Overview
overview
7Static
static
789cb774edd...c0.apk
android-9-x86
1en_alias.vbs
windows7-x64
1en_alias.vbs
windows10-2004-x64
1gpen_handwriter_32
debian-9-armhf
1gpen_handwriter_64
ubuntu-18.04-amd64
gpen_handwriter_64
debian-9-armhf
gpen_handwriter_64
debian-9-mips
gpen_handwriter_64
debian-9-mipsel
libwbsafeedit
debian-9-armhf
libwbsafeedit_64
ubuntu-18.04-amd64
libwbsafeedit_64
debian-9-armhf
libwbsafeedit_64
debian-9-mips
libwbsafeedit_64
debian-9-mipsel
libwbsafeedit_x86
ubuntu-18.04-amd64
1libwbsafeedit_x86_64
ubuntu-18.04-amd64
1news.html
windows7-x64
1news.html
windows10-2004-x64
1jquery.1.7.1.min.js
windows7-x64
1jquery.1.7.1.min.js
windows10-2004-x64
1privacy_gu...n.html
windows7-x64
1privacy_gu...n.html
windows10-2004-x64
1privacy_policy.html
windows7-x64
1privacy_policy.html
windows10-2004-x64
1privacy_po...o.html
windows7-x64
1privacy_po...o.html
windows10-2004-x64
1privacy_po...d.html
windows7-x64
1privacy_po...d.html
windows10-2004-x64
1privacy_po...o.html
windows7-x64
1privacy_po...o.html
windows10-2004-x64
1privacy_po...e.html
windows7-x64
1privacy_po...e.html
windows10-2004-x64
1user_agreement.html
windows7-x64
1Analysis
-
max time kernel
119s -
max time network
193s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
08-10-2023 00:10
Static task
static1
Behavioral task
behavioral1
Sample
89cb774eddd70c9c39332fe1c87cb62baea5090b471260a0af27bf996b549ac0.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
en_alias.vbs
Resource
win7-20230831-en
Behavioral task
behavioral3
Sample
en_alias.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral4
Sample
gpen_handwriter_32
Resource
debian9-armhf-20230831-en
Behavioral task
behavioral5
Sample
gpen_handwriter_64
Resource
ubuntu1804-amd64-20230831-en
Behavioral task
behavioral6
Sample
gpen_handwriter_64
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral7
Sample
gpen_handwriter_64
Resource
debian9-mipsbe-20230831-en
Behavioral task
behavioral8
Sample
gpen_handwriter_64
Resource
debian9-mipsel-20230831-en
Behavioral task
behavioral9
Sample
libwbsafeedit
Resource
debian9-armhf-20230831-en
Behavioral task
behavioral10
Sample
libwbsafeedit_64
Resource
ubuntu1804-amd64-20230831-en
Behavioral task
behavioral11
Sample
libwbsafeedit_64
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral12
Sample
libwbsafeedit_64
Resource
debian9-mipsbe-20230831-en
Behavioral task
behavioral13
Sample
libwbsafeedit_64
Resource
debian9-mipsel-20230831-en
Behavioral task
behavioral14
Sample
libwbsafeedit_x86
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral15
Sample
libwbsafeedit_x86_64
Resource
ubuntu1804-amd64-20230831-en
Behavioral task
behavioral16
Sample
news.html
Resource
win7-20230831-en
Behavioral task
behavioral17
Sample
news.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral18
Sample
jquery.1.7.1.min.js
Resource
win7-20230831-en
Behavioral task
behavioral19
Sample
jquery.1.7.1.min.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral20
Sample
privacy_guide_children.html
Resource
win7-20230831-en
Behavioral task
behavioral21
Sample
privacy_guide_children.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral22
Sample
privacy_policy.html
Resource
win7-20230831-en
Behavioral task
behavioral23
Sample
privacy_policy.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral24
Sample
privacy_policy_ext_collect_personal_info.html
Resource
win7-20230831-en
Behavioral task
behavioral25
Sample
privacy_policy_ext_collect_personal_info.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral26
Sample
privacy_policy_ext_keyword_defined.html
Resource
win7-20230831-en
Behavioral task
behavioral27
Sample
privacy_policy_ext_keyword_defined.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral28
Sample
privacy_policy_ext_third_collect_info.html
Resource
win7-20230831-en
Behavioral task
behavioral29
Sample
privacy_policy_ext_third_collect_info.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral30
Sample
privacy_policy_simple.html
Resource
win7-20230831-en
Behavioral task
behavioral31
Sample
privacy_policy_simple.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral32
Sample
user_agreement.html
Resource
win7-20230831-en
General
-
Target
privacy_guide_children.html
-
Size
79KB
-
MD5
c31a3ec28332a889634f0af1d578f4d6
-
SHA1
0be7f3543d9284963074cdb499af68a661ca53e2
-
SHA256
3ed6e38fed6137ad57236bee026e2884d7837c489eac86abd688b1b0e426d2e5
-
SHA512
4bc7a1273aa673cc48b965772781b750b13f2d2414c8714ef940133f4bc2987276d91c83c1dfb943d068d08e8594d4b32b08e83bb1f1f44625d35c2748515caf
-
SSDEEP
1536:J4kvBDmQOAMUWTM5Yx1k4FgMAzD6p2PIFOv0mchKtRn+MEasDgw:JhvBDmQjPW5ksiD6pepn+MWcw
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{08D15231-659E-11EE-A4F3-F6205DB39F9E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "402905882" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30662ef7aaf9d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007832999c35766c4bae1b34334b3bf812000000000200000000001066000000010000200000001f1a77a98e0088412c198f6fd36d4e3e6b791b69503bd9bab52d5583c6b77da5000000000e8000000002000020000000fad898a9db8524cd1a08af40948d61550272747ba9c2165ee21e718e55fec6c9200000005d1ca3716ef0e413fbf7b82388d87e1dc2ad0a4e32a4a9bc25760b466b8656e24000000071fbf9569fde66771f520c4e614a560af68137d518028300c6ddd00ccb4d64d9e50a306a1f32c54b4e5820e1d05211dbaf4fe2bbcd9b77e2c61f551e21162bdf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2616 2364 iexplore.exe 30 PID 2364 wrote to memory of 2616 2364 iexplore.exe 30 PID 2364 wrote to memory of 2616 2364 iexplore.exe 30 PID 2364 wrote to memory of 2616 2364 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\privacy_guide_children.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c92a6d17c18f030074fd0f4eb54cf94
SHA121febc1596dec1ee9951406fd720aa76f066aa6e
SHA2564e43c85276a4914c49f8e0a0d929875d7a7a61ad51fb503763cf6809e4737a78
SHA512c45da7ff629786a45315d33665f8567218c6b4e463cb9bc117ff6f6d269f12a88bd88178c6da3ba262d29c408b9e8d56b55d5b4d8bab0ec343dd90e0d985e261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59174e704f6bef9ced463d8e9f2db80e0
SHA188232d2aeaaa64252bceeb24a28de52b428f6c68
SHA25603d65c5f1380cd582cbc92cb419d311b674c6c37c548f12c47f650317957cb8a
SHA5122b26b804f735605ae5ec5126dcff48e566ce635ae426fd9b6524b39cb6a1887c508cd110a99858b57f9a6d2081bde72dfd627df486a88e9a62124e5f00238e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8060536d636f12f00f9631ca75234a1
SHA1ca3e8ac05cbf2155a90eb9e1cfdefac7ed788552
SHA2563e113c6e621a600d81e8b8fdbbe69a30ebd1c8bdc9540967715a2db14a09a216
SHA512eacad0cf0c8f919854954826e39073a60159c674a59b145a073a65dedb4fa4a44dd95d368428ac67b4fd428266c6d739fc6473e3ad5df93d7fd224e7e8c7621b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501b77d9fe9be502e3a32c0b158075123
SHA171f980ccfbca0ab3bdbac256cfd05ed9a30130f6
SHA256ccd2670f21737e8cd9ec3abb556aed439ffb167b1ee565268a3c34a68982dde1
SHA512033b9d3a91207468e99326f6f579c7257f2005b1408f62902d9f3f8503136c575f64a686bdc08041a1adb0676a46736519269dc1fe3646b512fa64b1e088942d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52004dc445f77d268b23ad0b35d8d983e
SHA17f6ff2ec6463ed79becb9d15caf9ce5bfe6b7c36
SHA256a0e1bc585f8c73ce912f8c004b4f2c299d506498f577bd31647745116f92ee10
SHA512f8fe6c83cdfe58aad1000deccdaa41f0477a8a4f79e2cc6321961dfd0f7cc67e9a4a5563dbe5d1684febc7845b4a11853dd86143aef3a17598d8906149ebc92c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e5e812788527943e55f752b125460f0
SHA14bf531c0d423f812efc77aff3da25dc0ecf8960d
SHA256a715f7b0e9e23d34308c45cb778daa254b7f079646e4593c26dfd431c3ee101a
SHA512ea40a517f5cf5ff7b0994c5a9bfc3f8b35be97dc9598aef02e2163d0ec744c174fd4357e83760a21d5b7f7a465f06da995546bae8e0a73bb5d4469f6d06ff988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b184fa1fcc7debc8254f74c4f995c775
SHA1d76a858e359355a2c6a5f54e4fce033390e45e0d
SHA256b353e00482cca2a9fc657b8e4fd5efe71e9ceb127c5988b963d17e910399a44b
SHA512785cc12a7dc5e89841c3a40940fb08ca89321974df9c8b6e8af59a8533c15936c3e9a115e26945c0c7808d580236b7379030c282b803f83fb079e988d7d63ef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fbce28f4f65fe4454887d9d54c4c664
SHA1d92db86b23d8ad01f12f5d11928a1ed570c4e4e4
SHA256688bf4482d6adf3de586817084794defa16b33c689cbb62d47cfaad6903f5e49
SHA512e605aeedcade45552f1c202ff7d82513920f980ee2689b0ccf2ab4980d326f12e4b796ff46bedf10cde8b3962d8b1321092e2c0bff9483744491c6b83d9d309f
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf