121af1ccf0ef60f293a28850cfdb55025a187d2c617b9da74c055cfe5c951922c5fe1db866e48675619d43c742a3ef80b8ae275d5eea53d86187bfa5b6ede542d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5619b6ad306e147e76191a2df614a2a55
SHA18f5209deee5ffe4f631b87efb420ac002257892b
SHA256d956ca3ea1ee88df4571034631983be5459e9023550bb73f8ed59f6804d43cf8
SHA512dff767c3fa2d969b44c4c121b2eda28b4610d976394c2b1a75706552c616179f127902389b90d430aa57137987940aba65f0b8fe4fd5367e9179266cb116b130
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf