Overview
overview
10Static
static
10394534c9ad...aa.apk
android-9-x86
8www/home.html
windows7-x64
1www/home.html
windows10-2004-x64
1www/js/app.js
windows7-x64
1www/js/app.js
windows10-2004-x64
1www/result.html
windows7-x64
1www/result.html
windows10-2004-x64
1a.alipayob...1.2.js
windows7-x64
1a.alipayob...1.2.js
windows10-2004-x64
1a.alipayob...pto.js
windows7-x64
1a.alipayob...pto.js
windows10-2004-x64
1a.alipayob...dex.js
windows7-x64
1a.alipayob...dex.js
windows10-2004-x64
1a.alipayob...0.7.js
windows7-x64
1a.alipayob...0.7.js
windows10-2004-x64
1a.alipayob...eed.js
windows7-x64
1a.alipayob...eed.js
windows10-2004-x64
1a.alipayob...min.js
windows7-x64
1a.alipayob...min.js
windows10-2004-x64
1a.alipayob...min.js
windows7-x64
1a.alipayob...min.js
windows10-2004-x64
1a.alipayob...min.js
windows7-x64
1a.alipayob...min.js
windows10-2004-x64
1a.alipayob...log.js
windows7-x64
1a.alipayob...log.js
windows10-2004-x64
1a.alipayob...ert.js
windows7-x64
1a.alipayob...ert.js
windows10-2004-x64
1a.alipayob...min.js
windows7-x64
1a.alipayob...min.js
windows10-2004-x64
1a.alipayob...min.js
windows7-x64
1a.alipayob...min.js
windows10-2004-x64
1a.alipayob...dex.js
windows7-x64
1Resubmissions
14/01/2025, 09:27
250114-le61latrax 1014/01/2025, 09:16
250114-k8wlaatpct 1006/12/2023, 18:03
231206-wne9cabd79 1008/10/2023, 00:01
231008-abc3kaba84 10Analysis
-
max time kernel
141s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
08/10/2023, 00:01
Behavioral task
behavioral1
Sample
394534c9ad058e4e99ab6d8c48dbaf12b18c823a374c58f799e01322fc414faa.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
www/home.html
Resource
win7-20230831-en
Behavioral task
behavioral3
Sample
www/home.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral4
Sample
www/js/app.js
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
www/js/app.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
www/result.html
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
www/result.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral8
Sample
a.alipayobjects.com/am/log/httpblock/1.2.js
Resource
win7-20230831-en
Behavioral task
behavioral9
Sample
a.alipayobjects.com/am/log/httpblock/1.2.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral10
Sample
a.alipayobjects.com/amui/zepto/1.1.3/zepto.js
Resource
win7-20230831-en
Behavioral task
behavioral11
Sample
a.alipayobjects.com/amui/zepto/1.1.3/zepto.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral12
Sample
a.alipayobjects.com/anima-yocto/1.1.10/index.js
Resource
win7-20230831-en
Behavioral task
behavioral13
Sample
a.alipayobjects.com/anima-yocto/1.1.10/index.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral14
Sample
a.alipayobjects.com/g/am/share/1.0.7/1.0.7.js
Resource
win7-20230831-en
Behavioral task
behavioral15
Sample
a.alipayobjects.com/g/am/share/1.0.7/1.0.7.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral16
Sample
a.alipayobjects.com/g/animajs/mtracker/3.1.0/seed.js
Resource
win7-20230831-en
Behavioral task
behavioral17
Sample
a.alipayobjects.com/g/animajs/mtracker/3.1.0/seed.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral18
Sample
a.alipayobjects.com/g/component/antbridge/1.1.4/antbridge.min.js
Resource
win7-20230831-en
Behavioral task
behavioral19
Sample
a.alipayobjects.com/g/component/antbridge/1.1.4/antbridge.min.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral20
Sample
a.alipayobjects.com/g/h5-lib/alipayjsapi/3.0.5/alipayjsapi.inc.min.js
Resource
win7-20230831-en
Behavioral task
behavioral21
Sample
a.alipayobjects.com/g/h5-lib/alipayjsapi/3.0.5/alipayjsapi.inc.min.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral22
Sample
a.alipayobjects.com/g/h5-lib/alipayjsapi/3.0.5/alipayjsapi.min.js
Resource
win7-20230831-en
Behavioral task
behavioral23
Sample
a.alipayobjects.com/g/h5-lib/alipayjsapi/3.0.5/alipayjsapi.min.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral24
Sample
a.alipayobjects.com/g/h5-lib/bizlog/1.2.12/bizlog.js
Resource
win7-20230831-en
Behavioral task
behavioral25
Sample
a.alipayobjects.com/g/h5-lib/bizlog/1.2.12/bizlog.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral26
Sample
a.alipayobjects.com/g/h5-lib/hook_alert/1.0.2/hook_alert.js
Resource
win7-20230831-en
Behavioral task
behavioral27
Sample
a.alipayobjects.com/g/h5-lib/hook_alert/1.0.2/hook_alert.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral28
Sample
a.alipayobjects.com/g/h5-lib/protobuf/1.0.0/protobuf.min.js
Resource
win7-20230831-en
Behavioral task
behavioral29
Sample
a.alipayobjects.com/g/h5-lib/protobuf/1.0.0/protobuf.min.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral30
Sample
a.alipayobjects.com/g/h5-lib/vue/2.1.6/vue.min.js
Resource
win7-20230831-en
Behavioral task
behavioral31
Sample
a.alipayobjects.com/g/h5-lib/vue/2.1.6/vue.min.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral32
Sample
a.alipayobjects.com/g/luna/luna-offline/1.0.0/index.js
Resource
win7-20230831-en
General
-
Target
www/result.html
-
Size
1KB
-
MD5
74a09f8ed3a9429056d3e110fc1e6dc8
-
SHA1
a93bf4adecd5c778a69bbab23700d139023b6fff
-
SHA256
80ddf5a7efe5ce271e3659a2a5714eecef07539e874935675a555abae3cc35e6
-
SHA512
77a816f38a5ea5b5b548ec19b1d9442f18996601f9d2e2d5136077befb6e7fb6fd5a8f57bdfe4c783f06a4ed0d82fb584ef157f187e0ce9a86c4e6b6f920b69d
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "402900772" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c06692049ff9d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f908080c5c8cf442941c5db076e34ac2000000000200000000001066000000010000200000001dcc118f65f384d01381052d4b12abbd94b7bd6c1ddf392f4b97e83896ec9c67000000000e8000000002000020000000bc93c9163b2a52484dbbaa18281010af5a2c3de8e3d6512b78272ce0c16cf74e2000000053a6d00e0ff348dd52e94329c759f4987dc615ce65913ecc03ca9943d91053f740000000a8776b4b7ffab02003df5b35514f5d96ab6724b9262de317c0155836f7714c9e455eb9dab66280bfa79b9541f9bb400cbd1bed8b462fb8e7f8036dcd75adb8f2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2EF33F21-6592-11EE-91B2-5AA0ABA81FFA} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1988 1724 iexplore.exe 28 PID 1724 wrote to memory of 1988 1724 iexplore.exe 28 PID 1724 wrote to memory of 1988 1724 iexplore.exe 28 PID 1724 wrote to memory of 1988 1724 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\www\result.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50889863414d048a04fd6b1278b5d4125
SHA1a2acbd342eab5e720db81e29f2888becd437029a
SHA256e1b992ff8a184969d171c78576ea5ab31bcd50d2ba86f4b844294c35db7fcb71
SHA512f1aefb2e07bbc501c41d1dc8a773dd040c54c4e4fcdedbd619bc63706ab76ecbb04af258289dea8ac81fbeb3a2f8aa9301f9d65745d7b3442f924de49016ee27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cb1d718f6b70f6879308200b11f8385
SHA17ec4be36915b8b8aecbca6ae1aa5c28fe71dc283
SHA256833ff5086fb38850abc8e432cc2d7810cbd327b9353fb484c6c9c7d2fbb11396
SHA51231f840f27daa779e3f7dc2c62a1db354abc44a70bf9346f2f19c80f885800ea9ea64d62ce6c7aa3372bc270e87179f27ec0b5c230f62769537b3155e5e77d98c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c18aa5fafb1380293f51641a10efa50c
SHA16adc8d1a63e41244682852311c627a87e6137086
SHA256bc59d3c31785f1b27f297ef0764dca18195a8437cf987192befc0b7c6159c0a6
SHA51212f1915f4b1f38b6b26c83a2be4bae8e2eec2a2089870853a4fca9dd222da2342f1b2e81445cf14cccf4c9c801db4314cbf91c32e7be9f9f57e3128eb457af95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59900dd5f9a1e4cf22eec215c1a51a9db
SHA1372146e0d02b8167c530ce1d6e44073e2dd50bad
SHA25688005ba1cb8668840c56c2843e4d367849542cf8be9e347ca5fab582cc6b9697
SHA51252ed96b2813c7ee7c1cce0d64b4164b2ee6d33a5bb032b640b282479c332d5105c31145d7dc23ed5b33c9fb7dd1e44bad4d48a728c90b1377e1e9b54c0d40391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db58cb17a0aaa042a6f100f26b42a3c6
SHA1ae9dc46f42c793224fbef99deb49e230eb1a3f5b
SHA2565407143d25028f87a9912350b468fe52a2cf7271794e83b15f485160004d7cdb
SHA512c396d356529fb635315cec4f81e0528a82c92049bb69668cc5b253e569c47280eed41abc4bd07410b96ba1c892ae259d4e2a85290672663ba8f907d5f34cdb33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59270aea928b377c53481bf37ae88c266
SHA14b0baf7010fcfd8896dd46ead800f490d1aba61a
SHA256e0fd85e1463d0118635c34eb87124b3b86cfe86ee8cfc962816588172f6df1e8
SHA5120190e11b8d1edec227d51e6f2b22f46ae95071171dcc4004770b050be85b96d1ae29ea970c7a3c3f8925625c581841dbeace2fc9175dfe621c2b8c604b089a7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ade21caa46eda4adb092b1fac5909cfe
SHA13a1a634b6c3a7ffbf8d9364635ee042c86ec9969
SHA2561fc8a1d1ea254184f71d453d63ba8e003ee83ea43b27d7fe2ed0f344591cff29
SHA512d61265385bba43480d8cfd97d45d82bad023da260730df73b433f8ee02c2513925f6315354498da33241147cc53d543bd289473034e288b90bcd88c1b6d11889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541fce626761a8829333b505f76ef31a2
SHA1e1130ee982d75bfb5074ddefda59c01bc69a61dc
SHA2566b8136640cb372d6ed20db6daf32c44ad6e1392142a7ae569db9dd845f6bc9e5
SHA51265bcee6d0e06c16df85a8ae7bd1051eabec9572fbedc9f5b9fa32328fc44b0b3c5571dc9f06924a2d2face36f6c3b07f28ddf96aa3f6d88185d3ebb5e840398c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac31c3cb5944d8b00ccc4fa2f17b0a5c
SHA1f0479dbb24f01c56fd6d0ffa70cf44ba209e3fbb
SHA2562bdf2830ff56e43061d15d5d601c7c6bba859ab823fa580b26e01d867b49fd4f
SHA512a2ef8f18a62c40540aa9e1c123207954b736a8dfccaf06eba7f7610ce422883cb2191f1317a50332a55001da524c665080344a24bd966bf4c2c050dd8c38f19b
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf