Overview
overview
10Static
static
788a50ba6ab...aa.apk
android-9-x86
1088a50ba6ab...aa.apk
android-10-x64
1088a50ba6ab...aa.apk
android-11-x64
10core_wrapper.js
windows7-x64
1core_wrapper.js
windows10-2004-x64
1faq.html
windows7-x64
1faq.html
windows10-2004-x64
1help.htm
windows7-x64
1help.htm
windows10-2004-x64
1help_cs.htm
windows7-x64
1help_cs.htm
windows10-2004-x64
1help_de.htm
windows7-x64
1help_de.htm
windows10-2004-x64
1help_es.htm
windows7-x64
1help_es.htm
windows10-2004-x64
1help_ru.htm
windows7-x64
1help_ru.htm
windows10-2004-x64
1help_uk.htm
windows7-x64
1help_uk.htm
windows10-2004-x64
1license.htm
windows7-x64
1license.htm
windows10-2004-x64
1mraid.js
windows7-x64
1mraid.js
windows10-2004-x64
1omsdk-v1.js
windows7-x64
1omsdk-v1.js
windows10-2004-x64
1playstore.htm
windows7-x64
1playstore.htm
windows10-2004-x64
1privacy_cn.htm
windows7-x64
1privacy_cn.htm
windows10-2004-x64
1totalcmd_d...ng.htm
windows7-x64
1totalcmd_d...ng.htm
windows10-2004-x64
1totalcmd_p...cy.htm
windows7-x64
1Analysis
-
max time kernel
138s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01-10-2023 22:01
Static task
static1
Behavioral task
behavioral1
Sample
88a50ba6ab5d4368b10010758cc4bedc99d76393239207a2da1626627bfe80aa.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
88a50ba6ab5d4368b10010758cc4bedc99d76393239207a2da1626627bfe80aa.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
88a50ba6ab5d4368b10010758cc4bedc99d76393239207a2da1626627bfe80aa.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
core_wrapper.js
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
core_wrapper.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
faq.html
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
faq.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral8
Sample
help.htm
Resource
win7-20230831-en
Behavioral task
behavioral9
Sample
help.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral10
Sample
help_cs.htm
Resource
win7-20230831-en
Behavioral task
behavioral11
Sample
help_cs.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral12
Sample
help_de.htm
Resource
win7-20230831-en
Behavioral task
behavioral13
Sample
help_de.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral14
Sample
help_es.htm
Resource
win7-20230831-en
Behavioral task
behavioral15
Sample
help_es.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral16
Sample
help_ru.htm
Resource
win7-20230831-en
Behavioral task
behavioral17
Sample
help_ru.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral18
Sample
help_uk.htm
Resource
win7-20230831-en
Behavioral task
behavioral19
Sample
help_uk.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral20
Sample
license.htm
Resource
win7-20230831-en
Behavioral task
behavioral21
Sample
license.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral22
Sample
mraid.js
Resource
win7-20230831-en
Behavioral task
behavioral23
Sample
mraid.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral24
Sample
omsdk-v1.js
Resource
win7-20230831-en
Behavioral task
behavioral25
Sample
omsdk-v1.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral26
Sample
playstore.htm
Resource
win7-20230831-en
Behavioral task
behavioral27
Sample
playstore.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral28
Sample
privacy_cn.htm
Resource
win7-20230831-en
Behavioral task
behavioral29
Sample
privacy_cn.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral30
Sample
totalcmd_datenschutzerklaerung.htm
Resource
win7-20230831-en
Behavioral task
behavioral31
Sample
totalcmd_datenschutzerklaerung.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral32
Sample
totalcmd_privacy_policy.htm
Resource
win7-20230831-en
General
-
Target
totalcmd_privacy_policy.htm
-
Size
3KB
-
MD5
f5bd54f89d624a56a0368d1bf532c60b
-
SHA1
6fdb247506d811132bc5b51ffc1d82afeb6e72b4
-
SHA256
eb87dd5ca31a26b9d8a8bc650c324b49027d38242ffc71a89b04e0aae8b4cb4b
-
SHA512
8dc96be4781bb08b1dcbc3205f59eac592285e98a349a330301ab32e81a25beebd9224880215c62e431d9926c7ed0433e886b61730ada1012ca2f907fcceb263
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40c27ddeb2f4d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{099B4381-60A6-11EE-A400-462CFFDA645F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "402359542" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000918258b1c6eaef44bc85c7515db804ef000000000200000000001066000000010000200000002430a2044f9f02dbda3eb134c8419a60b0aa548e50248690af9b00842ad60c04000000000e8000000002000020000000b2f9c0f870946a88a15921eb760325ff1cac4ed3a8d7398f8b812e105ba4d70620000000d11acca57b78942ffc40e95070836c658ed3ae85e84f7e5da8000ff3228abe3a40000000edda19eb081778887b3ac9c00efae422dd07826ce67bf945f02b88aa24150e81c79c52c15f717e573efdf6f85a47da2c1e7d72e659ae1cb3c4385b1508e29db4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 2164 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2164 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2164 iexplore.exe 2164 iexplore.exe 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2164 wrote to memory of 2004 2164 iexplore.exe IEXPLORE.EXE PID 2164 wrote to memory of 2004 2164 iexplore.exe IEXPLORE.EXE PID 2164 wrote to memory of 2004 2164 iexplore.exe IEXPLORE.EXE PID 2164 wrote to memory of 2004 2164 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\totalcmd_privacy_policy.htm1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56caae45c435b74d131dccfb0ed54c321
SHA1f990e45e6d1ab21968f61b7fca201f878cd41faf
SHA2566152275bd22d620ff58a41eb9c5ccbb3413c6a7c31df7c7ac5e8f413c81f18fc
SHA5126053a565f971529220c96b90d4ffe217bdf433f3a494ecc996575c756e4704fe7dd607486a0de225e47de09fa88d24e560d61191dfd964900604c253daea2119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e356e685f18289d882d907e13636f183
SHA1f924955316831b41574162009815fcbf4fa87399
SHA25678226c452d121ad0ba667bf9a4a1bd1bd668c50ee7419e8ebd1d733463ab5502
SHA512bcc5a814ce83519ac9e678b23fd74e3e09fc075b4f387a37cf50773187d55ab56282ea87f526eb0323a9651aa9da0ad4e61657b3cfb7f4c143e57881a50ff954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c1235436eac1aacaf7809ca0491852e5
SHA10b68a1d773df1193cd3d8e2f7a58007c04c46198
SHA25603f973a72b3c143fae280cde84b211158a949bc2fa1d7de0ea88384d66f0bd7a
SHA5125faba7bc5fdc4b26277eee4f7ae9d4d1133f95635958bb700153407f518279ad433dc0ab8267626880eb061c31a33fb5348ad83d8773e4534f95b4a76c6d42b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d923118b27be0d8554c79ab64f399e66
SHA1ae8b4a3779672103bea46acfdae160ae41eb4735
SHA25682acdaea05b91304e4ceb4fc76a85104c2c2d6c242d09c9b4f75cd46f70b5bdb
SHA512b4d96c43bb0ada50f32c0180a799ab73f497f4681ba89c9518487e848a2f22a962c5a3667df4c71b4fecab13ca8517dce8e166e2b15141b77f9b70523b9bb08b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b7f4f5e7a7798c7039e4dc32ccc57f46
SHA17dfe27a50b3d0c08e54c1d18bde08e69cb8c4916
SHA256ab3f71306335b7d68b1136cae670b83960fd02755b2b98e6214361a44b86e585
SHA5128084945d5e3eb949f8a995e358ae91603630e43850d7f1ba28eeab6ca39e6a3b859891049c5b67e1589ba91317c2efaae7cf806a8f8e90c36b9145074b97aeb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55994d33eda924054b01da1fada974b05
SHA143f9b62516800026fc662ccd540e3339ef6b3516
SHA256d8497446dbd8affff11bc8681aa04094c2a629b5f717ae561da65fed89d62c30
SHA51221d67951b9c98a4bb0fd2643f7374a2573769dd6b6e464f2a140de017955f15db399c11641b663a283d206e48ecc5c039e4f01feb8f06efc7e493bd766695fb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54c82584dc55373aa564832c8fdf5bfd2
SHA1eedd21a98f04b84ffd4e0dd41c615ec690ab7ac1
SHA25688ba92bf703792c18305e40aabbbc88253c77bc7646d14ce6d43f78cc9dd5cc6
SHA512debfeac4dcf11a4c347833b2dafe67dd68488d1ee149ba6ccb1c244c54c82edb43585c797bb5ad4cacf52177a205f1390b29838d484d1aaf21248a0229b88967
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5322610618045f5a01f5ff9e2918a5175
SHA11e518c4d8e988173597a474c0b8ec5023ac58c26
SHA256aedd53262abe7a83feedc8dde1426a4e123602ff27609c190b1c5be0285e7c80
SHA512ca803220a24269ce562acaed26068383b8128e2fad2a7f76f6e7a28a5209ebc71d6cad3e833c3ee1ddb7fc83499c874a088a561092fa5e2d7c4c6fcdb779c5cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56020077218f08c28f868a00471ea1a74
SHA188cc0a4d8a40ba7f125b0a43ae151d1a0831cf47
SHA25643e34f79737f1b95023d1f46145d83c5400579738fead3dc1f7d483cef0b713e
SHA512b45c8ead460f11e29cb5c4f7ddfd4bcad75c60b57dad5ee39205657e88b24bba1f023c092cce66f86f941f052c89612dad38a22c7beed1fc29847c58a3c9ea28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d84e927d47e69bcbf95c820f97848b68
SHA11bbe0d7a70187a6e3368cae39ac6c6bfc2fadd0c
SHA2563438ebcd4fd765de8f0e35d1969469d8c9c28f79bfd70270e1c635b14b2f30a5
SHA512b504081679df8456e90235512f2ee045570111d4e889d303888213382a5df31a24cbe4f4c9cf0b05fd2b71101b6c83ac155a7938c0a224c20586d71f4e8d525a
-
C:\Users\Admin\AppData\Local\Temp\Cab713D.tmpFilesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
C:\Users\Admin\AppData\Local\Temp\Tar717E.tmpFilesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf