Overview
overview
7Static
static
7f277534561...67.apk
android-9-x86
1helper-huawei.html
windows7-x64
1helper-huawei.html
windows10-2004-x64
1helper-normal.html
windows7-x64
1helper-normal.html
windows10-2004-x64
1helper-oppo.html
windows7-x64
1helper-oppo.html
windows10-2004-x64
1helper-xiaomi.html
windows7-x64
1helper-xiaomi.html
windows10-2004-x64
1imwebmodelprefix.html
windows7-x64
1imwebmodelprefix.html
windows10-2004-x64
1imwebmodel...o.html
windows7-x64
1imwebmodel...o.html
windows10-2004-x64
1imwebmodelsuffix.js
windows7-x64
1imwebmodelsuffix.js
windows10-2004-x64
1imwebmodel...two.js
windows7-x64
1imwebmodel...two.js
windows10-2004-x64
1index.umd.js
windows7-x64
1index.umd.js
windows10-2004-x64
1libwbsafeedit
debian-9-armhf
1libwbsafeedit_64
ubuntu-18.04-amd64
libwbsafeedit_64
debian-9-armhf
libwbsafeedit_64
debian-9-mips
libwbsafeedit_64
debian-9-mipsel
libwbsafeedit_x86
ubuntu-18.04-amd64
1libwbsafeedit_x86_64
ubuntu-18.04-amd64
1load_error.html
windows7-x64
1load_error.html
windows10-2004-x64
1localappchat.html
windows7-x64
1localappchat.html
windows10-2004-x64
1login_load.html
windows7-x64
1login_load.html
windows10-2004-x64
1Analysis
-
max time kernel
136s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
08/10/2023, 00:06
Static task
static1
Behavioral task
behavioral1
Sample
f2775345619b18bf497705639e98244f5683d81135195d7223f1bca8c64b6767.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
helper-huawei.html
Resource
win7-20230831-en
Behavioral task
behavioral3
Sample
helper-huawei.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral4
Sample
helper-normal.html
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
helper-normal.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
helper-oppo.html
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
helper-oppo.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral8
Sample
helper-xiaomi.html
Resource
win7-20230831-en
Behavioral task
behavioral9
Sample
helper-xiaomi.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral10
Sample
imwebmodelprefix.html
Resource
win7-20230831-en
Behavioral task
behavioral11
Sample
imwebmodelprefix.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral12
Sample
imwebmodelprefixtwo.html
Resource
win7-20230831-en
Behavioral task
behavioral13
Sample
imwebmodelprefixtwo.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral14
Sample
imwebmodelsuffix.js
Resource
win7-20230831-en
Behavioral task
behavioral15
Sample
imwebmodelsuffix.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral16
Sample
imwebmodelsuffixtwo.js
Resource
win7-20230831-en
Behavioral task
behavioral17
Sample
imwebmodelsuffixtwo.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral18
Sample
index.umd.js
Resource
win7-20230831-en
Behavioral task
behavioral19
Sample
index.umd.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral20
Sample
libwbsafeedit
Resource
debian9-armhf-20230831-en
Behavioral task
behavioral21
Sample
libwbsafeedit_64
Resource
ubuntu1804-amd64-20230831-en
Behavioral task
behavioral22
Sample
libwbsafeedit_64
Resource
debian9-armhf-20230831-en
Behavioral task
behavioral23
Sample
libwbsafeedit_64
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral24
Sample
libwbsafeedit_64
Resource
debian9-mipsel-20230831-en
Behavioral task
behavioral25
Sample
libwbsafeedit_x86
Resource
ubuntu1804-amd64-20230831-en
Behavioral task
behavioral26
Sample
libwbsafeedit_x86_64
Resource
ubuntu1804-amd64-20230831-en
Behavioral task
behavioral27
Sample
load_error.html
Resource
win7-20230831-en
Behavioral task
behavioral28
Sample
load_error.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral29
Sample
localappchat.html
Resource
win7-20230831-en
Behavioral task
behavioral30
Sample
localappchat.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral31
Sample
login_load.html
Resource
win7-20230831-en
Behavioral task
behavioral32
Sample
login_load.html
Resource
win10v2004-20230915-en
General
-
Target
login_load.html
-
Size
237B
-
MD5
1eb969b356e28c96b6b88481a98e64e9
-
SHA1
dd2e14b292aabe3d64c6a0fbf375da2bef288576
-
SHA256
4f9d6a12febbd8c70fde022b57f7209f1689e0532f6fcc45d852ced974e14002
-
SHA512
73ff28440c17b9ff1ff27f8b2a9868f4d9940bda8d9f8db766cd1f53bb015d54f3d929a5aebf8a6fecc19a1d0ddc8aed16de70b366a82b83fdb0d45f158e973f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{96AE5D61-6598-11EE-B67D-FA088ABC2EB2} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20c5796ca5f9d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008c66dacf3255794896cbcb5ac20a7140000000000200000000001066000000010000200000003cad013ab66a650b375642fb135b4798a9c6615b9f8fc0e8e6c157536a49b67e000000000e80000000020000200000007d38cc6323f3e18026ca6aadb81a77214bbf4f0cc6bc34c7348b3ca40a60fb7420000000cb5fab51eb111be06638fbfc25493683f01543c22d722f3684f9c5dae9c576724000000053f248e75e79e29e9ed8945a72421488bd45d0c489194ee152ca5242f83bd8fcc696d7cf2f2df1af6168ac080d90aad6c4c6c83c57b0aaaa9da6050e9ffcba5f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "402903522" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2264 iexplore.exe 2264 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2940 2264 iexplore.exe 29 PID 2264 wrote to memory of 2940 2264 iexplore.exe 29 PID 2264 wrote to memory of 2940 2264 iexplore.exe 29 PID 2264 wrote to memory of 2940 2264 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\login_load.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2264 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fef241df44d7597a19ba242b5cc11f5b
SHA1a72d85878c89b08be5a8b71331e0a735535bd6c8
SHA256e5897575d7ecec976205297aab8933bdf6ea2112fdb0f5cece5282e0139bb43a
SHA512b1490ebcac22089ed16c68b7206f0ec2444111e5198f68ca9248afb09679afe2a12d1e9e8116add5bf75ae266a2098a2b4aeab289611d96c6183f1cda4947a0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502df637f4146e088397ef962bf1719af
SHA1508d4bf6880dffd376577aef578a6786a1e48d4c
SHA25694b7632743ea4ac263005fa244002fc9994656414cfa88cf30580eeff50b7fd8
SHA51294c96eb75cb5d9f21e72bbcaf30b59fbf1ce98d74a1592d787f01907f2bbb56656c840265850259a70579c79adc6192c1a7fda4d95c02c06cdfd6849dfd90729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5929dbbc3812210eb7f3eaa5596a19236
SHA11914a48c3cede34f7be1c47401d684922a954b47
SHA256661349787bb7fd88b048c79e02badbb24f95c7f08e72b1bfca30c4f77b2885ef
SHA512a20275f2910c4a586115e7880e38e950cba28f2afcb8a818b45f814416dd43ad2f234131181c6d729c340ee2f543b529576b3d75b461ccbb62401deef88dd832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd3a67f3aa292c8d13b54cfd52cda54e
SHA17254cbfc256ede016a5dec55e1b6ea7e4e7c8c8b
SHA2562ae7c697ce052a278e0206951298c9c2d7e10494c0e43cdbad406f767db09e70
SHA5129550b653d7ae30c9582442b387045d2831a6031b535f299c7a640e33cf4671e570d24e32d4864091f24db3458b06689b2eaea421f3c5d9917652de959db218d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d150b039b9e83e594e4009b542242ebb
SHA1d74e7b349a528722444b35d5f675a7f490c9982a
SHA256136051635e15254b056ba07bf920e930a629f802ad4c7e6a8e0a16ed8ac721ed
SHA51272f0720d2ca3ed21e4eadc76eb756dfea1f0763030fe10ac35ef0b56a9bc39e37e95852e848330a8777cff4004a74e92cd9b61ba583259386ddbfbb0bca73231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da9aa6de7fb280d4c5815815c56a55dd
SHA114a9e62a2a34147840b4127cd8713c2d1740d694
SHA25616f9e2fe29cf88706b7e65d54b89c7400706fd67f44df572c2de4f61fa594dcb
SHA5123139c4e1259ca87cb0458dfe858f1c80e7ff244740cdb2cb82d314a0109d7b3eac2fa6acbe4a0d79a23eed3153ead59011fd8b93685420ae1b58f55ebd34b1ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559bb188ad9a13adca9768d7df853d92d
SHA1bc7c39ee5bc2736d06985b9aedd466b830adfd36
SHA2566c99244cd037c6cf6e7785b3520e2f5b8037333c12a5d7fc178cfafeb6e4c49d
SHA5120a35601feac2dd5f9c8da94c9cd5ae0dac4e1e56c6fa52ce18df86efebf75f1fa7808696f2f06e0cc63d6dc4264b4f94b899b971335be337ef0be0f8f41c7bf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c433c76ef241147209561cf4910c2793
SHA15db3821b35507a0bb1898976776162fee54fae55
SHA256d5d0ee306cafc112b7005a898e5ed3ebaa72a249bf6d99d38a992700ceaed899
SHA512006b1a8370c7ee6cc2665c1b9496ea3e41ccb3e3932153f03440bfef69907b6f23a4c9064f63cddd77c68ed7d36f64f4aa9fb21732644f3e14815d2d8ac9ba52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e40293b52c87f84beea3aac394045bd
SHA14e6d66f384297efec9b11ab3b2197ec5c3cb2351
SHA2566fae29f4071d1f40f404e9828cfd27007ec11f1f643fd8d2d000736cea0bd294
SHA512c852c62f14a9ab010db378a47ef13dd8dd65e56e84543c802067bceadc98521d5412eaeb73ed847f161cdac25bfe0c13408eec82a4ff28a3da7280e0ca06c8b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2839a32eccb2dc6a4b8a73666252a91
SHA10ef498027142299ce40175ac9835406645731188
SHA2564e55f523dd72d3160cfc4e625622e3a82a8e415397f814148fd0daf23d046e61
SHA5129b711b7a1208f2b219618b91c2dcc26005f50339fa4ce92b21bf5ad5e402240028652e96461ccd5cb7a7b09714c2922108c110ae58826d7e4ffbd1bbec8188da
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf