Analysis
-
max time kernel
134s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230831-en -
submitted
20-09-2023 22:01
Static task
static1
Behavioral task
behavioral1
Sample
a6e664bd38d4c2030e107e16efc00905f85554196bc3c4ba777edad54efefd09.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
a6e664bd38d4c2030e107e16efc00905f85554196bc3c4ba777edad54efefd09.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
license.html
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
license.html
Resource
win10v2004-20230915-en
General
-
Target
license.html
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6007da1f0eecd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "401409177" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f908080c5c8cf442941c5db076e34ac200000000020000000000106600000001000020000000e7fc1fdfbc1143049d2fc5f8a4e507621ef20d3ffe2af8b28471cde5d8bd6038000000000e80000000020000200000003c474e813c64531e7235cc2265b916c411e19055a09c3832bb92d146f270db41200000005d70ef58cf70bed5d200a1a4d8fe64ace03bd15fd7aafc6bdde4fac24cea6bfb400000002665791f92d2c8d6f35383511b7040223305b4df97713b0b1f2fefc8de57ad917e3f5538d626c5db61808ab40541f0ce61243959638977558c2489eeeb4f8983 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4A88FFC1-5801-11EE-865B-4E9D0FD57FD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 2392 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2392 iexplore.exe 2392 iexplore.exe 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2392 wrote to memory of 2200 2392 iexplore.exe IEXPLORE.EXE PID 2392 wrote to memory of 2200 2392 iexplore.exe IEXPLORE.EXE PID 2392 wrote to memory of 2200 2392 iexplore.exe IEXPLORE.EXE PID 2392 wrote to memory of 2200 2392 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\license.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d8178c6e5aba2933151c68ddc9d71c0
SHA1775047367e94d1cf9ea1dff963afaf1de70ca3e9
SHA256d691dd84f46b23eb78fcaae4e341c4337829c736fb49a01d113d5a8892ca300c
SHA5126345671f2e77c370743b5fe1aab916e87ad1f4383bdeac939a7a771b4655e20ee36fba65f4c885f0b7e6074d81a90a1eda4388eab1bcff1deadca34dc39a4da6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f64a6243a7812af1845425346749a03
SHA1a001e22460d18921b0d132aad6bfb2d2d03f4271
SHA2564d0f674f904e3f00c770a9f7fe5bed7df594dfa3c7cf17d4083e927c083bc0be
SHA5128bf78d73a71f82566a9f61802d03bc70c9c2a7027eaf0150b4d16a58255228db9c825f64d74bf4ed1e6cc6a8f41381051dad15a55586f89d7692bac90b0fd4d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515c989d676c36cfb356cf4b9907e8c24
SHA13528367218ce9127fd2634655ac667ec3635964b
SHA2561a7978b30e09f26660791b846c0dc15dd186b7a9c998dacf1425108d3d88393e
SHA512cbbab6ba0ee2350c7645f472608afad32c6376fa7b66da3791b37931e91f9be3501a45d117b74d72c662ae7073df2d013835d7c043196235ce59e1fbd816be57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599a08a9f662b4a8273b087c4e6be601d
SHA1c44dccd3313e028b039969d5f5566029c6763371
SHA256a5f9e8f0461613263a6d3d7232a375bd03f6e94c785b44b049de15c79f12103c
SHA512e23223458224497a55e9b59d1228e340322ee75d27a2fd7cac3d986f9e86c56f12b80825b59275a7d240747abebccb6b8a3172a1e0557a1a89ffb16f6c16c210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5095aa80d8a423f311add574f9c2ea1e0
SHA1edc550d56b9b847c073f17b210e0f38a3f8c5e0b
SHA2567f60288f92e73e14d26b6d40008a8967ccf2e7edafa511d47540cfc0010d0d08
SHA512c658b14f20b43da36f34eb0682bd5dcff45e17d8f421b48cb8ce0b2181b93d11611df3ad38d5fce8d1a156b8990a94757ac9d19337b15ebcc0bcd1bfec1c162d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585eca0cca8084e112405745fa7582861
SHA1356d99a32895513fe5a69bd32687e9ee4092dda1
SHA2567ffaf0897fb4261bcf5659b6c64323d07c72c97d2d3615837c64a88d8469b8e8
SHA51275e3b60d1a305dff90142211011d8722571db94b6df3297197f7d7c52858b225bbb0e4d40eebf25577eba86d6e7f1d82131e9affd20fb0444a84ee4683fd9ce5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534cb6ce23491eac4fa92f24d3e87d63a
SHA15653f4b2c1f2e4969cd49f6dc28bd6a07beecde0
SHA256df79024fa5b7f68bc684a80e81ba9747006d53dd9a5b829148b32ab56211d588
SHA512a697ade20163f11eae80547febc8f3e34fcde6db698b9ede6a529bdf62f40095bdf4f19490c33af852f06a3527c742727bc78163856b973ed36e49fbb92c6820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca7f4d57a1743b22288c65498a3cde25
SHA1e2a84ad6528afa93440e3f77c7cebbf198e25baa
SHA2567bf590b11597494acdfc7e90bb5af9ced64f66b742bd0729131b5a44c09677a2
SHA5125a839a28cd542d366aa9132699b6ccf6c0e0dfb7f43970fb69d46ca7cf4b2300452ce8c7aa9912e65e6b3f50b11d91d0b5c661052a82f345c6b4f124b8a554af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f2eb697dbdbed04f08a4de990b33365
SHA1276decf30e645f171bd5609baef8a13650d93f69
SHA25692d1ede096bf888c4af8412350226c2017f959698ff5fc0d35a81a61bd3fadd7
SHA5127f99c7af72f952ab8efac1dc7208844f08487ccc4c152bc90955a464c331ef4101d893ac43f1e9ae1bfb84516cdb7c220b180296e3c159f53c9babb4f0a4df29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6d32e21c3664e38fb16f8fd1caae5d9
SHA1e4112a1e2f6925bf94f8d7f9b499a17a2c2c7f0d
SHA256d41e298999cb48f25ff6fdaf3165c6ab1eefc2261a2ffde8020dc00624c25937
SHA5125087e7fb4f9680a8baee9cc5330849165c56c867aa6564cb130f818b279bb862a35a804ec0803afd69fab92eb3a9247e39ba257779519cf8d0f41789aa89fb60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58496e912e62f8daadbddbd9561535e38
SHA180bb41dbd07b2e6c7c9649ee420f85e3f9e085a9
SHA256cf46efd87c7fc4afd77c6405ffd0efd90f1e41183d848f805ba8a3c128276bb9
SHA51270643f84020d50aa18d06d23bc40db808ea5a157d8fc608c22be6358a9a60161894c186f77978c70b39d65a98f805f1cc12db73561875f15674cd2744d67086d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bb4b20c7734617f7f1b64fa5fe18e1c
SHA13f165c4aaaa0bf3f86081e1252ed4a5ecb64ac6b
SHA256d909aed63937eb20c5abf451694c0ef312f5f0ad384c84d3d5f3600f5738b476
SHA512159a79b69cfc71bb470cc944b4e88983f58d855ba1aad1951a05bc11869461bfc980beb95dad81ab634908d0a7c7f6161b62d808ad21128a6f965dd84f68cb1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52076d9920a03be545472a3dc9bc719ef
SHA18c60a662ef005b5d91fcc9836bf8daeb287ac86e
SHA2560e0da56f3ed732698dc01491c93af952c71966cb3e81ab12c8ce195ee0eb1c61
SHA5128670defda33a040566b7b8529f09764500cddb97adb5d1301e435edd04d4b1b72a2c9a4b01010be986cbb2eef6472a20ec86aa6c86544b567e680b6abc23f660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb8cae636f331b34965b8a764ebe8d48
SHA18e0f9a818bddc00a70c2be8bdf76f1f970923890
SHA2563a91b238cb91ca7ef64a19b08cb2e23a0464b44239649b1325d85fcae9c9b6e7
SHA512e3d71bead18f7c8821bc77afdb63427130d2908af44b88621227853e19fa6da9888da7646f23c783ed5fb8cd497a172119a0d0e3f6485c0ac2b84903f88b75dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bad31b00ad596d880d6a9a03ace8954
SHA1412baba3072a8e2f201b3261ba2e8b0aa0bb3d5e
SHA256a2b9410b117a37e15605a7e88a418c3f077d79e2486f06411630d0eb34617d2f
SHA512605daeb1497af99cd745d81e772454f56ddf49a1ee7759211655b50a4798bcebfcc5a9bcc89063bbf185ad2d72a6dbc0161ba1c9cb4d2adf7e4440cda6ceb1c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59997b510bdd1bc412fb7a60b1041bde9
SHA1f4e06705d27d5f65521e3618ead9b9e324442d3d
SHA25625491586b269f3a8410460596c317caa8edd65199b565bbc7f26d457961846b0
SHA5125fb60b5c767afcb3e983c49caf412d9a197846bd18a321eaf95f8b71132c1b33e03dafb8b4c27467741dc99e2b2bfc70e8da536aea9c9692aeef88b8dab72fa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b60937684b65176e313caaeff04e767
SHA1b477db87101254c8cc25bae03a07bbef078bd9a9
SHA256a6f7493406062d4881b0a2b7996da941a5de54b7948bb4b738880fe018e50631
SHA5123e01a980a87a3fa68ec08ffa990c90ca151fbda2d5f612c3d230d2a687433de0004716a98d53bfef82b874365d0b012ef9729097ab21f29f57f97f5067e032a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a55d2e59614ffe3f09534fdff62223a
SHA18ed971b8e1160c7d081bfc328e710e7d0695947b
SHA256b704f3e5740e2b5c1ceda04a12852c6ca1df711fc228146e1c8284ece5d007a8
SHA512fc1b0aa1a7ca9a6b9fc2ad34d1c7a3210bea62efb45fbf31483ed8a0dc6efca7ae1314c155b0ef45b06a4a80f0a33e9bdd1012a9025aaeb5e2782b7da523d350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523fe143276bc418d36f7690d7edf91f1
SHA1943367cabac6d449b7e4c2e3792730eedf633f89
SHA256913746a1c3e3cef53657a3c14c8d302f09fbf52a4da11d49bd54882d3c2d4377
SHA512ffb6ebb4b0f8229edc077a91588c628f4194b59d829d6c2366b9dfa98980898ce0b6b193b413f1ebcbbf5a31ead841243babf4713355d5a94ecf0c3054e84af2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534ddc0b99498e179f11793528a0cb638
SHA12648f43e7bd7ff9d3637539402996ade484ea8e0
SHA256651798850d32a6bfbf2b9c6b1d3a2a451448ac532ee0d6f9f2689420ef2d834e
SHA5127a1624d424c90ffbf5f20c1e5aeca3e86d153cb395a1ce2871b5cfc258b25503c06b283220260a0e61ec3fa859d6e053b828f74acb7dc0427cc268d228ee08a8
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf