Overview
overview
10Static
static
7ChromeUpdate.apk
android-9-x86
10ChromeUpdate.apk
android-10-x64
10ad.html
windows7-x64
1ad.html
windows10-2004-x64
1aps-mraid.js
windows7-x64
1aps-mraid.js
windows10-2004-x64
1assign_lab...l.html
windows7-x64
1assign_lab...l.html
windows10-2004-x64
1blood_gluc...l.html
windows7-x64
1blood_gluc...l.html
windows10-2004-x64
1blood_gluc...l.html
windows7-x64
1blood_gluc...l.html
windows10-2004-x64
1blood_pres...l.html
windows7-x64
1blood_pres...l.html
windows10-2004-x64
1diabetes_r...l.html
windows7-x64
1diabetes_r...l.html
windows10-2004-x64
1dpr_report.html
windows7-x64
1dpr_report.html
windows10-2004-x64
1dtb-m.js
windows7-x64
1dtb-m.js
windows10-2004-x64
1edit_insul...l.html
windows7-x64
1edit_insul...l.html
windows10-2004-x64
1edit_label...l.html
windows7-x64
1edit_label...l.html
windows10-2004-x64
1edit_medic...l.html
windows7-x64
1edit_medic...l.html
windows10-2004-x64
1edit_track...l.html
windows7-x64
1edit_track...l.html
windows10-2004-x64
1fyb_iframe...l.html
windows7-x64
1fyb_iframe...l.html
windows10-2004-x64
1fyb_static...l.html
windows7-x64
1fyb_static...l.html
windows10-2004-x64
1Resubmissions
25-09-2023 22:51
230925-2ssm5adg99 1025-09-2023 22:50
230925-2skyaacf3s 725-09-2023 22:49
230925-2rsxhacf2v 725-09-2023 19:47
230925-yhh46ace26 10Analysis
-
max time kernel
134s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230831-en -
submitted
25-09-2023 19:47
Static task
static1
Behavioral task
behavioral1
Sample
ChromeUpdate.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
ChromeUpdate.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
ad.html
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
ad.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
aps-mraid.js
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
aps-mraid.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
assign_labels_local.html
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
assign_labels_local.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
blood_glucose_entry_local.html
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
blood_glucose_entry_local.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
blood_glucose_local.html
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
blood_glucose_local.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
blood_pressure_entry_local.html
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
blood_pressure_entry_local.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
diabetes_reports_local.html
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
diabetes_reports_local.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
dpr_report.html
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
dpr_report.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
dtb-m.js
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
dtb-m.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral21
Sample
edit_insulin_local.html
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
edit_insulin_local.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral23
Sample
edit_labels_local.html
Resource
win7-20230831-en
Behavioral task
behavioral24
Sample
edit_labels_local.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral25
Sample
edit_medication_local.html
Resource
win7-20230831-en
Behavioral task
behavioral26
Sample
edit_medication_local.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral27
Sample
edit_tracker_local.html
Resource
win7-20230831-en
Behavioral task
behavioral28
Sample
edit_tracker_local.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral29
Sample
fyb_iframe_endcard_tmpl.html
Resource
win7-20230831-en
Behavioral task
behavioral30
Sample
fyb_iframe_endcard_tmpl.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral31
Sample
fyb_static_endcard_tmpl.html
Resource
win7-20230831-en
Behavioral task
behavioral32
Sample
fyb_static_endcard_tmpl.html
Resource
win10v2004-20230915-en
General
-
Target
edit_insulin_local.html
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "401833097" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{50661481-5BDC-11EE-B1CA-5EF5C936A496} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f908080c5c8cf442941c5db076e34ac200000000020000000000106600000001000020000000f6487907e2d02306cd462237108186ba76ca613344cb383518f616bce87621c9000000000e80000000020000200000003e236fb91d55cb10ec5f40251504c8e4eb44b9b04345cfcae4276fec8039832820000000ca751d644286067b1c61d4b666b5144e9f8ad016fee64e335ba1496c30d9021740000000ce6a93715e35adfa0c81001ff0d406a9b57e3f344e322fa8d914f685c56989ce7ab770aa7451c5f8bd7f99f0bd2d03a65ad0a342e5245cc1d80ca8760f659f66 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 009a9525e9efd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 808 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 808 iexplore.exe 808 iexplore.exe 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 808 wrote to memory of 2276 808 iexplore.exe IEXPLORE.EXE PID 808 wrote to memory of 2276 808 iexplore.exe IEXPLORE.EXE PID 808 wrote to memory of 2276 808 iexplore.exe IEXPLORE.EXE PID 808 wrote to memory of 2276 808 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\edit_insulin_local.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:808 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb1808e0486754ae2cd745038d848cae
SHA1f803c5a6b19064edbf81b3a174ab5592b943599b
SHA256580998aa0b97474658d98114a0d05e54c367060df6a157632bad543664abca67
SHA51207c6fd6061d28823b52a043daff493c9b35668c19415a8cb07e1c8db671df2153810a8ccad85e61f4c0a407db782a6a6cc5c06cb641b168af39a6ba2a399aa9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaeb2b6ef6ca8120cf5fb5079c4534e8
SHA1c1f1ebedc5e496c5d599d251c533237415bd4520
SHA256a62042083c6adf8f9a78480059a840b402d8440bc44567d7a7941149468db476
SHA512a5a34758a438718499f71263c7a929ac04e1b056305104c4233aba1bdd707717aa21d405efe5c24cf792ea7a8403a8984ad69f7dc00277946c6017533d41b61a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557f7db5cc1b27b890ff7845cf7f78dff
SHA195f9acb21c85d18ffddf8c35256b06b73b91acba
SHA2563cc5dc37c8d7f864a0e1187d0f4ec3f34b0dfc63457e115e3b222301400fc037
SHA512c18b52771f0e3f53dd595de3490920247d9be436ebbdbfdf979ce56d86592964b07cc1c2428aa197a7477ba6b79c7a16bf757ae4c51e7e0d3455f9575c155bfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b52ac4e3db598a889d3caf36baca17c3
SHA190343f8322e9fa5d63700b9f7977344c2466994b
SHA256884e48bb9b26a669a114a1afd3d249ddd997550bfc7278da45106d5b54259517
SHA512b36f4c2dc31983ef447f9f330a0939d8ee66d06531eedcc8699973a145b0835f57a7aaa64a3c5a24f9e48f6a5f7fb6f6d0920e4f82fee25009439c1b1067a805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ac9d3d070c5e38b1cd7c3e5b0640d6c
SHA1c28c8402a26fcf48917fbca5e9de21edbe1bbe86
SHA256b6b0afb07d96bf157b0ccb252cbbd7afbfc7f29d8348f35fba14a5f6cbac330d
SHA51276f9a9bb14c85435bd7fab64b3ade90f3e57c0eb7e3dddcd779f60044454963ba3d740b9141114553f956d0f49ae495fabdefdd87da239eb31f303a8615552be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50eb60c974bf2d429330ce40c5459e3ac
SHA127f9e5a3c1cdf884ff7409be154659f5056e63c1
SHA2560648cb879f0529f6aa2f34a22adc08aea6d88b00ba734eeced46643fdbb1ba64
SHA512f624ac23d4892b46ebe6873d2d0dea2f3cded96c2c4db2aa6f332d772ffce66f31aeb2c797c534ecd93d5a742c353374d327e7e2b4fab4404bf8ccdf8cbc3a18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576c01584f16b1051780584ee10fa6a9c
SHA110d6a1c68b425df2d8da35c84a5827021438e3e6
SHA2562f68121fd4539cfebc59f8a40c3c0e9186f06ed16aea52afcdcae21df8694e9c
SHA512d1565f1db773978ee29cb6ae4d8d39dc6dc95e5afccb1260c341eb92e1cfe47b73fe906a5548bbd1742dc75bb09d2ad5d38f37c9b4d68c0e6a802f017642a634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aff1b221085b03f7f3f1abbb138f6cc0
SHA1b4da9b397d78d7dd36910eaafb366b212460ca6b
SHA256a2e9a4c5994ef5c20b419d1c8ea00ce6ce5f9975be46aae13ace3acd8e28b275
SHA512e840d456954940cc0ce1669fa44cdbf6e6e80c6d4f470b8c74f64ca1adc5665f851f875eafe1173ccb0f21ff03b0574871221c7cb83d00b2e8ed5d176216a9a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527859b7a1372f1c71fede42056806dbc
SHA123d5bb7cea309fbfb9276a626db9139a92f35a97
SHA256f57c230a40ba9466e72a4e9a2790118ab2a320729fdba9dcd10507b0ec163526
SHA512f2bc7495578995f7485a6cbf4d326f28133fde0b221dfde743b9c420970965b5552e03ddcc5dd640be8d3b85a4251f04be69b6860d02877b22aaf0528601381b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cea871e36ead551f1c4e58dc89e284fd
SHA1c5df14550ebcf3ac93f2be3960de5b4582a2bad3
SHA256af651a376103d8554a3207bc7af63bd1a09c8bf1dc1fb5c91f66b055d5f2b04e
SHA512f1575b2903e4482c404b47a2d5e614a2e597daa5c3428e692cba168ad8e21e84d4e03203ce11c71665eedb0033d65c08e60f9499d72b9c3e9dc1e8b953ee0a70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c47d9446e9e1fa1fa86b520623eb9f5
SHA182e706474b2eef8c95e53a81be72a85e1054f125
SHA256ac7c383dd4df8678283146d21edd4f497afe1dbfd820abeb7f92a027a04293bf
SHA512706088b5692cd45a0cc26559ab754564741cab080f1cd36b9538e43cc10f26019fe8e844ced40afffa1318ac81b1e6de4efdc768505d5f8d27eb9e132744a7f9
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf