Analysis
-
max time kernel
134s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 15:29
Static task
static1
Behavioral task
behavioral1
Sample
com-mod-spotify-music-and-podcasts-mod-apk-8-8-70-532-105123468.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
licenses.html
Resource
win7-20230831-en
Behavioral task
behavioral3
Sample
licenses.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral4
Sample
quicksilverCardAutomationInterface.js
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
quicksilverCardAutomationInterface.js
Resource
win10v2004-20230915-en
General
-
Target
licenses.html
-
Size
1.8MB
-
MD5
2d0ce6886e0879d82423a72a61e25478
-
SHA1
9995d5943ab31a652dabd412b8f7f6d0c7f87742
-
SHA256
aa9201dd0fe5c65745b0ddb4ea7b83bf9b61e1c3f3debbae884bc47458d80726
-
SHA512
1bf810001bce87f0a5bd0e40fd4d6dc2e4d36a66fe32121a84e457f7295f59832d6c5e79634944c0225e1d1d3300031513c28a8670aaaf7bb4e5423ff5c3db82
-
SSDEEP
12288:53V3e3P3D34353/3q3q2w2FDS303w3e3w3a343H3S32323+3n393C38303J3l3fz:P7q
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "403611247" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002bccc567d90a0b479b49b1b2d43318c30000000002000000000010660000000100002000000088441d5ec3aa547002ccffe65c76075cef2385f4cf37aaf9b64125f646371ece000000000e8000000002000020000000111514e7146d982361729d08bbc85d550897f6f626b785fd7dfd5407b305468c20000000e3e94866587e48af9d0e8267c93543aace0a705cc38bc6e444fe5cac092803ce4000000096de2ecbf60981304f14ab5e27e3b2b2c75fa00912cec7b77f47be436068815cbe7b0737c805b480768011716d92e55b2c9cadad84358a6ef63c1c3da8d75a28 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50328f391500da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{64474AA1-6C08-11EE-A7A7-56C242017446} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2560 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2560 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2560 iexplore.exe 2560 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2984 2560 iexplore.exe 28 PID 2560 wrote to memory of 2984 2560 iexplore.exe 28 PID 2560 wrote to memory of 2984 2560 iexplore.exe 28 PID 2560 wrote to memory of 2984 2560 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\licenses.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2560 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a241cd2b982e48a3287699592a860b44
SHA1d57a9f8b6b90c4b9f3fb41aa731cdc0b1af18432
SHA2569d8eef7b5fdf590eecf8fda50007dcc7e5f2269c0d440cf30de377de9b7fc18b
SHA5122bd6e2dca4b0d5ade86b4747e33be909ddbbaca11566a67511e34c3970a4981def175eaaf452ab7b7ccc77cfa486caae6828e7c0fbf1589c9e52296e40c0fbc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9f84caeaea133069766622641d28b2d
SHA1b556ad3ffcc72cff35e63fe55f3dd1b3f2c03e55
SHA2560d4735a78c8aab9c65a1119431deb0c8b978f63cec3649cfeb359a59c5274a6f
SHA512cea57a40bb628cd72af49d695879809e79390283523999117644855e64c3aa80c99475cd4b2a33590a643c90061cd67c73b8381d5590b53265ba1aad81753639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58aeb6af319ef9a62df0c602d8672d656
SHA1d9fe89a58177ce846e68b54f1df23149d73339d6
SHA256436702a9f199c7cb36e5c8aade9c92241508052aa3a124098be8786e09682550
SHA51268aa869ffe0d3b8662898cafd6774e4fed8fcc7a3f5a25000d40245618262c09ca6795c6e4c4e48789d90993fe5405d72b1570b10a8d79438a9f6e89e763802a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fce104cb77f52ebb77b579a16cf5306
SHA1e831f1a416071cf402a336c7c007a3db47c797b2
SHA256c849e876fec4e05451a713afca756eaa1e211af160af780675a2a4c1a67af99a
SHA5124a64e58c1d40a6b2cbf9fb715dc5185d395d428d59b79564cb29f56b902996278c07d8a36d0ec4b2e9f1d17dd87cac55ad34f9bcc4271e8967c887290e823042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5449a137a074885cc245f4869d153b46f
SHA114138a5bba2e3af5e3ea74980e92ac46181f332d
SHA2563c01bd583817b3b5e5e2eeaba337cf4545ca60059ee7846a4c3706bd28be240a
SHA5129ed419211326af4ce10b63f34b8a6219139e75f39971d7f7a6c00737ed11c2beca3f80802e41fdf2efe022c1cf071e37793c6edd0682899b982108dedc3c48b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534040d925333cc9c7199b738271aa3b0
SHA1fdbf9959cab4e1b0a6fe1ce0166283a904658752
SHA256bb29bab3093ede7283e4b31708868744f16b5558ec7b3b16c8ff3ab0c28f0ca6
SHA512d9e491907f8a089b210c7aebe0dc3514b6e46a359bfa714a6d2951a8bce60236cd2d29052c76f3b54b3d3016fdbe37589a7ba1c2cb000931800058b1f7647728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd0887507b4b27694cda1667b51a1a27
SHA13c96b98e610debea3d8d0ebd1daa27ac05c40c9a
SHA256aca2fa3ef6ed9e36eb2d2731b983db9c66df0ba386a33337ea237caff9c1272c
SHA5124bbf939da467d382dc276a581e59c8ee6fdaa13d8ac3719b7c85d8345d639ef9e8603e69c04c1ad8ee338cd4dff7b1495a6bcff532b13bced7aca45f0dde44db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52530caee90a4f8b424566f4cb6025180
SHA1f49e532fe0d3f671e71c7346894ca8bb1351f710
SHA2565390cea7ce2f119e67fe4024698d82340ea3ce134f3114f69de46cd9a5e8abbc
SHA512223357ce1cc3f9fddb7b078c2ab3ae462aa744e6f5b7939ed64e0303f1e1f3013b0e9e6240d9b2b1c4ae32098dcc1563b85ebaab23fa802515fd1d8f47197b2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5546477add8c33f05b3288151ad0ee9ec
SHA11bb8f4094f294e8e35278904196794a6e9ccd3ae
SHA256ac96e4c1b87fa20f4e6fe40b439304795d5c50d55ea20e2031aa1fcb677e2faa
SHA512fce450314dd90e629a883715dc642e83a30beeccb4e1b2ec85a12c12496edb32bbe32163514dd0ffb4695bb33491e2cf28608f983ef6596fa3b82c3a7298dc16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ee66e75b7388bfee91ee1599321dc57
SHA19bcb02450a74bc3e02bdc0b2c040d54c3afa3ef1
SHA25620dbdad2ffc91b6f6c20f0c69882d79781b2e0b772d6f1d0b5bb960f02754354
SHA51225d2eb643c0643df15a763d5f98d7b1e83ea4a0558065078f1a06ef57a9ec1db2382b1141c43a85b280dc734afab1c33cbe57f5db585d2d6ab6ea5d617883826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb3d11201458ca31d4a34a217a3e141e
SHA13423faf9d164c7b909afebf4b6146310c56ecfe1
SHA2565faeb8dcc0a0b59ccabaf8d459fd32115be8c6cc1dd9f7d6b55f5fc02c2b5666
SHA512f2ca9d3559c89d7b535c3473f38aa22999d737642dc81f188d121a3847c92eaf220c72203c3e98fadd99ddc45d7c53b5b9775aeac2add3cb0c637affe743d92c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e01828e28ef989c2e6afa00802df59b
SHA1a6d75afcb5c7f9dce6e289db0dfa88adcff1a953
SHA25673df21c93c9998458c9771ad030c21f29f744a950d9650e4d6eda9cf1f2ea2d7
SHA512dbc0353754f5ac08f70b6f364803e1351186f54fd4b4520ddfe85647572517ec9aa90d995154ba98017a2a13bc48619114188c3e6c00d4bed407f33968bb3a0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d50c9295d6ade00a733ac43d59e497f0
SHA1d9240fdab6a7dabdded970963faf8a741b63ee9e
SHA25606cca4dae29a60e1e414bc806b1b74fee3f261b8e03dd9b08cc2da0c7c37091f
SHA512703692e1676633471a4c378b2c16bb283a308de727b4243302918afac1806a41c383c9b4bf03f066ee9757f8bfc48374abd37a753a593b2925d8d9fff2a4f6e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af4d4cbcefd9540aa24e3774a4d1cf4a
SHA1ae4bde33c7aa7d7a774225afee8eb419da3d6179
SHA256f36a131c828da80f8e734f5936361a52c88b4cceb9d5cff1f597eaf03c480421
SHA5127a39804312028f88a5d389eebe7a3a9fb91e6944447af64ab6bf29f0ee564bdd79ac1caee81798080370a43cf2539c6b1b85933cdf85223751bb6607f0c2728c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bec17b5d7bdaad144be272ac65cb916
SHA148cb3be79c7267c1d151977b4a1df5b2c9529206
SHA256e57230ffd68b8031cea1a4ad1a862da1e3ff786b99b6e016be928d8038106e20
SHA5126f14b1f0a85fdbd0033905946f665f95a755565d26fae2f76cd565a4aed717805d473126f616b43d0d54ccd2e93e2d05ab1d29e84153e22c9d3e505272bf603d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c5251cd4028670670bdd44092a3d7f6
SHA1d8ec072bceab8c066ccc690e5e666f81f938d41b
SHA2567e022ae610cf5c7262c1b5410a048ebc2da6491b1b8fb4d8147239c50c89d9f5
SHA512f5d81406f31751a7718d340d8ad44c3f3288fe47385a627b20290de9f04a9c0734cd253566260c257d9e3e513081dc8a4ffb1ad9f2298cd617ae269e69d7e370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b429515523e20d7bd026caec0749022
SHA13bb33faf4f5ad8513e4f5aaf28892d8d336687e8
SHA256a1035ee54c5ba058620ab3c165e9ecb9b3dfce7b36e99460a7a2678ef5687983
SHA51215c1d5db9dd0d3704f4a0ab09296507c327e43fbf4fa44daa7c406af8e56e19e977c34473be4b052f6e7c05434934df330c8b69d340ac0179adf753f1709f0ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cfbf976548d01cbae82c6f2b8c5eba2
SHA1d6359a306b19a4b9fb280f20be279d8d3b9532bb
SHA2563fd0e91f415670bf1fcab83d6a381469ac3b1ac5c1cc62498f456fec2f092109
SHA51291aad2017f61592b46f9f942e3646103b83ab7c7bfd55a15aa51d6104cf78f986dce9552002627f7a364aa2bfc0210deae0d83e92afccf2555b44cc617898b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548da52fa9f3ade9c81cccab0de8ca1c9
SHA195688ecc48ed7657adfb2a9baec0eec2fb80a286
SHA25663988e9aac2d8ccb26e06b1b0adcb48df53d75e664f2552eac8f7fa15d5dff71
SHA5120f594bd3fc7ad363d947da6bb91b213cd9341ddec409f2170e3a6957e673c96a40ef28c5c3222b4696743cea5884ade558a8b5d6ccec8353d91d920c32286bac
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf