Analysis
-
max time kernel
134s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 14:18
Static task
static1
Behavioral task
behavioral1
Sample
Spotify v8.8.70.532 Premium Mod - AndroForever.com.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
licenses.html
Resource
win7-20230831-en
Behavioral task
behavioral3
Sample
licenses.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral4
Sample
quicksilverCardAutomationInterface.js
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
quicksilverCardAutomationInterface.js
Resource
win10v2004-20230915-en
General
-
Target
licenses.html
-
Size
1.8MB
-
MD5
2d0ce6886e0879d82423a72a61e25478
-
SHA1
9995d5943ab31a652dabd412b8f7f6d0c7f87742
-
SHA256
aa9201dd0fe5c65745b0ddb4ea7b83bf9b61e1c3f3debbae884bc47458d80726
-
SHA512
1bf810001bce87f0a5bd0e40fd4d6dc2e4d36a66fe32121a84e457f7295f59832d6c5e79634944c0225e1d1d3300031513c28a8670aaaf7bb4e5423ff5c3db82
-
SSDEEP
12288:53V3e3P3D34353/3q3q2w2FDS303w3e3w3a343H3S32323+3n393C38303J3l3fz:P7q
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0AE8741-68AE-11EE-9E6D-C6D3BD361474} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003916b9f19191c547a3cd833648cc0b6b00000000020000000000106600000001000020000000f9a871c6c93409a8dddc9a819467043ed77e16ab0cac253ffd1ae23ea6a3d74d000000000e80000000020000200000004fb5adf0da269c42ec0df9c497e12ab72d085dbd5e03785f852fe43338dce809200000005628489c5f9f0c786a085f5a1e5daeb49c6c86a460b28adefe304d6e5be62d1a4000000017c0095e608eb4bab256273c16d5a641f88c083ae9123bc001b1a714b8ccdf60ecd6ad4b16263123b35e640894db2cb2b9ac05d96a252fcf59600493ce6da1b7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0ce11c6bbfcd901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "403242975" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2824 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2824 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2824 iexplore.exe 2824 iexplore.exe 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2576 2824 iexplore.exe 28 PID 2824 wrote to memory of 2576 2824 iexplore.exe 28 PID 2824 wrote to memory of 2576 2824 iexplore.exe 28 PID 2824 wrote to memory of 2576 2824 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\licenses.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2824 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57a430cf1973314036ac325329f0008c9
SHA13cb2ebc0d009ef20610376dbf425a75ec064bb31
SHA256ce64a82d98e624dcab31eee29272639649357bba6a9351ed2e5b74e562d89703
SHA51262a25ce8f8c79fe96d352d0dcb78175301dfbb1f87e6e5f0b6d79c5a161d4ef46cff42ce8a649802f62827d60a1980241ea1d93ec758bcc2255899ecee22d8aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55e4061438a9cfd814562ab203e9f79fa
SHA1c7a7763f315a682512d1bc8fb242362b3ef5d813
SHA256d6ddf2ae7f41af75c4964756ce231362e169e46218f481b03f674be86294d4eb
SHA51235f212c0eee56574cf90b06200d3a22f8ba39988c86e50ea0238035440fa08840e0003fc14d7b47911071273c6137b05f55467c5e3f842096c746b646ed28835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55f8c44d489296a458868a80785badcff
SHA1a5f5820f0d4f66311e2f1dde7fa04a8a34f1cb8b
SHA256bf29a6b9af89a677083955e90703504050313b73a773c8c947d3afa882c8a960
SHA512283f69b1dab801d24590ff3d418be714f115d84c2c50984c61f769b2d0a30fdffe92b279ffc334bb71c5192968441898c9961cee73b4acf016662780919d4208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50504f4dab69d3132c450d2905acceb3c
SHA1270c80faead4c968cb533091f9a3b4ae8e8f6086
SHA2566590e8cc73a63ec0cf21dc2076f438b1bb622102afbc943044916f8221a6b23c
SHA512e7b434660358314ee44cae96bccf075d87acb5aafa3b70b1da11603d81b56c8abc0d5540da9ef848e9a8bb27c05e9250d5e2e93f97bc58bce49a50a96d8a0145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ba63d8eac243020c02259e59c944dd65
SHA1f1fd3dbaf4307e896ae5cec44cdbc50dc55c52ca
SHA2566658ec299b3194ff2d7af3ab09f04ec31e74634c79544ba8f0cb45919b5935f8
SHA512eb9de5e0583cfefbb5dc5a82d235619e809d84c91b7428695fd3030707b563f3cca0ad4e7c354478e48e199e52bd1d72fc0e0fc5e2b8cb633a0cbfa17cae021d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57e04176d739047d4041aed4436963e04
SHA1c9f4690d68d9f7e7aefe6181d7d1b43be9e15d9d
SHA25670d4c9328241b0b2da3c4149b8abdbd7a41523402b07a1ccd95f632d5822a1f8
SHA5124de0f33cdab6007b1d8cb9ddad0e5dcf8ce6ebe0a90d543ff85b8e90ccb7651ab4f389d168bc23621e610406613dc5c7846b8da93b2f01aad2304bb07370b74b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57e67829dcfc750d9ad597ad8e3bd656f
SHA162316621756c914ff09514f8ea31d65ad234200d
SHA256954c1f05a1ae6306a25c3ec2acb22eeae93459b185f2601c78917172ff04c497
SHA512ccb622aaa70d18502e16b5d93f657899cb4295a7eca9601dd746a0ec923f17e1bce3f28cac3f55a9fd2e32ed7468717d09586f7a238daf0b191cb85fb9cf2704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c13c4a1a582fffe8fb0a37f919e69efe
SHA1e4216d9b98d5080ff6745c93d0e56d68ed2d6243
SHA256466b39899d9add43e595d6ac04a225e0066e16ecce8888be7e6a1c672f08a649
SHA5127aaf5a5a78206ad4509bde8a746e4e93a4af9edd5361defc568b91aae7d33b41c5851c54241fd18492f0c6edff1208640d04a515ca8736d423bc3de4358b75f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a0ebf912bdcebbdb214a3e4e6975505f
SHA14f7fd1a90f4779f8aaf120f8365fbbe182f80539
SHA2568b7c3a253642b0d82468c5c2ef792b4da568bef865af9abf55a7b19482f2f1ee
SHA51277b3abd32106efcb0e7225844e5506450803ba955a7f08e4a8e192c30c2551559460a31f56390c30870fed6c8c407b8a29f072a0bf8264765ac4b08a4610a57e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a0ebf912bdcebbdb214a3e4e6975505f
SHA14f7fd1a90f4779f8aaf120f8365fbbe182f80539
SHA2568b7c3a253642b0d82468c5c2ef792b4da568bef865af9abf55a7b19482f2f1ee
SHA51277b3abd32106efcb0e7225844e5506450803ba955a7f08e4a8e192c30c2551559460a31f56390c30870fed6c8c407b8a29f072a0bf8264765ac4b08a4610a57e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55a017cd6ef262dd3889e23ad06968a0f
SHA1a70a685369028bc90dda676c5e280985d130e678
SHA256e7457637bf8a85ea5dc6053899e850f4048f432de62ec6be0f27ac9e9cb338b9
SHA5123d997d113826a5a2e54446644c45d0e36590876fb92835b0ce55f870554944d198e79db6309f2df4c9514124c6c95bc80326bc037a4732463fef487e9c1bc70a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5938700a867fe70f3cfdfa041a3fb218a
SHA198e638165df6a4f15676ec68ba4ed01c5243a0b6
SHA2568888b216c69e558dc94254445c4b2d9a934f913f19f2c61d073afe8bf4263223
SHA512e2776c39a5cdf2c39e9effdf1d7eb0b961d0dcdd967b7389f42b51d8c24170e737a81a0dbf5957a90727513155258198b5242864963af4cc09827e449d9b7784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57254ac9fd89342fc907362fac6c2cd18
SHA1934d9471b4b0eb99c2f478cf9256e6720bb6ef3a
SHA25674b18b2f4e98fcd3e7ee87aa93c1b4c02ecc1b432a8846825a739ae31897290f
SHA5120969924d9f6daa7a4a9eb8b82ebe6393ec4afaa0e8d4e91739502f80c049eae245321aef498b1a35bc655f11fe0248d2469cc0e9a5509c2fbf9f773f280aa462
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf