Overview
overview
10Static
static
77142344ff1...b0.apk
android-9-x86
107142344ff1...b0.apk
android-10-x64
107142344ff1...b0.apk
android-11-x64
10aps-mraid.js
windows7-x64
1aps-mraid.js
windows10-2004-x64
1calendar1.html
windows7-x64
1calendar1.html
windows10-2004-x64
1circle1.html
windows7-x64
1circle1.html
windows10-2004-x64
1dtb-m.js
windows7-x64
1dtb-m.js
windows10-2004-x64
1fyb_iframe...l.html
windows7-x64
1fyb_iframe...l.html
windows10-2004-x64
1fyb_static...l.html
windows7-x64
1fyb_static...l.html
windows10-2004-x64
1libc763d2.so
ubuntu-18.04-amd64
libc763d2.so
debian-9-armhf
libc763d2.so
debian-9-mips
libc763d2.so
debian-9-mipsel
Analysis
-
max time kernel
135s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
06-11-2023 22:00
Static task
static1
Behavioral task
behavioral1
Sample
7142344ff1efa338898a69da6c5081007223717b01b3f4d6207cecb9f646aab0.apk
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral2
Sample
7142344ff1efa338898a69da6c5081007223717b01b3f4d6207cecb9f646aab0.apk
Resource
android-x64-20231023.1-en
Behavioral task
behavioral3
Sample
7142344ff1efa338898a69da6c5081007223717b01b3f4d6207cecb9f646aab0.apk
Resource
android-x64-arm64-20231023-en
Behavioral task
behavioral4
Sample
aps-mraid.js
Resource
win7-20231025-en
Behavioral task
behavioral5
Sample
aps-mraid.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral6
Sample
calendar1.html
Resource
win7-20231020-en
Behavioral task
behavioral7
Sample
calendar1.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral8
Sample
circle1.html
Resource
win7-20231023-en
Behavioral task
behavioral9
Sample
circle1.html
Resource
win10v2004-20231025-en
Behavioral task
behavioral10
Sample
dtb-m.js
Resource
win7-20231020-en
Behavioral task
behavioral11
Sample
dtb-m.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral12
Sample
fyb_iframe_endcard_tmpl.html
Resource
win7-20231023-en
Behavioral task
behavioral13
Sample
fyb_iframe_endcard_tmpl.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral14
Sample
fyb_static_endcard_tmpl.html
Resource
win7-20231020-en
Behavioral task
behavioral15
Sample
fyb_static_endcard_tmpl.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral16
Sample
libc763d2.so
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral17
Sample
libc763d2.so
Resource
debian9-armhf-20231026-en
Behavioral task
behavioral18
Sample
libc763d2.so
Resource
debian9-mipsbe-20231026-en
Behavioral task
behavioral19
Sample
libc763d2.so
Resource
debian9-mipsel-20231026-en
General
-
Target
calendar1.html
-
Size
605B
-
MD5
0b2becfce83dbcd774148db25c25e0c9
-
SHA1
35ae6b30163ac494e4bc55bf638d42e42389c9da
-
SHA256
4cbd0bb1ef23270a42844d84f91d7be6df5fd47bdbb09a82145cedb968418f36
-
SHA512
3d87493a8b778139d0c559b1961309f3a62505b81dd52fa473eb59db607261ade291a99b25d724a22649b82d02e7849aa78ccff5b58d04053677ba739f596939
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "405469982" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0C35B651-7CF0-11EE-91A4-F6B55313AF05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f076e7f9fc10da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000efee191c820df7499e31472656722fd5000000000200000000001066000000010000200000004ad777f5380c022d1e2611aca6a739e4d0e8dfaabaed5af3a8442fb9a739b47b000000000e800000000200002000000071e77dfb35bb59cdd1c0c83697f31922176b81bbafb972f237e5d10ab7f3ed95200000005b8b3c856f884b208296c2a52026a0915ae66d4d5031c25a75cfb87097da93eb40000000177638a839f401127e3588877c93a468f0149bb5262015c2c3da0d251ff9b283f4994d88b17b1e86b662f8046e69994822c22c785488f8d16788a63e118b7b3b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2104 2192 iexplore.exe 28 PID 2192 wrote to memory of 2104 2192 iexplore.exe 28 PID 2192 wrote to memory of 2104 2192 iexplore.exe 28 PID 2192 wrote to memory of 2104 2192 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\calendar1.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cd108e36760cc4b25f22dc84acbc8bd
SHA1e3effa7b976b1e728c39f6a15586320613a62960
SHA256cb63db3c52c66cde0055c9e8e7ff2589fd313aa7624f9a0a558d44d1d644c592
SHA512ad3a0ddca6a75aaf6fa53195721a3762072132f3af57cc8294451f9628e7b9cfe3d1a5ade35d551880da45532106e2b1cdd70ef6b39ca7153520f791d021afbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b55cbbe6304e9114cb01a238d00ef798
SHA1148bca63acd46d901475d94d20398f2a98bd4d41
SHA256457fa86f966185564d3fe106f662599abb7a8fb5b04543c9558d25617d0923da
SHA5125a1d96f98dcb1afd53f0d48000a717511b0b32737674b7642adf228d66f11d9165bfc3edfef6ac4065495a5318b94bc1c9a0cff792d569eb830423237961cd84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5453c94825b9509b39a1a9012e42cd1a1
SHA14b2bd2b0b79dbe4613ebe3d0184181b915d24c9e
SHA2564680fd7d4876a4070979d7e7d594789845560a940a7eea830999e6e4960ed783
SHA5121027c74f03b844b68fbb98d727bc3dff56333416960b87982667c6419aa31da16f92dc2e544a69294260e5bbc88b70f8657780f52c3eed7f358ea979a648fa5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc3c3bd58f82121de52410e87076d843
SHA1e3f1a7efe4e73a332548ca419321dbf58dac12da
SHA25614c86fde2fff552bbc3f7336434db1911f211a4e8aca619217da4856d6e87096
SHA512e0d6fda11ee493524dcd08a69f22c4a9c1d09797e44868286461e2c97588649c68accfb7b9bfec2289f11bf18cb566c3e2e83c0d74f785157b333310619c643f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ed44fdfd737af0786e42a25230d4526
SHA1e55c6fd35e4d5caa3ea2d4544a9d82164c5260c7
SHA2566271bb348161d2044e27772fbac055ca33b25b3f0b6bdd12e1d9089ab879fb10
SHA512dac3380389220c00df495dd0b8dadd71d60ce99aa094de88e4eec864b220fecfaed960b961c0052237c016036e98c628557da0a6d9d0adb00f261dbcd79dbfa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb144b94fbe97ba306ab4ed051f0001b
SHA1f6e6e90a6c017dfe7066fd0f564927c3c5930a16
SHA2568c871cc69ba526f5b90ad595a4ea8fcec6369268e517a8ebf00238d62244bd47
SHA512b14dc76271ce08d09b2674ca508d4ec275eaaa4c02b8a7e63b2608a2aca0a25b4d65b606d25ccfb3c5fa84a6601de643b603542065680fc90ad076246957d240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6add199d01947d11379503361c58b45
SHA14a6472bfa9a0503a19c91ddcd6b3a0d11fe5fee0
SHA2562eb72945d34d84d6bbd443128c76aa96e5d631d6708e0e7a71ac75df2e4fd16c
SHA51229cc85bcca5a942805837dd667797d81001bbc11488323de0a5e215dc06b775165774cb2eca6cb5f6eb62e75cb228a7331195a534013f6a26a0ae99c72dddc27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52df88809a6009f66606ff5e9ac0ab11a
SHA14d389a3ae8bcb6438aa3d9fe17dfd60476a8e2c0
SHA25673ef14ea2b03c59da3fee9164500221eb899e7ca9d1cf9b76346d7f0e61fe2db
SHA512ecd16327ec6405d13ce6611b0a438e009193fa119dae1e6893be0e286c315d829adf60a733cf894658be2d3a049001808746018311904048aae6d0c2bac74a6b
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf