Overview
overview
10Static
static
7hydra.apk
android-9-x86
10hydra.apk
android-10-x64
10hydra.apk
android-11-x64
10core_wrapper.js
windows7-x64
1core_wrapper.js
windows10-2004-x64
1faq.html
windows7-x64
1faq.html
windows10-2004-x64
1help.htm
windows7-x64
1help.htm
windows10-2004-x64
1help_cs.htm
windows7-x64
1help_cs.htm
windows10-2004-x64
1help_de.htm
windows7-x64
1help_de.htm
windows10-2004-x64
1help_es.htm
windows7-x64
1help_es.htm
windows10-2004-x64
1help_ru.htm
windows7-x64
1help_ru.htm
windows10-2004-x64
1help_uk.htm
windows7-x64
1help_uk.htm
windows10-2004-x64
1license.htm
windows7-x64
1license.htm
windows10-2004-x64
1mraid.js
windows7-x64
1mraid.js
windows10-2004-x64
1omsdk-v1.js
windows7-x64
1omsdk-v1.js
windows10-2004-x64
1playstore.htm
windows7-x64
1playstore.htm
windows10-2004-x64
1privacy_cn.htm
windows7-x64
1privacy_cn.htm
windows10-2004-x64
1totalcmd_d...ng.htm
windows7-x64
1totalcmd_d...ng.htm
windows10-2004-x64
1totalcmd_p...cy.htm
windows7-x64
1Analysis
-
max time kernel
134s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
03-10-2023 14:33
Static task
static1
Behavioral task
behavioral1
Sample
hydra.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
hydra.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
hydra.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
core_wrapper.js
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
core_wrapper.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
faq.html
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
faq.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral8
Sample
help.htm
Resource
win7-20230831-en
Behavioral task
behavioral9
Sample
help.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral10
Sample
help_cs.htm
Resource
win7-20230831-en
Behavioral task
behavioral11
Sample
help_cs.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral12
Sample
help_de.htm
Resource
win7-20230831-en
Behavioral task
behavioral13
Sample
help_de.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral14
Sample
help_es.htm
Resource
win7-20230831-en
Behavioral task
behavioral15
Sample
help_es.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral16
Sample
help_ru.htm
Resource
win7-20230831-en
Behavioral task
behavioral17
Sample
help_ru.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral18
Sample
help_uk.htm
Resource
win7-20230831-en
Behavioral task
behavioral19
Sample
help_uk.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral20
Sample
license.htm
Resource
win7-20230831-en
Behavioral task
behavioral21
Sample
license.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral22
Sample
mraid.js
Resource
win7-20230831-en
Behavioral task
behavioral23
Sample
mraid.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral24
Sample
omsdk-v1.js
Resource
win7-20230831-en
Behavioral task
behavioral25
Sample
omsdk-v1.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral26
Sample
playstore.htm
Resource
win7-20230831-en
Behavioral task
behavioral27
Sample
playstore.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral28
Sample
privacy_cn.htm
Resource
win7-20230831-en
Behavioral task
behavioral29
Sample
privacy_cn.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral30
Sample
totalcmd_datenschutzerklaerung.htm
Resource
win7-20230831-en
Behavioral task
behavioral31
Sample
totalcmd_datenschutzerklaerung.htm
Resource
win10v2004-20230915-en
Behavioral task
behavioral32
Sample
totalcmd_privacy_policy.htm
Resource
win7-20230831-en
General
-
Target
help_ru.htm
-
Size
58KB
-
MD5
0b8a2f9f0fefa77f9b5e53371195d732
-
SHA1
53cdd30958d2863ba976fa4e9e7ceabdd85ffb60
-
SHA256
88212e9f4c88a33b0147f5aa5dd3f8fa434707b1b925e3d45fb03366e909ec5a
-
SHA512
5b3f90561d9b819dcfa05ef463c2453786b7d4adddc9ea5d84b2b2ebc07106fd6aa3b906e04b386cda7103e22e10d5430e258983d2aaf8880c4230ef06894309
-
SSDEEP
768:PRtY5bm3l9Q/DVcYRTI3n81skx61fJBwghQg:p+5C3l8Pu3n81sFBAg
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008c66dacf3255794896cbcb5ac20a714000000000020000000000106600000001000020000000cb3a2a2045f31f362e20740403328b9c0f2f2999fdab7ece7de1a3820ca94c6f000000000e80000000020000200000003a356d95e6b470def7918bde0e4d425721cacad9d0f626d3fb6f27ef784b3d282000000077fb196a6691eb716a7f57a45dd4dbbed2278da195f93cfdfdda61ebc876e17040000000612bf84b30e1efc313dcb50fb7667441755aa24065af9ca611f3825ed9ed0e25f821ac4b9b2b8db6907f122418436b157f87a4e6dda5586952b87aac335c3ed5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0A34171-61F9-11EE-A777-4E9D0FD57FD1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "402505528" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0207fc506f6d901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2840 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2840 iexplore.exe 2840 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2660 2840 iexplore.exe 28 PID 2840 wrote to memory of 2660 2840 iexplore.exe 28 PID 2840 wrote to memory of 2660 2840 iexplore.exe 28 PID 2840 wrote to memory of 2660 2840 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\help_ru.htm1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2840 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd52e76a8b30388368e8869d2b9ad15f
SHA15561b64d9d2335858670c2ed6eeb6364f5fdce95
SHA2562be80b8529fb2a7e58cd68676ecb9d64031094adf285dd0d7a02febf72e049f4
SHA512c6d1e712a78455507db93e4413ce0529f54a9f21ee7a32ed9f7258ae4207421da9354ddf0e74c27b9d6fb3a1cb9f627a9d679b8f55d61f05a1120736e49a3020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e59dc5e84641dd63f704ab06bace08c
SHA18f613b8176fac0edcd9769edb6104e4c64b88a43
SHA2564b106e9d0969cdeb3e9eb3852d7d777dc22813f64fef797b6074c8e11bb5648b
SHA51250bb2fc8aa456d048cf1a2f9a040547ee6be6e32ad23d4c5cdc695830165ff9b3aaba5b9e7919059f7f33d44659631a49f3d62ca6a8d02a7be36e20c09112298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f1955c8f9c3468ff616d7b9ad063d59
SHA17e7194ac846e5c0c3003bacac42b1ea4c81b0585
SHA2569b6390c1ce00c0b2da071d381b8255a1f4d23e6f76e704629924ab5660738576
SHA512d5eb251a52cdad29830880a0c700c364b833e9ca6354b58626746bf4b02749555f075eed7fc1ca6a2ef9704b07df7d1d19d264cb80ebe06b518a655ff6674361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d64e29e1a70d002027e42ebb241ea77c
SHA17b7bb87bea24c2a2358575df5e47df58c1a91bbf
SHA256b630b8b788f229b8ec0f3e8e039e5c204738a6e379879c9a5f72ddb80ff59aa9
SHA51295f811f1e6b81f51ff083e625085b46463de75eed4adccd0e34bcf1f28c806619216262c5b7604750d0540a1c58773eb82edbd2594840dbb8a7e88296d5a8266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507e930f48358490d67cc9dc32317a412
SHA1ca95f0db251f1f94cee23ca9326a6562a4f0f92e
SHA25676c379fa608ca49b5124279fad26ac7d3db0971f85282488c81d77d71ea371e6
SHA512c8824452c7cce3883771e77d53676a53114e94a85250fe2d00f90b9310582f3b596e009c989c13aea5ffb59aec204be600afe3002de86a2bf3e23b0561a9a4fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d266003a75bf69f371cd85cebd1f4e1b
SHA1987e9dcaadd7f85299faf04ea6e6a0946afb134d
SHA2566474cb84ec5c9fad4bc7ad6b516a729c4a82595a37cb221aa862e69d315f0087
SHA512db137b155206e6b370373daf4e2a3ffcec6128ce5a4545e9faa61d356cc01b839a48b4e2d0d905ecc28ca23e36b2214ed7220d159fb42ef85fecf56ceec069e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a62b216a40546ec85c859616a913a93
SHA16cf2e9019dbcafa645890afab5d313fe3505b723
SHA2562be9a6b44ba945bb80eef9a0f578c08f92a448c9ce9f5cb7353e019e7424066e
SHA512846daed92c330d679ad87e32e0f679a1ce1d76a30d372020e3c28ef85ab22e312a2b9971c36273cbb3ac7b841e276e954a708a42b4f49b742ab6396f878c94ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1b8f20a0ac0cae60425ee3b4d9ffc22
SHA1ca8014c5dcc1c023c9c70d34aeb42063dda31ebd
SHA2568406220bec444434b232782d164ed6f0b07b14b03e834e855a74a013408d809c
SHA5126cd052b6359da3c87396c7164a637a5d0fa49143ce46c0d81e5355c57dc4f8ee1dd26262ed2ecc6f60a0ae874d42253f231a69679ac0f862d1a0becb0d03d468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564dd5e0b89ae8405387aaad19f0e0ba1
SHA195015f6d43f859aa93492c8acce413bf0b63d02e
SHA25631018c9b65c71cf036197b53a06130206a45c261e44d91f21df580fc1fcb8763
SHA51257e1b2f4e7864212fde8a0d6de599f1f7168c4ccbeba3f41d2a61153cfd911fbd97b30f7ff346438c5fc75f64d1706c4937a7916d7792f1e5abbb8b14d32b25b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a4dc5662e7c6087234c7660e2318653
SHA1cc304520bbf6f0af3824fa533a1a549dd5241e63
SHA256fd379073ad97d9127fb06a3360538bec75a8d9e9411226f13510a290cb9d6c20
SHA5124f4ae4cb6f8124c9d72a93469d70f43d5db3138850898ca5d26f01ad98cd0be0353e89669e7cc752da2b250cc5add73cc1f53ed0716eec33b690ebaa98660820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5829af86d4684c659f866ce0e0f85ff33
SHA1e5f3c09bbccd0fe84967752461f24230cdbd5f23
SHA256850cfd62aedabb7b8c277afe65452e586692380a1eff8381a9207c3828d5416b
SHA51253040f06f743edb6222961c5aac5d6853f4ccdcedc0a5a2a7670afdd38f0b15df448d6a68cd97cab32630e013364f395769dd1ea524518c2aafc44cd85306172
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf