Analysis
-
max time kernel
73s -
max time network
168s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
07-10-2023 23:53
Static task
static1
Behavioral task
behavioral1
Sample
a68ca6c38ac5442fdf1111634f6e866ad7710687237c28c737f9e460ef488442.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
a68ca6c38ac5442fdf1111634f6e866ad7710687237c28c737f9e460ef488442.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
a68ca6c38ac5442fdf1111634f6e866ad7710687237c28c737f9e460ef488442.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
about.html
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
about.html
Resource
win10v2004-20230915-en
General
-
Target
about.html
-
Size
1024B
-
MD5
6f465a59a9caae6d07a9726c39f21d7c
-
SHA1
a2ec27ee0e4dea075072fbad6eab98ef5febdd89
-
SHA256
f76be623ee0946d6d1c70b00e8e8efb77f49f5367bfaba66b928ab776608527f
-
SHA512
0f58788d462d54b916d475d6e0b48a37c37124630ae79f80309ffb8dcb82c2d35df4fcb2f3fb1bae4c37fcf03f3890b87210a986bca50fdd0d4be3c75e83e6f3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ea3dc2a7c0fe4d49bd6e8f3e7e71513f000000000200000000001066000000010000200000006b9527b68bd33722edd454e8d4da515e86f8ea7f093bb0dc36962d4e087f7b89000000000e800000000200002000000011d87f079ec7973e8860c4e9a20dc1a3fd93497a27bf9557d2cf060732ca06ef20000000c15e3f6d7d172f0decc313c3b65556c077823252aa3e1166708f5d7480be82ce4000000090bf5159ed8f0b461a9e7db59fcd3439c33769dad41f81e8bbd7bca550ba0c95ef4122c52b0f638d73cfadd7babd3aa62f4f8df02ff79f2c4b45dc2b3dd4f255 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F7C4F2F1-6587-11EE-A287-4E9D0FD57FD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "402896385" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 109803d194f9d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2272 iexplore.exe 2272 iexplore.exe 1980 IEXPLORE.EXE 1980 IEXPLORE.EXE 1980 IEXPLORE.EXE 1980 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 1980 2272 iexplore.exe 28 PID 2272 wrote to memory of 1980 2272 iexplore.exe 28 PID 2272 wrote to memory of 1980 2272 iexplore.exe 28 PID 2272 wrote to memory of 1980 2272 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\about.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53869123422eebc3e43ec7319069108e6
SHA1b79d4633102e5bfc3360f0b0a6b73e0624862da1
SHA2566827b8d2b250e54d53c12eb705675392a2d9d270eb57af79befdd21c30c39220
SHA51235065be7d4cd427dfd187a195f0a1b98870a9143d07fc056f3e8bf16ba9f091013027532e77457754227df1ebc8d8dad248eb75dee6857bb48dc2285d70f8d48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db4b3f288c4a71bc5b3dcd07ffbe332e
SHA1f8dccde0dd61d8a8f7cdb971cb3668dd55ed14a6
SHA2567f4dbc0fc0ba50b49a7a84f8812dd4efe457eb26ee19d84cd4d7e653d9059525
SHA512a63595e8e273a16ecd8423097dee07d296602201d587330ae35ae48f7c210ba6a12af432e251ff11e85af9120f34dba0c9ec6cacc076f8f844f417892a9ac92c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a5d624a1e13cc25df886479127e0f6b
SHA13e6b749884af43fdb44a7961c1cb034e04555754
SHA2561504b0532c011928033c7e49252c03b0968c061df793acbb0e342638190bb508
SHA51216f7ea50c042d7db7ddfc7d400899c5667bc99f458766193cd493063313600ba9ecd75c14411fae7b8e75f36b5e9acf81ba3a82bb3ee67414a1943e5b9a953e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58720279ee59a4ca2fe506d27076a2cb2
SHA186b0b9c983e5014adb93b02288f7fe852d45dc64
SHA2568825a2305085c43b74e267b4d7c0135ecdf2ca44d8da2792fb5342087dcd1c44
SHA51229aac60d2f7f749aa1fbba0e30f3b78b31db3acac4225b4f3f3bd6ff4020da6c85ea689ddd153bd292cbe8157a45d02f17992255cdd96ff4e5eff84e38b9bfec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b19137d902819486024d933432d53d3
SHA11fc6b7a3169a38be67dc122008d132c4b3dee575
SHA256c6b3cc738dd47d6213acdadb2b0d18114fdc60a423f52ae879fc0fcd7b61c026
SHA512e0a676cfb72b078038895311196c1907811ac112c6e53f825502a603c1929590fd27c96fc9107a2a6b3d2edceb4539e23457cfcc79bce87f09b89f454c5edded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515cbe0e526ae410e45bd4f7053572317
SHA114badd2fcd57657d275406c4e5e35abe0d8bd52b
SHA2563deaccbade45a5f38fa58d7e490b3de550697d32ab7432d07b8fa357a1330158
SHA51273dfbf78a5b099b083b5b15174510d6e2d0463913a0b2e0a9f06ff37523107fc6a80b0dcaa8f7275573b7ce471f8e60304a2e2a95412fcb6502e194482a851c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533adcad9ee5c456025b96a4f0a5f5a5e
SHA18fa0fc0d788e7e3f547917c8b8359622da421ea0
SHA256b4ace5e50ae8333322e09c890468fe3c461dd8e876e6fd79a06e85babf92ff41
SHA5128b3c01b3b265100e9806094d0927e0e361927411817deeb779c73010e496aceef98e160c3911ba0076fda86e0956055e01de495c5415925ce9e01d633d03c472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f4eeb301b7cfb064e6e661b7887db78
SHA1023a3e273300674600d739d4484ae5857daebbef
SHA2565f24d7d9a7d2e91f67143fb539119424310eafd72fbfc4c375989ad78815a20c
SHA51203331ad237dfe032137b8dd809f4f3534c9334a8f81193565859a8961cc8b54e0342dafb8fb551b555ac0c3433145ea959081d850d75f7017c717c9686181c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b70cf11bd5b1fa97bd002e5b676fc99d
SHA13082c494e4fe07db9011248aaafaf1ee3120b49f
SHA256743538e438a6619b48d78fc515a3eeded774c954e3a5154e1c87e58dfc9aa66f
SHA512a055c99008e2ed1912ed956bfd224180158c00246ada52cc97deeea5d5aa2d65cca68575d171ea01831ce54bc824bea73c44709b2b3a7610439665d85ca2bd1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5022891c3213cad33434c287e2a4857d2
SHA15703450da59f0d73cbace059bd0a8fcf3f953f70
SHA256504a27cf2c99ee072c30abd1368131df957f8148b4e389b8e5eae6332d62e00c
SHA512300d387f4b4b1203eb99b2524e0515098829cd438914965831bdb1ccd3a6f70e874773ddc87bc82531465228febc0fd96a0bfdb82196147b8867a1e9355bdc9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5070a4062bd5ab67275d84a06727f3a0c
SHA159851cd923e8c68cb34453055e32e4628c50fc98
SHA256c316ecf5580f937448c6993dc9e459155d35d7f706406bd1c86cb5cd33d457d6
SHA5127bcc97f02f0e7c36ec8226945651fbec66afac186b508918e556ef27adf781e0d9e6999315738e016b198d68a872fff3ada8527a6c7146a9c7f63d6e11686da6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0c2100bc3bcc8074aca0ad4ed913754
SHA1adbbcfed16e0557454dcf5a5d539877cdf6d11ea
SHA2566ffec47ff491f56bf4eb2bc2392dd54b8b7d2b410debc464759d5078a64f0d88
SHA512bd724140e4c142a8aee57d55cfd250d639c7c79df16ef334c6b21aa70c54a8a99405e6ffc93cf022875e1a9f8089ab89943322e979b26ef2ad971c65fb314e4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0349ca1cf26598557144882df19a08b
SHA110a4e9cfbbac2ef738e4956931329b674c0633e7
SHA2568236d7327feb6a23f2c85a380e2178a7042095aed067d6d7d1b84ab8347f3c6c
SHA5129d123056c7a1043a8f9d7a7851ffc75230b7d3408dd8579e97a4c5381e4e513c211fe328b49428d7f2d8a0a9ef8763d105dfcb32bac73cf7a44d2c42e242ef9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578f0a24f5353ccfa3ec892e0848c281e
SHA10227bb4a6af27fdbf5a33c62168e687c5631a742
SHA256b6ecb85e633bce5c544787ee6334c0f5eb943bd4542337f5711f5c1c51b56ed1
SHA512fe1c2fa469fb8ade5fd34c839abd95af052cedef0d35df55036b28a8b930a1da2a4c6dc492ae35215bd99cd8b7cde81a245765e3580abbed11d97ef442d2dd03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5180c56d9071138044f949a6c3995d428
SHA1d17aa39d6f234f145322491fbe7e8fee1f663f82
SHA2568b083b3850f9cad4c35763279473730c3b754cfa039eda6a088658a272e20417
SHA51299e6a62c968d4f61323ea4bf3a7d2ccd4b9ae424e835c6c02a96e7b8748c6a4946228de77924130084eb1519a900f5ef154e113bfc8fb4cad881d88ec7f693da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7fdb6fc129bda8e340ba73522f33e0d
SHA1949344f31adda03b156ca5dc12c13c63ce11776d
SHA25606a2cc95073231d6d8c7bd7db8bfecb7bd04273fb56e710c00559930ead0c866
SHA512d38ba6bc7ad9e8a86dc82c9e4772d989851ffbe25f13477e4620e0e0018bf9fc2479e1edcf33a89e60c2424620f41f092736e8157f213a6d917fdd709f133e97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3e4be76c4db8ca8b0e1d490c5701418
SHA12ff1cf2f75fe503181ed56ba92ce96a34abbe573
SHA256922cd86b2a8ad3e313eafcadb27a9d63de21914deb8f84eab98508ef0f282ca7
SHA512b2c91cb647ecf7b20417b7b28f955469f1444ac9f058c77bff67777f0d9c6b2baa51c9e083f62255dee5673f5ec0a3a728560d3286ed85d97d24e795ab933c08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518269e5b33766d56a43e28f08d3bbe38
SHA10092854cc46f02303a410a6d97953d4745fda254
SHA256ff6dd36aea23ad5962bf93968c0867ac049305021b6c9eb9109504c96950d266
SHA512519df2207f0f9a92e35fd4fc58f42fe7237e1ce206a53c54186ab6477b3c5d75a71971f3c14b4baaf114ed42a59c077a7e9b9fb008c9a567c2bd089e960bafed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f79211825cdca4e047f8cdfa10ac5ab1
SHA1b71a8a0b8822f1c7459b8eb5bea6cb56296d78f5
SHA2561ca10ee05e304f9eddbc52c99e4b6cddd945bc6efbdf7d852b51c397930b7bd3
SHA512acb1ab11281fc29b888f6bb98a17f0c1c4f1d3b41d82989f6a954db68ee1fb87ad8f269ebd62d32e73a2ed50d14b903a07fb2183f19745482e1abf389287c910
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf