Overview
overview
10Static
static
10Instagram.apk
android-9-x86
1Instagram.apk
android-10-x64
1Instagram.apk
android-11-x64
1dropbox.html
windows7-x64
1dropbox.html
windows10-2004-x64
1facebook_d...e.html
windows7-x64
1facebook_d...e.html
windows10-2004-x64
1facebook_d...c.html
windows7-x64
1facebook_d...c.html
windows10-2004-x64
1facebook_mobile.html
windows7-x64
1facebook_mobile.html
windows10-2004-x64
1facebook_m...y.html
windows7-x64
1facebook_m...y.html
windows10-2004-x64
1garena_free_fire.html
windows7-x64
1garena_free_fire.html
windows10-2004-x64
1github.html
windows7-x64
1github.html
windows10-2004-x64
1instagram.html
windows7-x64
1instagram.html
windows10-2004-x64
1jquery.js
windows7-x64
1jquery.js
windows10-2004-x64
1linkedin.html
windows7-x64
1linkedin.html
windows10-2004-x64
1messenger.html
windows7-x64
1messenger.html
windows10-2004-x64
1microsoft.html
windows7-x64
1microsoft.html
windows10-2004-x64
1netflix.html
windows7-x64
1netflix.html
windows10-2004-x64
1paypal.html
windows7-x64
1paypal.html
windows10-2004-x64
1protonmail.html
windows7-x64
1Analysis
-
max time kernel
122s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
30-09-2023 02:20
Behavioral task
behavioral1
Sample
Instagram.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
Instagram.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
Instagram.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
dropbox.html
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
dropbox.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
facebook_desktop_homepage.html
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
facebook_desktop_homepage.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral8
Sample
facebook_desktop_static.html
Resource
win7-20230831-en
Behavioral task
behavioral9
Sample
facebook_desktop_static.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral10
Sample
facebook_mobile.html
Resource
win7-20230831-en
Behavioral task
behavioral11
Sample
facebook_mobile.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral12
Sample
facebook_mobile_fake_security.html
Resource
win7-20230831-en
Behavioral task
behavioral13
Sample
facebook_mobile_fake_security.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral14
Sample
garena_free_fire.html
Resource
win7-20230831-en
Behavioral task
behavioral15
Sample
garena_free_fire.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral16
Sample
github.html
Resource
win7-20230831-en
Behavioral task
behavioral17
Sample
github.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral18
Sample
instagram.html
Resource
win7-20230831-en
Behavioral task
behavioral19
Sample
instagram.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral20
Sample
jquery.js
Resource
win7-20230831-en
Behavioral task
behavioral21
Sample
jquery.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral22
Sample
linkedin.html
Resource
win7-20230831-en
Behavioral task
behavioral23
Sample
linkedin.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral24
Sample
messenger.html
Resource
win7-20230831-en
Behavioral task
behavioral25
Sample
messenger.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral26
Sample
microsoft.html
Resource
win7-20230831-en
Behavioral task
behavioral27
Sample
microsoft.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral28
Sample
netflix.html
Resource
win7-20230831-en
Behavioral task
behavioral29
Sample
netflix.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral30
Sample
paypal.html
Resource
win7-20230831-en
Behavioral task
behavioral31
Sample
paypal.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral32
Sample
protonmail.html
Resource
win7-20230831-en
General
-
Target
paypal.html
-
Size
3KB
-
MD5
6e2f15c66234a7e12e150123fbd69ab6
-
SHA1
c45192d8b147e4c604bdae79ad3e4a8c4a4227af
-
SHA256
4121306c2b9cd81ff08ee1078b0359a9dc8baca6522b9fd806d8f805d9ee564c
-
SHA512
f47383d2e21b440091cb99dc1e3172e80dc171a51b92ecccd24004a7783444236d975e4eeecea27700b3bdf0eae6bc484f60ebb01c039878cc1e1ba545b7deba
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4005a3db44f3d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "402202342" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{06C60C91-5F38-11EE-973C-5EF5C936A496} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008c66dacf3255794896cbcb5ac20a714000000000020000000000106600000001000020000000947279ea7834b7e48446043d139ae579372cd811c635f637724963e6eb71a29c000000000e80000000020000200000006c2c16659b9ba2d35abe4e053cde5130ab9c24c7f526e294cdded32cac075dba2000000077adab7a1ca01ce64da7cc241b687f30f211967476b403c2e5b6af546f1a226740000000db331b304758152186068c6602b2d589046500593afaaa93117f52cdde5322a126ad05de030f79aa5733c68e7773e06d947e5f7915159cf6df24043f5a1cb9bf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2160 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2160 iexplore.exe 2160 iexplore.exe 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2160 wrote to memory of 1984 2160 iexplore.exe 28 PID 2160 wrote to memory of 1984 2160 iexplore.exe 28 PID 2160 wrote to memory of 1984 2160 iexplore.exe 28 PID 2160 wrote to memory of 1984 2160 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\paypal.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2160 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ae3baac828aeb45bb56401310cfa6f5
SHA1712f71f335f1a6c5a698039baf85f2138456ebec
SHA2562f90263b75b2e35472ce68016df89c6090cd9512a5114bf498ccccd19f190b74
SHA512199b0d0422e4e7c3adbca700bf82c41064d428e85934b219a07192dea8674b0c0350d3633172def0f5513fd2f9bc3140782c19b96c5f5b37a44fa2a5c1108d76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2f2c004a22f92e3047e37a1aa8765eb
SHA1e31083f14b77be92bf3c621ffbe394bc2b16f1e5
SHA256280197de5f042f6ad72430362b39cbfecf9d1fa1cbf609c498b310e1e07621f8
SHA512ef0e920c75b2165708fbc7ab58089ee0653b189fad7551963920b55ce8f7ea1f2e9c478dbeb93ed16b4cc8c9868b81d57597961813f79d6ef86f057a111b7e84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4e7f32fd410f646140d8bf276a9f973
SHA1770617d699491260be41cfe929aa0b9dde08c061
SHA2562d0cff9f4f42e792b4df0ec3d5803525e758d5afec3496759028427106494dd9
SHA5125b4a0d6736e418dfdb3f724867e7e9f4b0957286aa4af4c024bae159c0fb9a95e721f715b653fab967b6563a3ca7a52a8ef1cdbf27aa701d0ffb7c1e45f7ee65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8558c6c20d88e326dae907d7285b8b3
SHA1d175dfc45465a07de980a25a7ab180d326c1ada3
SHA2560edaaeb9939ac433ffca7c611d975322f9afb3e1d2558dbb5a8187cc1a6d1196
SHA512bd3692603f01243061c450273c8de15bc79e1fc86b6c49bea452cd14351169685a5c2625576eb4bd3df47dd6d24421eab990e4194837dcabe91f119d2713895a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554dee9ea3f5fd1e9312cdfeb33f094d1
SHA1e63e2e3c2fcb5b05f02b1f60a7a9eee0396079fc
SHA25679f767853c8e0e1ef3ba912f32c95b02b3fde59f0a30fb056f331e6eb325f14b
SHA512c07acb13c7ce3719b0c857269747df63ab2512c4c37c187a3b05bb4209ba01d8072f01dc97b9a828f33d0dafeaf94a92bfb9a3865b461861fc7b3e064e53fda0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5476177cb0c92fa5f28824252a095c1b4
SHA192031e6bb2c0c63afde4ee5d06246fd5084c9c5a
SHA256df7851bc491e5249b15c5d6980cd004169005fc6c2470270ec8d4c7c2587ce29
SHA5128d4b8058fe19065ca07ed49132c8a14eca64c0f5a2723f1d1c2659e47a6c77735c3514c14475893d85006589dca10984e794a8548e4cf2306db36f97cf2c9fc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2107cf57496be3ad8cddcac5ce91711
SHA114d15cda9fde5dcd20bacb565033dd25b835872b
SHA256ae981f2c11108ab8055afe38c50e2c9f3271c0d3e99805da755278128c41767f
SHA51243e93dca7b13a92c9b60e3f0191c4ddb5759357811f048be178a4ab42709271135bf5b15e93d387e1a44b557b555ee89a0843edb36ea5cba308be37f06754ff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54206c9cd6d5b58e82b07c04586651c79
SHA14e9f71675d8e1df84f45fbd81f976923b53ea924
SHA2565c2098d40f9a736d130bafc79856840248d2dd910414568b641172a19f2fdb64
SHA512dc63b5c124d2adb3162721f6c0778ad3109fc23193da5444822ed23cb04cf5e698ae763baf2df657445d50de0780c6cfbb508776df44c10155139c19fcdcdd63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5848d40097d4a526ee3400885daf7aefd
SHA1e613075b86770e4c34606c5213ae6b9bae7b68a2
SHA256470534b03935f0380c602439b0e92a70524b017c20ee00e4bc0e63db3c6d4c9c
SHA51217dff4e94cf4293309852e35abef1630609cb5cfd3257437ae0a701e3c1865d4d122aeb61e3002a62e7d7e23879cd9a27e7ac5a9e4e6dc1ecc6200c0936591ee
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf