Overview
overview
10Static
static
7b59d430797...fc.apk
android-9-x86
10b59d430797...fc.apk
android-10-x64
10b59d430797...fc.apk
android-11-x64
10bootstrap.min.js
windows7-x64
1bootstrap.min.js
windows10-2004-x64
1epl1.html
windows7-x64
1epl1.html
windows10-2004-x64
1gpl_3.html
windows7-x64
1gpl_3.html
windows10-2004-x64
1howto.html
windows7-x64
1howto.html
windows10-2004-x64
1jquery-2.1.1.min.js
windows7-x64
1jquery-2.1.1.min.js
windows10-2004-x64
1keyboard.js
windows7-x64
1keyboard.js
windows10-2004-x64
1mit.html
windows7-x64
1mit.html
windows10-2004-x64
1mpl2.html
windows7-x64
1mpl2.html
windows10-2004-x64
1mraid.js
windows7-x64
1mraid.js
windows10-2004-x64
1mraid3.js
windows7-x64
1mraid3.js
windows10-2004-x64
1omsdk-v1.js
windows7-x64
1omsdk-v1.js
windows10-2004-x64
1privacypolicy.html
windows7-x64
1privacypolicy.html
windows10-2004-x64
1ui.js
windows7-x64
1ui.js
windows10-2004-x64
1Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13-10-2023 04:44
Static task
static1
Behavioral task
behavioral1
Sample
b59d43079747f8f280d0f2080cbee060e9fb7d3e0ccdd2882f6f5ffcac350efc.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
b59d43079747f8f280d0f2080cbee060e9fb7d3e0ccdd2882f6f5ffcac350efc.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
b59d43079747f8f280d0f2080cbee060e9fb7d3e0ccdd2882f6f5ffcac350efc.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
bootstrap.min.js
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
bootstrap.min.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
epl1.html
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
epl1.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral8
Sample
gpl_3.html
Resource
win7-20230831-en
Behavioral task
behavioral9
Sample
gpl_3.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral10
Sample
howto.html
Resource
win7-20230831-en
Behavioral task
behavioral11
Sample
howto.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral12
Sample
jquery-2.1.1.min.js
Resource
win7-20230831-en
Behavioral task
behavioral13
Sample
jquery-2.1.1.min.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral14
Sample
keyboard.js
Resource
win7-20230831-en
Behavioral task
behavioral15
Sample
keyboard.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral16
Sample
mit.html
Resource
win7-20230831-en
Behavioral task
behavioral17
Sample
mit.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral18
Sample
mpl2.html
Resource
win7-20230831-en
Behavioral task
behavioral19
Sample
mpl2.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral20
Sample
mraid.js
Resource
win7-20230831-en
Behavioral task
behavioral21
Sample
mraid.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral22
Sample
mraid3.js
Resource
win7-20230831-en
Behavioral task
behavioral23
Sample
mraid3.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral24
Sample
omsdk-v1.js
Resource
win7-20230831-en
Behavioral task
behavioral25
Sample
omsdk-v1.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral26
Sample
privacypolicy.html
Resource
win7-20230831-en
Behavioral task
behavioral27
Sample
privacypolicy.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral28
Sample
ui.js
Resource
win7-20230831-en
Behavioral task
behavioral29
Sample
ui.js
Resource
win10v2004-20230915-en
General
-
Target
mpl2.html
-
Size
17KB
-
MD5
ea5774e8329852655bb7200eadc27752
-
SHA1
b2276a8ef099ac79566dfdc7f10185391623e8ca
-
SHA256
8a6321ff9c6cff54621744534fb98232e09994c80c305b9fb5f6d70e8c9b84e8
-
SHA512
9eb04c4effacf9b6eb36f2fd28e0ee7d9487748aaf801d4c9df9ccc5f0dbe25384e46a140c0181a77d1d704ed5c6c3754c6fd6a4ad4def472c13aeeeac9ebec6
-
SSDEEP
384:/6HmBmFwcg8UJsqsQInUdaebkIABBDrR8GzAi7W:/6qmwL8oxb6BhR8GUi7W
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0aa1ba47c01da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003916b9f19191c547a3cd833648cc0b6b000000000200000000001066000000010000200000006c5fee558c737ff8326afbda19d872fcd3e46b37c76d34e8dc1386c2377ecd5b000000000e8000000002000020000000503b11441762c26a0e8e576f81d907e2a7d01c5c947251c47c3bad53ec654053200000000b2e288bac2aaf9ff0ccae74395ae27e0efd0e0873b92290419f5d93d797741c40000000f6980a4b99346f0d424a23d9af51c8fc8e7b4fc3e3ee60509271a7a4f15dfbd2b46717d2630a05cb8cd697b19a6a6caec2f043a28819b7bef5436e8f06647d7b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CF290EE1-6D6F-11EE-AA35-F2498EDA0870} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "403765616" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 3040 2104 iexplore.exe 28 PID 2104 wrote to memory of 3040 2104 iexplore.exe 28 PID 2104 wrote to memory of 3040 2104 iexplore.exe 28 PID 2104 wrote to memory of 3040 2104 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\mpl2.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a884c3deb558afbb7b6942c33726c060
SHA1fcd5715dbd230a1bb871a7df420e4dcd22689fb0
SHA2565dc95ec5374bb0c9526fd9bd219f9715615b0414d06a2d68bc523acd1b719c1e
SHA51229877aa6d6122d6075498f1b704ef488cd68dcb75155561442ef0e9331cb969eba2086f735a200b1422c35675c084969e11caa1e42e4160757806405bd487ac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f0e12af3a18f908bb4afecb01b8420d4
SHA1eb77191c4eb540a12fc06ab9b53f4e53525ae96e
SHA25694e5ca3befed15d2fd484683c2e33c592681e9550946dedaba6c814b51849871
SHA5123f0ef4c13159e76820146dacb3407245a85d09e2c4789b417f86c42b4144e575ba6250455df1bdc6fc11b3371952b13f2e7c1c88ea6ee673827e68865cb10ae2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51ea1758cf477964884f736d6bff69d9c
SHA1268b425b099323e24a0456ba7a7a610e58cbd960
SHA256a2794e76f1545558cb63f03401a7234620653f307d063c0b1c600d57dbed8c4b
SHA5121b4ab92b54b6356d730b214b343d72ad69db86406d22563df43dca0d8bfa89714fe3e8a67be0c46463fc63c99bbf3974a14512ae8172df36d49514dbb4e8be78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c261e312ab0e3c5ba229e252f2194d69
SHA1a4b7cb9c99b5df1160593b074a5608f78fd41dfd
SHA2569a6be3b139406bf8596947f229c1dd5dc9ac6f7321a5209d614fd057236aa560
SHA512fdcb1f09732d74ddd75e30d40e1c974c673cd5c55673d21e257e8f0fb7caa1053b08b7e8f9942859f35784076b73f144deaaf9832879aef9805205c4ae8988a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59cdffa8604c96fc2c9f1f93841149ab0
SHA1a136941f6b1849122ec7f0b3d9ec941d5a7010d1
SHA2561740c3fbef2ab29e783e06204baf76db8362209bc9c9c8c62e028e7fb18ce718
SHA5121f9833cdd4b217a93496569dfbd393c3d043d8ab0bd57755afe492201435f58e75cfc18906f08d0f0a94a07611d89d42a045ef54a2eec709f7242b73ed56588e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD573a54e2cbfb5d8018e49fff4e3746a8f
SHA1d55be719fc043d4536b7ef5334a89775ed5d2c30
SHA256e3deefeeb09bfe8d45a78dd87b2f282bc8a0b0c092e1bb0754866649ff34069d
SHA512f0caad6f2a5d2b9484e663e70d9306d4e915230b95ded08c3f81695c5e3ec70720f475002a45a2d4e1200333c1ddf48debf823228aae26d085e631ecb4c84669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cd78d05daf1dd2f8a475366b4a4d5505
SHA15e82725fdb284696d28b0b2e2c251d571bb2ef98
SHA2568b66ef28f7dd186b11f47d4349c9b0b76200f31e9df65c908b4461027ba15991
SHA512778872e2f93c330b65c2090d34942c484b38e326df8786e9cf8356b0bd5965ae6b0fb4b0b35df3280c83cbc9bd985d1607acf7e58388b809e98c9ee1c17dbc64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b66a63af044c734efdeee14078cedd3c
SHA148f65fcf3389a4f67243f775cfacf373da4ff3ad
SHA2568b2435718007de935a5710eca8492bfb75e304f66a13ba23205cbd862d2104c8
SHA512214dafd433c568fb7b07796d49bb0d4e116571d03b1701b711a8cc65666566f5caafde8c9b2a7f9b56c54b7aae51094e6de7f6ef3c49335026bfe9aae60f1468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD550d921efbfd12a2a96ad3879d29062a3
SHA11f53e4a8aaba72050ac28af7e4832d9c52607460
SHA256b72e3c6bf65d3ccb375f3097f58de29ccb8029ece24662a33932551e01da6c68
SHA5120640e8ad324460003af5dc7ca95b0901c5c04120481d8c32f04aeb31e0a35955b96c171603ef68377b89a24510d7bacafab4de8430c025db3b5b9b6a43d3be31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD570fb8460c6088044526fe4cd64eb3865
SHA14e4c0eba42c8ae99273c264d1cbc7f86b34b4000
SHA256c59385e8a848ea5472c27cbc1781ed83a63dfee6fd527c374a6f83e59e909a86
SHA5122a88833b06ddbe6657e39fc5e198d1bfcf3cb044a85d6c1106586a727bd67eef78a3e6a1f7bffdcd9e604aa391a38229550b2a3b999e440fb8cd7c30cf1ab79a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56b97ee0d09704eba5c81b4b589b75d09
SHA1d661993fcd47d9c6085652310ff81f5e574a6dce
SHA2568b2af23fc92d2481c07e17c7bc945c1a1a2f0801ed4ae80812301d35cf37cf23
SHA512d09b84606378d514fd516ff29264067c9b977f78ef2f74dfee42dafe2d4a8496e544a67300e4edfa8ca0bd44f5d8e2f3fcf718ff365217eeaf698367bbff9732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a0dd6ac45d52713d0c81347af7895317
SHA1e71605fa1ed676a4001db9770aa0d087cb561853
SHA256eae669928f52ac06cd01990c309d3292db379b729e8c5bc430f50c19a627a8dd
SHA512639ee9cfb446f34845d995ed3ffabc5e3e43ba2a0a35538d33773362990fcf8d88e997d4639cfe7433e3255b749c628284dd35a709e19c23df573345ed719f7d
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf