Overview
overview
7Static
static
7ef8eb8c9cc...f3.apk
android-9-x86
1imwebmodelprefix.html
windows7-x64
1imwebmodelprefix.html
windows10-2004-x64
1imwebmodel...o.html
windows7-x64
1imwebmodel...o.html
windows10-2004-x64
1imwebmodelsuffix.js
windows7-x64
1imwebmodelsuffix.js
windows10-2004-x64
1imwebmodel...two.js
windows7-x64
1imwebmodel...two.js
windows10-2004-x64
1index.umd.js
windows7-x64
1index.umd.js
windows10-2004-x64
1libwbsafeedit
debian-9-armhf
1libwbsafeedit_64
ubuntu-18.04-amd64
libwbsafeedit_64
debian-9-armhf
libwbsafeedit_64
debian-9-mips
libwbsafeedit_64
debian-9-mipsel
libwbsafeedit_x86
ubuntu-18.04-amd64
1libwbsafeedit_x86_64
ubuntu-18.04-amd64
1localappchat.html
windows7-x64
1localappchat.html
windows10-2004-x64
1windmill.worker.js
windows7-x64
1windmill.worker.js
windows10-2004-x64
1Analysis
-
max time kernel
134s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
08/10/2023, 00:09
Static task
static1
Behavioral task
behavioral1
Sample
ef8eb8c9cc618c433f5c864bf19bc867193fb4f61d5994312485c496c2af5cf3.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
imwebmodelprefix.html
Resource
win7-20230831-en
Behavioral task
behavioral3
Sample
imwebmodelprefix.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral4
Sample
imwebmodelprefixtwo.html
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
imwebmodelprefixtwo.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
imwebmodelsuffix.js
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
imwebmodelsuffix.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral8
Sample
imwebmodelsuffixtwo.js
Resource
win7-20230831-en
Behavioral task
behavioral9
Sample
imwebmodelsuffixtwo.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral10
Sample
index.umd.js
Resource
win7-20230831-en
Behavioral task
behavioral11
Sample
index.umd.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral12
Sample
libwbsafeedit
Resource
debian9-armhf-20230831-en
Behavioral task
behavioral13
Sample
libwbsafeedit_64
Resource
ubuntu1804-amd64-20230831-en
Behavioral task
behavioral14
Sample
libwbsafeedit_64
Resource
debian9-armhf-20230831-en
Behavioral task
behavioral15
Sample
libwbsafeedit_64
Resource
debian9-mipsbe-20230831-en
Behavioral task
behavioral16
Sample
libwbsafeedit_64
Resource
debian9-mipsel-20230831-en
Behavioral task
behavioral17
Sample
libwbsafeedit_x86
Resource
ubuntu1804-amd64-20230831-en
Behavioral task
behavioral18
Sample
libwbsafeedit_x86_64
Resource
ubuntu1804-amd64-20230831-en
Behavioral task
behavioral19
Sample
localappchat.html
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
localappchat.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral21
Sample
windmill.worker.js
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
windmill.worker.js
Resource
win10v2004-20230915-en
General
-
Target
localappchat.html
-
Size
2KB
-
MD5
5e6a280dcfc9be1daf48983ad4316a42
-
SHA1
eac5cf38fc0580237d522f54ab7b970dc9e9fa30
-
SHA256
036336385be7e60aab69d26087194b7719b6b04cecc8b43b27ebab52ec95d596
-
SHA512
39e99d183c020e08cd1d017215b1a1950866482994f1b045ffe70cc9995bd02fb7d407d7b9d769157a6258da6f9db4155b0f76056f21405b72530f49e5172ea1
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60b3b625a9f9d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "402905125" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4FF3FE31-659C-11EE-865B-4E9D0FD57FD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f908080c5c8cf442941c5db076e34ac200000000020000000000106600000001000020000000e7f0126d96ad622b1b7d46d03b61f74a486a2cf286dc7d77dae046eb008ef376000000000e800000000200002000000051b0bd6798eb16be5b6be3dc3625e3bb255668ec5610b2e4cb5077bb46308b9e20000000b05215c9a5306b56dbbd2566c66efb0c3a083b09a73b1459ef9b88b401c82e2940000000e0edc37f889b2db9103b6541f1b8c1bd72fef5162e347abb39e9e8dedce45a588783a3591a76349681cd1d0dfc6659c25188f16ab8c2150165bed091b216056d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f908080c5c8cf442941c5db076e34ac2000000000200000000001066000000010000200000004b848e30ade0bd77515163d080c9170cf0b840435a28f4bfc4521359801d0b8b000000000e8000000002000020000000d3862171adf251e8310548e7e9e12e9bc5383828def9ba77c52d1a982e26b70a90000000fac9fa96d5239614df3943755fbe4d6c36b8d1c4c249acb54f0f4d337f26d95d4fabc1e4ea9431eaa9f303d13461935209450876ee9d3a7ccf81a436e8fa63ec2e3903f622d1cca42428e8930a253d356873df562ada4ae3f87d358f2968cbad9cb73f5f08e82b7d3aeb72df654455a1ed18958bf43fda8fdcc7bccbf3e049d9669cd678baaefac4a1adc26e5156a5e94000000068457783a22ab7e4223e82869e7f047f3276baada1c9d06bc5e3a4a390af762a32ad10c499c7e2a0b93ed7eae18a6304cfc311bec70a6ec6af12755640fee9e9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2392 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2392 iexplore.exe 2392 iexplore.exe 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2168 2392 iexplore.exe 28 PID 2392 wrote to memory of 2168 2392 iexplore.exe 28 PID 2392 wrote to memory of 2168 2392 iexplore.exe 28 PID 2392 wrote to memory of 2168 2392 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\localappchat.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56966ca746e5665576c2f3916ba5b2355
SHA148ccff9e8741cf66af1fdb97689f44ff6eab3327
SHA256d2847825a42de20ef52585445129d7ef4cdd5a1d06e909255874a788c9519136
SHA512fe208b93c3055b37edde61541ee83941daf38f90b3aec13045cbafd44186441377da37894d4fb60154f81bbfd8465f3d606f3d715a7e0b35d8258b0548963a9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541e2d9e00c96043eca928f11cb72bcd3
SHA1e0c434fbf644e4346a6986f04055a244666c58ee
SHA2568424c7e8b90f7cc870702b5b00c625239a3d9770ace9231d5f9b1c4428c48509
SHA512488f001777bd0c7d000b0820c2f6f1f3a9f7e370347605876e177db9f6d9678e6141eb7472bba2ca2163af9b161e0fe9630db44c492cba2518b355f56c3f6fba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb11fd17af391fbff65cb8887e777941
SHA18b644ef656bfa12f5f2f4802eee2b85d71eca99f
SHA25655a7ee5ddbacc995ab6c37842719e61c0f0d336142a3c17e99bf99b7d8309653
SHA512486c6edc997d27392a4af07e0d5f1ff7e19a1910a63f2897f5b1cfab5e7c425bb57462a798432f42fe021dbb28b7c5c6db9d8b59c4fc02bf44d9346ef2c42e54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e08f65406504e9a04d1e9b0cd9fd5c81
SHA1ca7810e58dac1fb9699ddf950dde0930dfceb811
SHA2567cbd2cd5244ce3100882ef3912accfca5ca96ed4003b5d3e075f4eaa92e049a5
SHA5126a61c8a7f128b2a8673624caafcad7f952de7500ba8757c3b5b638bf224fc9942c57bf37a308334e1bbf566e1db82805564b9b195f0e588a3e82b9ae44818488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505bc3aa6bcccb68e90014d7861843513
SHA143942f4ff645ee52e1a44291e4fdf4808445b910
SHA2567d0c817004ff7f1b825522fe32fae0bf44892e88afee934128f4b07d24f7da6f
SHA512f309b1164323e90b2d8892b1b52791cc6e97b32ae4020cb7c8a416795d9af621b1e54671dbb7919f9ad617d7f6eafac034ce92e714361f85b401f58bc3432a95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c09e551481f7acb8947ee4abeca23827
SHA163f429f603db64fca7737db7254d5cb920d05657
SHA2566ddc9aaf6d838670ce73ff355704ee2cbc04efca038e08795498715a66682af1
SHA51226992860f4199ed3d88a287518a277aeec6aca0038797d55a0c5ddd19f4c1f536a1a2cd5d8ec034db63b96d5bd6d09d8cf467cbf7e10538538f51ae074feb4bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d1bbd614c594d95c1f93f373beb1bb6
SHA17eaf7f2511934e3a815af6d4d9f33c3b7c90212c
SHA25686fd40a08ded09dc69373addbec88ff2bc85f0c0d0311d54b3b670a26515dd6e
SHA512bcb316effd740f5f05196285f4cbd130eecba38c80ee9f4e412044151befdc0cc9b53879749b6577c499bd89445797a2c8d9fd0326c66002746db7fc930eeb4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591fcd1782c1dabae1b11b079338d4293
SHA1d7a9c9fd9483b22ce5769debe0cc196e3d4af6ef
SHA2567a9df7ff19eff4cdf81308f96e2f9b7022e13f2ea0aab38bc8231b3ef8755b2a
SHA512ff03968ac5e1ec458701effc2eb177f410aad6c19d7ad1e06931dbfc862f9c96a808bc01c12c2db7ceeb703c1aa9ec933b745d615fe64d84fda32c191c6c326d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5228c3a182a05ec595b9cf890846c5484
SHA167803b22e3bb5514047af9f88f18426a7abea261
SHA2562e0684543d9d1aecae63609eeb7c212131dfb447d811ec45dfd9f040a2bb3563
SHA512703f69ef9ef5db0eebbd16731c95b387738b03902cf22a8c0a817c63e1ad2b7d22964005a860960229dbc374e35ca040e90f42b4616b0aa9cfd10760df7edba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ba17fb9f19e6161d29405e5d7772467
SHA13a8da14c5ed9cc55f04002215d1e9addcf4693ef
SHA256fa3d0cf9e5032d58b43e4f2594ca53e1b5045b7b383d98b3409ae5e1d7c09e99
SHA5126f4ce8e250489d9ea57cd4459c00eb836f745a0f554bb80f6f2b6099e5eca7a46e24b137da3c490b53d1d023db62cf258b46217c6c19462625a72f19479caa56
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf