Overview
overview
10Static
static
788a50ba6ab...aa.apk
android-9-x86
1088a50ba6ab...aa.apk
android-10-x64
1088a50ba6ab...aa.apk
android-11-x64
10core_wrapper.js
windows7-x64
1core_wrapper.js
windows10-2004-x64
1faq.html
windows7-x64
1faq.html
windows10-2004-x64
1help.htm
windows7-x64
1help.htm
windows10-2004-x64
1help_cs.htm
windows7-x64
1help_cs.htm
windows10-2004-x64
1help_de.htm
windows7-x64
1help_de.htm
windows10-2004-x64
1help_es.htm
windows7-x64
1help_es.htm
windows10-2004-x64
1help_ru.htm
windows7-x64
1help_ru.htm
windows10-2004-x64
1help_uk.htm
windows7-x64
1help_uk.htm
windows10-2004-x64
1license.htm
windows7-x64
1license.htm
windows10-2004-x64
1mraid.js
windows7-x64
1mraid.js
windows10-2004-x64
1omsdk-v1.js
windows7-x64
1omsdk-v1.js
windows10-2004-x64
1playstore.htm
windows7-x64
1playstore.htm
windows10-2004-x64
1privacy_cn.htm
windows7-x64
1privacy_cn.htm
windows10-2004-x64
1totalcmd_d...ng.htm
windows7-x64
1totalcmd_d...ng.htm
windows10-2004-x64
1totalcmd_p...cy.htm
windows7-x64
1Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01-10-2023 22:01
Static task
static1
Behavioral task
behavioral1
Sample
88a50ba6ab5d4368b10010758cc4bedc99d76393239207a2da1626627bfe80aa.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
88a50ba6ab5d4368b10010758cc4bedc99d76393239207a2da1626627bfe80aa.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
88a50ba6ab5d4368b10010758cc4bedc99d76393239207a2da1626627bfe80aa.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
core_wrapper.js
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
core_wrapper.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
faq.html
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
faq.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral8
Sample
help.htm
Resource
win7-20230831-en
Behavioral task
behavioral9
Sample
help.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral10
Sample
help_cs.htm
Resource
win7-20230831-en
Behavioral task
behavioral11
Sample
help_cs.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral12
Sample
help_de.htm
Resource
win7-20230831-en
Behavioral task
behavioral13
Sample
help_de.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral14
Sample
help_es.htm
Resource
win7-20230831-en
Behavioral task
behavioral15
Sample
help_es.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral16
Sample
help_ru.htm
Resource
win7-20230831-en
Behavioral task
behavioral17
Sample
help_ru.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral18
Sample
help_uk.htm
Resource
win7-20230831-en
Behavioral task
behavioral19
Sample
help_uk.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral20
Sample
license.htm
Resource
win7-20230831-en
Behavioral task
behavioral21
Sample
license.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral22
Sample
mraid.js
Resource
win7-20230831-en
Behavioral task
behavioral23
Sample
mraid.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral24
Sample
omsdk-v1.js
Resource
win7-20230831-en
Behavioral task
behavioral25
Sample
omsdk-v1.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral26
Sample
playstore.htm
Resource
win7-20230831-en
Behavioral task
behavioral27
Sample
playstore.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral28
Sample
privacy_cn.htm
Resource
win7-20230831-en
Behavioral task
behavioral29
Sample
privacy_cn.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral30
Sample
totalcmd_datenschutzerklaerung.htm
Resource
win7-20230831-en
Behavioral task
behavioral31
Sample
totalcmd_datenschutzerklaerung.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral32
Sample
totalcmd_privacy_policy.htm
Resource
win7-20230831-en
General
-
Target
help_de.htm
-
Size
59KB
-
MD5
52e18bac42fb06e4116cdaee988e0661
-
SHA1
9d0ef32f76cab08d380ec1359e414fbbd1d207ae
-
SHA256
54d12be384ad0a78c68a416873338edf8ceb5601a20895ca6aef9360b0cd75e8
-
SHA512
8a2b4e11b1a368075b8871bf90517890c79dfa88ac2bc9b355af305fe134b6ec4c6d02a50d334ee3b734628f4a0f7df142fe30b5acbfd33abc9904cd48c485cb
-
SSDEEP
768:cklY6UHcqSlF+xUVPB6rKboSNzCWidlub1uaablOEhEs8e2gcaUrF20OzGJPCGdC:AH7SlFs2Pam9idlub4los8e3ZUrgVETC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00b920dfb2f4d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000918258b1c6eaef44bc85c7515db804ef00000000020000000000106600000001000020000000aaf6530b019d9bbe3b1e04be5a35d76cbe9177ba0b973f7de73aacea88e39445000000000e8000000002000020000000a2aa9a0deebc3d70b8849d19c98aaaefd6da3a4167530e2d707455356c06742f200000005e94542121f97e5e32ca977a4b5d54dfd940a84c38e6ed835fada33b76c89e614000000067d7981563500b37ed3e3526837ebe839dbbd32064148515d37720d8773ce807725fa5110e0ed2a3fca9fb1a41a72f650a84b60299c2e60e8341fc70ffcb38b8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0A2C19A1-60A6-11EE-97B5-7AF708EF84A9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "402359542" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 1280 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1280 iexplore.exe 1280 iexplore.exe 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1280 wrote to memory of 2220 1280 iexplore.exe IEXPLORE.EXE PID 1280 wrote to memory of 2220 1280 iexplore.exe IEXPLORE.EXE PID 1280 wrote to memory of 2220 1280 iexplore.exe IEXPLORE.EXE PID 1280 wrote to memory of 2220 1280 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\help_de.htm1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1280 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb179402c9b213b7149c8b5ea843016f
SHA191ca80ed9ee7f388fc44f2e0e33decaf93e67625
SHA2565ac88ae530da027fb79f9f2e9809de90dd35e1e0ba51e87c625f5cf84d2bb819
SHA51271a48a6bc5e487270015a05d67fcbd8a762f62bfaaa5707f8fef69db4141781c6a077fde37aeae617b784645dd036b54f12014561c9844488fd5d6f61a72a440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7c71c6145b86d3a1185be28140ea099
SHA11c532a5a7cb102accfa7ddf8a21ad8a4eb5bfb10
SHA256395d795e4a63df61be1dabd577f442902b68588ffd053f30a67dbb2c6d928b9c
SHA51237c848d0507f9ad10ef0254be756f1f36ad8aa2cbd5087f37204f74315d0885918544909e11fbc87ef241d6c4f418893afa6c4167941963bde3e3117fe4d7eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51089c749d6cfa9a1d06e8624e531a40d
SHA1a7310f0cd0eb9aca6e42fd2240adb4a2737adfec
SHA256447775bbdeee362d0ea700e00ecdfb1c7174aec57ddca7e89faa9dba030776d0
SHA512b2daa358ed56510aada12be93784a94ccaa2fad88d83106957f0986cc9d6951ecdfe433515113d3f312eb81263fb59ef6bf73c24e2b11c9066fd271d1be1a25c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f536d010183b1c432ea0c3e6e5d7a7dd
SHA15754a01b7ee474c1afe5454ebbbf450c87d18678
SHA256acfc7485e37f83960522ff56e52ecbde03dd0b57da4e57fef669806d1c4bbf28
SHA512d4c973292962b12066f0fefcf2a1cf12de15834d0a3d1e5e29c37b29d83587be7c286a9698bd77a53c82b012be2de76b82b6c881175de061bdb1a9efc0fd3c1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a2d0f09b7894061ce7eeba81d31330b
SHA198645fd6ff009713805638a52299eaf2733ccde8
SHA25647312fbe79e9b3472872f54aa86149108b19009847ac51801623e41f4291176b
SHA512846195e988a299c719d45182b4d0fd9dd14a27be311323007fd19456978c0d78a52bb98306ca907f75788c349f87c9accc58bc5dc2c71ab69bb56a41dce00c35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5229dd00e0633fa4071602c4f0b39aadd
SHA1d84bea2a2fe62b3db8582a04e13e870c6aec3c5b
SHA256f04158240ec93ba0c720acf9314c27d052f4731c00f102fa6eb4487848aa98f7
SHA512841c73734e3db57a5851c4e5447e9b327222b7e7c0fae21d46881b3b9e7baadaf437e805e2eebdb8453738794753e6d2ba4546cfe2a263d7d61afe4766cb1c49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2cc630bb038eb388aad2d3f1122643d
SHA1b85a030fb99691eac177745b35420a09bb69cbff
SHA25698d28c654c5a2792a5d6406883d00a14b03dc4690395684b8aec15a43f5cdffc
SHA512404fb7b7f9bef7114ba860d7a597e3a349095825ce9ace59bcfe98831aebaa4d31cfd016093fc1032d650cb426f8e01b43ab817fbfdaf922d209d2383376d50a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8f35d6b1768f5579ad9ac2f34e7c005
SHA1d47191e371cb5a3e4bd402f1e419d014082191fd
SHA256d83ab0efdf8407487df94a684c3c5a94dc7661a61196af6c9e53d6806bc49b11
SHA5122123a386e23dec0f7d75acd0c6b82be4bfb4bae9734ab84dfe0cff290d564ccfb23fd278c63d7593a0b1fa6f27f84684996bef6ad262a8ae51714d4e34fd7b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfce23ad37534311ee4c5d552bbfe218
SHA1b370f2c6781710e543d94a72d26af640101c4844
SHA256ebabd91028902ecef1ae084c4bebb398bb8a4697fa155a84dc69d993a7649e32
SHA51269dd3ef9b1b3077cef4e014cc229e45fd7ae7de88325db113743931f4bdbd802fe81d5e454b4ea49a7091f3548765e8917cafba5587e3ba969ce770c09ea8970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55da110ab0fb4823fbbedc94b9819b8c8
SHA1394a9f88ecc751baf9c5d0109591cc946c4a09f1
SHA25675e9436b6310b05664b1f924de240544cc95f08ba8a4274115968abdac80f66e
SHA5123792c33481f51a0956a79eefa247daa49bad890a5d700348b1e6075cd7d9c8e37d788fb6969347a2a653f712917f294c1a6da795a0a5add69439021300d72e3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f413f12db6dd86d304d169851017d68d
SHA14b7167751586658dc842195854941f924def3caf
SHA2563d225fa11e85f8d1a141643b991b8a4f2d4a81a9c7396309c517743289f900da
SHA5126033ce8d479daa20e8793f00dddbd3b59f2366945b6bcca75ac8666851b8e717c458a36cc27bde951a1121be7961b05b00109223df54607cd0814d4264313a1c
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf