Analysis
-
max time kernel
119s -
max time network
177s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
07/10/2023, 23:53
Static task
static1
Behavioral task
behavioral1
Sample
2160eb24bba2a43a08272464eb2cbf0c567cf83c361c0d44c4f2c78272868aae.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
2160eb24bba2a43a08272464eb2cbf0c567cf83c361c0d44c4f2c78272868aae.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
2160eb24bba2a43a08272464eb2cbf0c567cf83c361c0d44c4f2c78272868aae.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
about.html
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
about.html
Resource
win10v2004-20230915-en
General
-
Target
about.html
-
Size
1018B
-
MD5
6a72cdffc41a70e3fa964de7309e117a
-
SHA1
8745098f3b8fb3138247e765d62480a2a16ed3f3
-
SHA256
4425b107dbf55afbc58427b59e1890481162fe00293486f6557d1ad2b1c2c85e
-
SHA512
3236c315fbfd555ffe6e924a25e105f8402d31519b9dee50382ffc1f1a34307c28a9847e7385b54f923ce7c73a0b96f0b429a22812b92ddc0cfb18f79e747d33
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "402896263" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f062298894f9d901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bbd2da6efca7814e97bd67c6ea97aa8b0000000002000000000010660000000100002000000005f62dfbf95882cd8e8ec7c21b8b470907a584e83d85c7d5b6e61069457668a7000000000e800000000200002000000044c11bebd26cfcd49db1b5e1d8772f0d0e824f4c27f8e65c3eec36cec6542b8f2000000044f434b53dd4fb901affbb9044cf657c222b49f4d69ab3ce054bf7dddbd395e340000000b2863e6f8640cc1907f1586b46386624c69cca17a3a4599c363a65d59acc17eace662263fae0cb5cf5afe81b325a73b032c11d501558ad9386d58960fd8540d2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AFE9C6E1-6587-11EE-9FC1-4E9D0FD57FD1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2816 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2816 iexplore.exe 2816 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2816 wrote to memory of 2784 2816 iexplore.exe 30 PID 2816 wrote to memory of 2784 2816 iexplore.exe 30 PID 2816 wrote to memory of 2784 2816 iexplore.exe 30 PID 2816 wrote to memory of 2784 2816 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\about.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2816 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519ba4aad381cfc68fc6f539ac8daff05
SHA158870abb544d9e229bd0797f62f7cd45106b299a
SHA256632af8e01b43c87262030ee5f7a1f11af74aac8bcc69975994bd68ef9be8b5cf
SHA512450cbb9ae5f34ee677321f1cdb801add20cd79e234e20cc5ca2f88a34709ecbcb8d84ae1477304b8b2b0b5726bdcc7713141c3667d723553401a78448901ea7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5d2a649bf19b720160397b4eba0da15
SHA11236050d51a933db78a592b8d53d9bbbbc7bcec5
SHA2566f2f0f6a593ddf29eab0b280fb87e5d184e6b635c6754823c16c382f05884909
SHA512f17f0439ff9cfc2105e4c25919f86e5c1398c06c05125720d0bc73b6fb6e3edbacc18b8a7350d42d2d66d574281f7d267d4d827faa863e1eba495323c2b0df0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518f7574d900c84f423ef35717f13a62e
SHA115f1e8f7bdaf6e26ffa3d58e0da2c5feef8a70d0
SHA2569945ea07e73b4cfc4be702c482c27813813a7faa3cd456c51dac4e19b54067e6
SHA512e8cc7cc35fc60ed7ca2a7f9db1036ba9fbc27d9b6b4e2bee987d6c66b0c545bd622534b68bc1fb3cf2e098a91cb8e66587863f1d6badc924ba6740ddf09049cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfde2fc9153c6342de74e338863afeb9
SHA1637ea8a5e33b8f72b4d9a52b520958937af55d41
SHA256c71da5e6c037e7bb27aeca3b66d19d64f49cb1515cb62908e0205d0b1416c5b7
SHA512e1c9be400078ae60620553b7c76769ee5419ccdb14fbe4bd207ad281ef06b088433c90dcfda2a4ae4df6419b1aeec6a68a262cc2f643bd760d62e9f59ffe0c0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf35a6302a1bc068edf1277ca4c945e3
SHA1e41006e1c500c7be27bfc54ad92778c37746ed59
SHA2564e3d97b402c27fc48d38402579973acc8f63c6c2889f19e7ee1af6af80d21a72
SHA5127994a4b21b664996a34d4b91efaac915442c5d26dc80bc95234619172eb696bcb39d35e44620fe37d3eb06dca63cfaac3c93110f24989cb98b59bc21994e3050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ad61892ed93409ce09da931d7b71361
SHA1e37d93a3fe0cddd95e54e059bed562985dc6e962
SHA2564fad26c506daaa363ff6e962c4e93375a2bf7b862bfd622ce3a09de70496468e
SHA51209057c18a912ebeb7bd7399b70bd2f13579ed71f1cfceb4d6b13d5c9d084e17ae02922ff5ca7eee5f9bd7f345410b79094ab853a9d7fff33569b624b72299809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5768508302d70484b1d68909271373b29
SHA1c0377e2647e33aa99aca7f67f5e944b6e2764974
SHA256ab0a7abeb334e3b35a63eed5aca43f234669fee8ae7f8f97342c0df336f7cf06
SHA512afda08ed9286619d121300125b43100d4e4562522cda806743c204a0ede5c2829062c1b33888519c554fba74353c705daa97b24dddc863b2e192b82034ec5360
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f26d6e81888b3a913a6c873233ab388
SHA10c6409d4ccf3112edcd5c722336e71c806ae23ec
SHA2563419e3959dfa06cecd62f425c172ac82f5edefe99f49881014d7f231f377e34b
SHA512a385c23a780552d16aa73ef8d05f2b5ea4755a8cc575abf7d0376b2f048e1ee732f0c4ec230fb439aeb7a41f2fb350f32b8ebd44c31048a39c42aa34dce51d47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52298fcea675b597d2b202829b985019c
SHA149a0c101e6df9973125adb2a78d3ca18a573383e
SHA256e66234d45cbf8321acbb45ba652d2678e2b57b3188cdafe511bfbdc4d1331676
SHA51257523b892545db763c04cd67698a550e6d838dd2c5b5b22fbbfeaca04ec24d1f6993bf8f486c12041a1a593b768d35fa22d02b1b6d0b207a71f82e3279bf3683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5993412bad324c5cc3f71938f568b7397
SHA14870feba38c8382e739374ee0a5b46ad5bec5f94
SHA2562365ace8cae34a027ab8ccc13e1a7bd0e9b926a1d95898a5d27c37dc179b1c14
SHA5124158ba551b6ce918f54d30f14008ace7223851b6aa17e029e8237d529a329acbb062aef5d412d890e36aa30da2423dff37166693728d23c06a2ab2c92427b83b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598f7a401e9b2035607bb841f700b048b
SHA1dea1a156f38815c519a313213821138da2670edb
SHA2568689c6c73c4ad1151d4181354e8ca08c05a246317bf47f14d42785c785a8c704
SHA51230024b1df5fc5127ea151e8c7cbc4b6318fc13503b16fcdcd1b39cfa393eed452af0cb8efeb0937b8094b567488272881193bc6c151b5af7eef72e79409e8e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ec93d367ef225dd99cc8a5c13e48c90
SHA163546555fb0c7b8ef5a495755237ba116649e863
SHA2561647b0da1f16f244422c85b5264e0e8e2b0c1d0510e1b52a8b1ec66129f8c152
SHA512c92ece93a2725c7febc35335f89d1f50ca954bfaa7f54ffb73ef194994a5d4f464fa8075fd39b87ec0653c3bada5ce50d1cde7aad9319645220cbffafc8275e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be9027c7fe5564cdb5e571b96a6d12af
SHA11510a7a015c7adcc7d4b225e01d5741ac18bdfae
SHA256577d1077e3abb1a08ab6c38f486c9b967f96ceaebe6cb1a1d6d3d2d6c19b89c7
SHA512f28a1e877e321005b812164ee2e8509e134e51cbced37e6647af6977dfda9b569724c4506e6f001cad32a80fb834191c2889a754d22c57109d4defa3a5433e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5992f630b4aa194de5c71eccd83a2a035
SHA1661e61857bae094dd421ea9377a1f37484dc60ea
SHA256ea4302531c1e9a85ab033e3957997abf7bd3bd3068d4cfa11ca8dd5d8d3fc444
SHA512bb0073b9a7ed800bc5ed074a91b1fe5084e8dd224af2d7a224df03f9184bd740ad4371c9533e62639d5f62e49857508d64752f7cce944862fcb42b068162fd6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56596aaad5579dcf290e57cb828a13b7e
SHA17a8f84a09212a3fafd85ec33f516c469bb3e7073
SHA2564ddb58b1a18f032705be229fe0a23e47c9114f4289bd0656c27a433754eb14ec
SHA5124245b608ca9a511884f8ecde4fe16ab612840f3b0334e784987ecf1f5194565bb44b1ccde60934e99f87eafd19394446dfa160669e5f030009768d92506c352b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d1b1492a54e6d11cfde59f349bfc9d4
SHA18199913ff4676a23a7b848fb71196e0887cda034
SHA25690c47f73b913569c6a88dfdd02dc79573ab0c06198d0307cd8d4b3fc3129d186
SHA512aae5c6f775504803e4f9159004ca0d86a9c5c500287400f7e4c4a8a6b917afc79b07762ae88aadc60ea5ab72cae3169b3a734a8560cb43a8cbd51937a0c1b03c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ae38b57f714c5eb0945d4570645fd37
SHA1d599a119f6237a6de296c99113eb81a9b78a9227
SHA2560d2760bb403e8898d18e04503163e768c84a6e3907ae15f6bb12b87e4582d16d
SHA5128d35397a433f5e771d0f9c3be8b3e6141495a5df675fac12e092f60f2d6e141a14155b60784d0ae4324a1d92d18c794dc80d41a2c7c888f1e34c6afec4ec244a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc7c8a92924b9133265964f346a993fe
SHA1294493f75279eea394407268d2d881641da04f85
SHA256437e04cea7759cb8eeb48844394ae9736d67eaa388cab1149b1f613d73013abe
SHA512c0991d39426d540eba521f464bf038ca7e50144c806ddd1a22453302b3aa9d700aae44d1bae96553351896d52396c4dd0f315b299d713a9060c496006876af23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a2cc0436034168e27d3a238f4bd9dc6
SHA196fc6a5afd75fbccc7e543dfef45cfb7a5421b9c
SHA2561a4c5e5d9bd787c106e842b709b07f1a18e316d7732830372f12996a9aa242a9
SHA5123a12ecad308eb7c37752207416ce51627ae71d06ad081d2cc65ae9552a53765aa67b86db25ef5f9a9d6d9e3f83a8e4016076d4dda3ff606d5c92fa910bb7af0b
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf