Overview
overview
10Static
static
7IClCI 3v.apk
android-9-x86
10IClCI 3v.apk
android-10-x64
10IClCI 3v.apk
android-11-x64
10404.html
windows7-x64
1404.html
windows10-2004-x64
1451-1262f6...cfd.js
windows7-x64
1451-1262f6...cfd.js
windows10-2004-x64
1486.8a5045...f98.js
windows7-x64
1486.8a5045...f98.js
windows10-2004-x64
1959-504d72...026.js
windows7-x64
1959-504d72...026.js
windows10-2004-x64
1_app-ec9bb...711.js
windows7-x64
1_app-ec9bb...711.js
windows10-2004-x64
1_buildManifest.js
windows7-x64
1_buildManifest.js
windows10-2004-x64
1_error-a4b...532.js
windows7-x64
1_error-a4b...532.js
windows10-2004-x64
1_ssgManifest.js
windows7-x64
1_ssgManifest.js
windows10-2004-x64
1a1-a098530...1a6.js
windows7-x64
1a1-a098530...1a6.js
windows10-2004-x64
1a1.html
windows7-x64
1a1.html
windows10-2004-x64
1a2-91441f4...ebb.js
windows7-x64
1a2-91441f4...ebb.js
windows10-2004-x64
1a2.html
windows7-x64
1a2.html
windows10-2004-x64
1a3-36d4555...ae0.js
windows7-x64
1a3-36d4555...ae0.js
windows10-2004-x64
1a3.html
windows7-x64
1a3.html
windows10-2004-x64
1a4-aa0b81a...e83.js
windows7-x64
1Analysis
-
max time kernel
151s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 20:06
Static task
static1
Behavioral task
behavioral1
Sample
IClCI 3v.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
IClCI 3v.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
IClCI 3v.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
404.html
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
404.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
451-1262f68ba0585cfd.js
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
451-1262f68ba0585cfd.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral8
Sample
486.8a504593e3816f98.js
Resource
win7-20230831-en
Behavioral task
behavioral9
Sample
486.8a504593e3816f98.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral10
Sample
959-504d728c6bee5026.js
Resource
win7-20230831-en
Behavioral task
behavioral11
Sample
959-504d728c6bee5026.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral12
Sample
_app-ec9bb7fbf1282711.js
Resource
win7-20230831-en
Behavioral task
behavioral13
Sample
_app-ec9bb7fbf1282711.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral14
Sample
_buildManifest.js
Resource
win7-20230831-en
Behavioral task
behavioral15
Sample
_buildManifest.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral16
Sample
_error-a4ba2246ff8fb532.js
Resource
win7-20230831-en
Behavioral task
behavioral17
Sample
_error-a4ba2246ff8fb532.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral18
Sample
_ssgManifest.js
Resource
win7-20230831-en
Behavioral task
behavioral19
Sample
_ssgManifest.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral20
Sample
a1-a0985301155b51a6.js
Resource
win7-20230831-en
Behavioral task
behavioral21
Sample
a1-a0985301155b51a6.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral22
Sample
a1.html
Resource
win7-20230831-en
Behavioral task
behavioral23
Sample
a1.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral24
Sample
a2-91441f4c950d6ebb.js
Resource
win7-20230831-en
Behavioral task
behavioral25
Sample
a2-91441f4c950d6ebb.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral26
Sample
a2.html
Resource
win7-20230831-en
Behavioral task
behavioral27
Sample
a2.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral28
Sample
a3-36d4555200896ae0.js
Resource
win7-20230831-en
Behavioral task
behavioral29
Sample
a3-36d4555200896ae0.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral30
Sample
a3.html
Resource
win7-20230831-en
Behavioral task
behavioral31
Sample
a3.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral32
Sample
a4-aa0b81ab45113e83.js
Resource
win7-20230831-en
General
-
Target
a2.html
-
Size
3KB
-
MD5
c8cc9b9a174968f01a3a48c4e13edda1
-
SHA1
b2bda07c82cb5e053f6a93ff69c674cd82b41460
-
SHA256
20a5c453f487632ba8bb8edb66d2b18117de23fe55bbf0d71ada2c15c5c5453a
-
SHA512
63a612a901b55c821b0b534d8d80ae87903790a01e0978831a1564bc3712aa59f8268e1cabc7d6ada92702e693cef775923746b4cdfc18aa8512b293355f9fc0
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "4181384497" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31063315" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4181384497" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31063315" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{23EA1094-6907-11EE-9359-CE3E7C77A9B8} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{2C2CD84F-6907-11EE-9359-CE3E7C77A9B8}.dat = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3256 iexplore.exe 3256 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3256 wrote to memory of 3404 3256 iexplore.exe 86 PID 3256 wrote to memory of 3404 3256 iexplore.exe 86 PID 3256 wrote to memory of 3404 3256 iexplore.exe 86
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a2.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3256 CREDAT:17410 /prefetch:22⤵PID:3404
-