Overview
overview
10Static
static
788a50ba6ab...aa.apk
android-9-x86
1088a50ba6ab...aa.apk
android-10-x64
1088a50ba6ab...aa.apk
android-11-x64
10core_wrapper.js
windows7-x64
1core_wrapper.js
windows10-2004-x64
1faq.html
windows7-x64
1faq.html
windows10-2004-x64
1help.htm
windows7-x64
1help.htm
windows10-2004-x64
1help_cs.htm
windows7-x64
1help_cs.htm
windows10-2004-x64
1help_de.htm
windows7-x64
1help_de.htm
windows10-2004-x64
1help_es.htm
windows7-x64
1help_es.htm
windows10-2004-x64
1help_ru.htm
windows7-x64
1help_ru.htm
windows10-2004-x64
1help_uk.htm
windows7-x64
1help_uk.htm
windows10-2004-x64
1license.htm
windows7-x64
1license.htm
windows10-2004-x64
1mraid.js
windows7-x64
1mraid.js
windows10-2004-x64
1omsdk-v1.js
windows7-x64
1omsdk-v1.js
windows10-2004-x64
1playstore.htm
windows7-x64
1playstore.htm
windows10-2004-x64
1privacy_cn.htm
windows7-x64
1privacy_cn.htm
windows10-2004-x64
1totalcmd_d...ng.htm
windows7-x64
1totalcmd_d...ng.htm
windows10-2004-x64
1totalcmd_p...cy.htm
windows7-x64
1Analysis
-
max time kernel
134s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01-10-2023 22:01
Static task
static1
Behavioral task
behavioral1
Sample
88a50ba6ab5d4368b10010758cc4bedc99d76393239207a2da1626627bfe80aa.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
88a50ba6ab5d4368b10010758cc4bedc99d76393239207a2da1626627bfe80aa.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
88a50ba6ab5d4368b10010758cc4bedc99d76393239207a2da1626627bfe80aa.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
core_wrapper.js
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
core_wrapper.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
faq.html
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
faq.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral8
Sample
help.htm
Resource
win7-20230831-en
Behavioral task
behavioral9
Sample
help.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral10
Sample
help_cs.htm
Resource
win7-20230831-en
Behavioral task
behavioral11
Sample
help_cs.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral12
Sample
help_de.htm
Resource
win7-20230831-en
Behavioral task
behavioral13
Sample
help_de.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral14
Sample
help_es.htm
Resource
win7-20230831-en
Behavioral task
behavioral15
Sample
help_es.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral16
Sample
help_ru.htm
Resource
win7-20230831-en
Behavioral task
behavioral17
Sample
help_ru.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral18
Sample
help_uk.htm
Resource
win7-20230831-en
Behavioral task
behavioral19
Sample
help_uk.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral20
Sample
license.htm
Resource
win7-20230831-en
Behavioral task
behavioral21
Sample
license.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral22
Sample
mraid.js
Resource
win7-20230831-en
Behavioral task
behavioral23
Sample
mraid.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral24
Sample
omsdk-v1.js
Resource
win7-20230831-en
Behavioral task
behavioral25
Sample
omsdk-v1.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral26
Sample
playstore.htm
Resource
win7-20230831-en
Behavioral task
behavioral27
Sample
playstore.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral28
Sample
privacy_cn.htm
Resource
win7-20230831-en
Behavioral task
behavioral29
Sample
privacy_cn.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral30
Sample
totalcmd_datenschutzerklaerung.htm
Resource
win7-20230831-en
Behavioral task
behavioral31
Sample
totalcmd_datenschutzerklaerung.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral32
Sample
totalcmd_privacy_policy.htm
Resource
win7-20230831-en
General
-
Target
help_es.htm
-
Size
61KB
-
MD5
31772dae5e7e480072ed6d872134201e
-
SHA1
4c19adebf12a2aa4be9773ee4226fcbc79b89e84
-
SHA256
f088fe7faadb088d3f63ad8f6d6eea2d88abf4e7318e31e17dbe52d5e4f92707
-
SHA512
5f19c826336d100b5d104002eb0b35dbaf24889225630a3e9c31aeab3d77d912adaec0470d1d0fbd2e60956a11eaccbff385bd7d28ef8acf7dbccc9434fe8e2b
-
SSDEEP
768:hLYLmYEm9UhhJ6TJ5w7NKVwvTAybuosWqPOg+YS3+brRzf:hlYjikW7NKVwbootYXfS3Sx
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "402359542" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008c66dacf3255794896cbcb5ac20a71400000000002000000000010660000000100002000000071d62a45a1fd9fd864c6798ca01b08c05a9f4d49312e5b10b24f530e47868f04000000000e8000000002000020000000040a162a8584ef1efc059cb3b2bb16bfc136c2cd892d360829fdb725ac1ae02e2000000084e4e7dc0f4b89d9de999ee8fce95e4e7eeb2240de6f5cbb740fb92234c0c1b94000000067317b3c49478a9679c585fe8166652ca80b62af1c1bd46c206ea1d92cb5a08ac368218e506d617b208b6a1c4b05ff37f5c8df54bd940bad622af134268c7491 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 007bd7deb2f4d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{096815F1-60A6-11EE-9340-EEDB236BE57B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008c66dacf3255794896cbcb5ac20a714000000000020000000000106600000001000020000000bfc0569711266ac62484372e81ef8cf62206193c094f7ec935e87609e582a159000000000e80000000020000200000003522f2de13b659403310deb2aeb2201d04566134e0d64a0f5fc381bd1e85a2ad900000002d4639b7d62a057914f0bf7844e9a723e71f37b6288a65e453f911d9d72466d188e8df269dc06df6c77145db96a682f9137848052288a2e38ca2446d368f375596abda62b72a4e9b73fdadad3e1515c63d6395e31424d4524ff82448759e33a1ee6efb43301c6e54f7612bc4318ff68e166c6ae5b5f071c3a89bf89f326a0bd5dd311177d59bed322e6c687f814978064000000093b42a2f0046fa5c1ca252ecbb6a8b0e26c5e7e33ab5a20679af44a0f8ba47b4854964b569cd11146a4a98a4fc8da7b623c3d16797ba1dd088c996674a526fac iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2288 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2288 iexplore.exe 2288 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2780 2288 iexplore.exe 28 PID 2288 wrote to memory of 2780 2288 iexplore.exe 28 PID 2288 wrote to memory of 2780 2288 iexplore.exe 28 PID 2288 wrote to memory of 2780 2288 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\help_es.htm1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5454ef7280fa47cad82aa5dc819d9c43d
SHA134ccb6df2ce1ad57941d3589bc27a1b325846db2
SHA256b469d89a55e14b587e9aa1f796088082f27ea95658f15cd5b18d3c7853fe547d
SHA512ba0f7c7d59a9735c8d9f789e071cfd46035d921a86f39bc484a9deb19ae2bb00a7a2ab6183f29ca0558b027e458a09cc936ca441012c9ce93967d83328e16881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505bac68633f8f3e2a87566b51d29bcb7
SHA12e20c040756bb6e87db71ae802c817e8783ed73b
SHA2561b02bd4e99cf355ff415d72be3fe694ec123f96752f6183e22a0da1adba91b37
SHA5121ee44888f7137df6c54cdea0819ee82457971cdc6897c93fdf5145998db70ae77f6f9c1eb4bcb10dfbec06d0dbdf4bf8364221dc6642de8d273da5cd03f1d099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fc1677010deded2de3b7cb27091446a
SHA116d909dcd4a817780ead6be100f1a350478cc8f4
SHA256ed89b4e3723bdd4a7e2ab6dd1e50ddf8e7a5e2c93a068d3f27a5bb2318c40638
SHA512f1003efb874b356026a9fcdfd4ccc3e49f7f7a04a5305efded6c87b099b2777e2839dbbab56f1ded2c72be558e60b581563f5f6972bec2f066726380c263ff33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5d15c113349fbeb4814df644109c905
SHA1b53407017002f40bf02537b576da4724e02d166c
SHA25645286c692598f06767492f18f46eedfc95e1dc97adce7a2a103eb9852f0082b0
SHA51265e5d58560e301352f118e71ebb2e5dd79779662584b3eb539e5d6e55f9d184abbb33512ae9c28bf4e71fc8860c898cb5915b4ef80ec89a75453341261c88466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5419db71be244b6522b16520ef1f69077
SHA16d283e8ef89e1dd3207464eeebc0618410c3a1bc
SHA256bdfa51bfc84014bed58a99f02d6830ce1b290ece49001886c570316d98a37cc9
SHA512d6163f9a96c8c7989930ee9ae5c485c66bb77e65918ee5710a7785293de8eb390041677403bbf769a9b3376bede652a7e23aa0e8276caa51198e9794d840e587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f851e2334aa6ae77b76fbb2331a461e
SHA1d542cd4737afd84dc50d53b8af8c305464cbf663
SHA256f67812e04c6fe8e30cae6244fa8eaf7022e00809e820251464406cf6c60f7cd4
SHA5127b925eda3e019dc00c4b11b12e081a3585b6da83b759ac502fe3bddfe6b830c7fcd80296642d0ca3557964043c81d240a4d9d0276232e7bb21b1491970cc81e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5107122e6f013be029048fa55a53a8948
SHA1d6163d8e9a71d443a12471ce256e317dee7a667e
SHA2560efd46b044f5b63ed02dc0541a618ba8389b20197f962cdcce89115a9bc14eb9
SHA512ee1464342ff0d25c2515b583d1c35a14b4dc3c7a5eeb16da727329975ad34b405fe6e255f144b2c068a89f90ffbce4c8292c16d2919c95c2166096986ae3fcb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c0e9eb72df4cd43a2f1502386bcb6ae
SHA1c2a0a6960c282f0955cb624bb7f9a027fd93529f
SHA256bab1e32db7f0255e635188a97f9e343a1fd855e154e695d0989c181ba5dcc93d
SHA512879e6bff8c335ad3041f893ec588cbaf2185ba161f4c98145706798df28ff3293295b50ee55cd98af1d5e50713f52ca73eebd4563cca0e2988ba6d059a8de44d
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf