Overview
overview
7Static
static
7c718c3cb6f...ca.apk
android-10-x64
fail.html
windows7-x64
1fail.html
windows10-2004-x64
1imageView.html
windows7-x64
1imageView.html
windows10-2004-x64
1libwbsafeedit
debian-9-armhf
libwbsafeedit_64
ubuntu-18.04-amd64
libwbsafeedit_64
debian-9-armhf
libwbsafeedit_64
debian-9-mips
libwbsafeedit_64
debian-9-mipsel
libwbsafeedit_x86
ubuntu-18.04-amd64
1libwbsafeedit_x86_64
ubuntu-18.04-amd64
1night.apk
android-9-x86
night.apk
android-10-x64
night.apk
android-11-x64
problems.html
windows7-x64
1problems.html
windows10-2004-x64
1success.html
windows7-x64
1success.html
windows10-2004-x64
1test.html
windows7-x64
1test.html
windows10-2004-x64
1upload.html
windows7-x64
1upload.html
windows10-2004-x64
1wbjs.js
windows7-x64
1wbjs.js
windows10-2004-x64
1Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07/10/2023, 23:57
Static task
static1
Behavioral task
behavioral1
Sample
c718c3cb6fc32770b82d8b8242def6c179efa1ed1a9523ac87f260b830a17fca.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral2
Sample
fail.html
Resource
win7-20230831-en
Behavioral task
behavioral3
Sample
fail.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral4
Sample
imageView.html
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
imageView.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
libwbsafeedit
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral7
Sample
libwbsafeedit_64
Resource
ubuntu1804-amd64-20230831-en
Behavioral task
behavioral8
Sample
libwbsafeedit_64
Resource
debian9-armhf-20230831-en
Behavioral task
behavioral9
Sample
libwbsafeedit_64
Resource
debian9-mipsbe-20230831-en
Behavioral task
behavioral10
Sample
libwbsafeedit_64
Resource
debian9-mipsel-20230831-en
Behavioral task
behavioral11
Sample
libwbsafeedit_x86
Resource
ubuntu1804-amd64-20230831-en
Behavioral task
behavioral12
Sample
libwbsafeedit_x86_64
Resource
ubuntu1804-amd64-20230831-en
Behavioral task
behavioral13
Sample
night.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral14
Sample
night.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral15
Sample
night.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral16
Sample
problems.html
Resource
win7-20230831-en
Behavioral task
behavioral17
Sample
problems.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral18
Sample
success.html
Resource
win7-20230831-en
Behavioral task
behavioral19
Sample
success.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral20
Sample
test.html
Resource
win7-20230831-en
Behavioral task
behavioral21
Sample
test.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral22
Sample
upload.html
Resource
win7-20230831-en
Behavioral task
behavioral23
Sample
upload.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral24
Sample
wbjs.js
Resource
win7-20230831-en
Behavioral task
behavioral25
Sample
wbjs.js
Resource
win10v2004-20230915-en
General
-
Target
problems.html
-
Size
9KB
-
MD5
af00120a7efd2478596d4ecee2dd5e5a
-
SHA1
3f131b209e2e858e3009e2117ef36361cd996bc2
-
SHA256
7d09ddf251fb4007c37082221c322c0107ab0ea65780d945d860d1f044d6f6f1
-
SHA512
cc195d976cc52f8d5ce9f75c0c2151c305cb1dddccb6da8b1885ae8291c31b2d289e970fb36f20280d30940c5229120765e785cf2e53c2957ab7be3bd540eda6
-
SSDEEP
192:+oLQDrJt2uG5jA4iXD90GrDQojETl3Vkpcp0Ps6WcjYc6qtBcf7j8eUhDFZoU0:GDj2RAnD9HrD6aCNWBcjj8ekDFZod
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{D3DB729A-658C-11EE-9359-EED69A4A1DC8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{DAEBF00B-658C-11EE-9359-EED69A4A1DC8}.dat = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4672 iexplore.exe 4672 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4672 wrote to memory of 2184 4672 iexplore.exe 88 PID 4672 wrote to memory of 2184 4672 iexplore.exe 88 PID 4672 wrote to memory of 2184 4672 iexplore.exe 88
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\problems.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4672 CREDAT:17410 /prefetch:22⤵PID:2184
-