Overview
overview
10Static
static
7d494040139...78.apk
android-9-x86
10d494040139...78.apk
android-10-x64
10d494040139...78.apk
android-11-x64
10medialib.js
windows7-x64
1medialib.js
windows10-2004-x64
1mintegral_...t.html
windows7-x64
1mintegral_...t.html
windows10-2004-x64
1parse_movie.html
windows7-x64
1parse_movie.html
windows10-2004-x64
1parse_online.html
windows7-x64
1parse_online.html
windows10-2004-x64
1parse_search.html
windows7-x64
1parse_search.html
windows10-2004-x64
1watch_loading.html
windows7-x64
1watch_loading.html
windows10-2004-x64
1ytaplayer.html
windows7-x64
1ytaplayer.html
windows10-2004-x64
1ytaplayer.js
windows7-x64
1ytaplayer.js
windows10-2004-x64
1ytaplayer_...sis.js
windows7-x64
1ytaplayer_...sis.js
windows10-2004-x64
1Analysis
-
max time kernel
135s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
09-11-2023 22:05
Static task
static1
Behavioral task
behavioral1
Sample
d4940401398aaeac4b523dca648577b1f39646f5942a19d62275df539afaa078.apk
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral2
Sample
d4940401398aaeac4b523dca648577b1f39646f5942a19d62275df539afaa078.apk
Resource
android-x64-20231023.1-en
Behavioral task
behavioral3
Sample
d4940401398aaeac4b523dca648577b1f39646f5942a19d62275df539afaa078.apk
Resource
android-x64-arm64-20231023-en
Behavioral task
behavioral4
Sample
medialib.js
Resource
win7-20231020-en
Behavioral task
behavioral5
Sample
medialib.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral6
Sample
mintegral_jscommon_authtext.html
Resource
win7-20231020-en
Behavioral task
behavioral7
Sample
mintegral_jscommon_authtext.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral8
Sample
parse_movie.html
Resource
win7-20231020-en
Behavioral task
behavioral9
Sample
parse_movie.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral10
Sample
parse_online.html
Resource
win7-20231023-en
Behavioral task
behavioral11
Sample
parse_online.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral12
Sample
parse_search.html
Resource
win7-20231023-en
Behavioral task
behavioral13
Sample
parse_search.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral14
Sample
watch_loading.html
Resource
win7-20231023-en
Behavioral task
behavioral15
Sample
watch_loading.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral16
Sample
ytaplayer.html
Resource
win7-20231023-en
Behavioral task
behavioral17
Sample
ytaplayer.html
Resource
win10v2004-20231025-en
Behavioral task
behavioral18
Sample
ytaplayer.js
Resource
win7-20231020-en
Behavioral task
behavioral19
Sample
ytaplayer.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral20
Sample
ytaplayer_diagnosis.js
Resource
win7-20231023-en
Behavioral task
behavioral21
Sample
ytaplayer_diagnosis.js
Resource
win10v2004-20231023-en
General
-
Target
parse_movie.html
-
Size
2KB
-
MD5
16e55a288dbbcdf5ebf301716beef02c
-
SHA1
0b87695d2bf106db0c3e071f6c0a50af82fb674b
-
SHA256
f34f9581110b58ae4bd6414ba916a1ea8d879655fb60e22ed0cdb2c549f1d90b
-
SHA512
f41383fa0e8c6053c3aea67883f7dec53afeccd97deb27882611ece0324297d39a32a8e620b8992ff91622daf5bbeff5f610e396c3657aef88035511a0d8853e
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60e955b35913da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DEB92E01-7F4C-11EE-9877-62F381BBBBA9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000efee191c820df7499e31472656722fd5000000000200000000001066000000010000200000007acc338f2bab53403c3632590b95de20e224579a269dcd1a0a2f0fbe7f43a9cb000000000e8000000002000020000000a66b5bf5b9ec93d9136eff4f0b0e7e5e75a0972b6be4d55628560e093cd792e2200000005a6b8c1109e9cb2a86bc13af2a514acabafc3eb5b4b4d48504708b4f080231ca40000000f04433122404a3684035be39e4785278cce1b31cfc81ea6a088605c9e44502c5dbee46c28948cbd62dba0c4707baa0ba1074b0b11bfafe8bed3268ecedfef8fc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "405729730" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 844 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 844 iexplore.exe 844 iexplore.exe 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 844 wrote to memory of 2288 844 iexplore.exe IEXPLORE.EXE PID 844 wrote to memory of 2288 844 iexplore.exe IEXPLORE.EXE PID 844 wrote to memory of 2288 844 iexplore.exe IEXPLORE.EXE PID 844 wrote to memory of 2288 844 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:844 CREDAT:275457 /prefetch:21⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2288
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\parse_movie.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56027663ea903ed3604c7bec6f643b5e9
SHA1a6e1176e4ff07d972400cb488167ebb73cc92728
SHA2561c38804f20b04e4bba5fdf51f53fba265518f37e5e2962c8251b568b2755564c
SHA5128e47299f90ffcee867c6f685a7130e1eb78ba3b27588c418241327ca66c5b519467c5a2e0935915df625cc8cd4e7f11153d2a00dd45979426b1f2e7906ff2d83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563556f99dd5b0b61ced1aa09d8c030d1
SHA119131d3daaaab9fb27a468aaaf74dfac78e4996b
SHA256282c7d52b3280d0a1ba8ca4d4e80b5898e3b61478c8375edf8a3ab0030620f89
SHA51203be13afe7965cbd5ebcd62d4ba8e7aa16bedc49b727e410ba261889c14b34ac82fae706952929ff5aa49d89b8eae0500c474b6d00024dc4a65ab4b1768f0697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b77f4d4cbffa0e87a5de998c471f0b1
SHA153a247528e6ba8c6e404f28b86048657ebe2ba5b
SHA2563b9ca9a6a75f1ed5cc219494a854eedbbdc7453ae6d3a98c0640bca042915ceb
SHA512bf11047fc04f0e670e72a9e2a213f5cc4b605020c3a387bc8d39f0252aaf39b694c3a7bf0a307bdf6cbbd9c26109574bb0b7d9b61550dbe52291a5fbe04908f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4b356533dc9e89d6bd22f8cafb2971c
SHA12e78bfc8f3cdeafc034fc81485a08ca11a8475b9
SHA2567f3f7136bb280fb33e25a41b0b150a0a33e17125a4a87dc19b132f63eb70897b
SHA512f4ce5fb5af964388ec4665cf651768b805b2ce7b92abf7699536ca9495d86d7dba5928a6bb39d34c7496326ffaac9bcd32aefb4b9866b5b6bc3d6edbb538f105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fe99c7d7e3b0cd1e4401719dc23e1c6
SHA13178a5530eb9d5793ed3f362f621ceba4374b4c0
SHA25682fbeb36460fa4da40f58723e4ad9531c402e95200d562fcc8ce9545a15b44a0
SHA5129292257c4c78625eabcf7c4cefa0c36e78ea7035d7b266475000570de83c59d6588f5a5a0bd626859af7ed966859132f6da5c19eabb766708282ab8bf4eb0860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fdef8cf32433bfc6ba6bf51219340bb
SHA1129f737a669112a755e81e08138cbbd22426e1f7
SHA256e9e1fed0ddfd388a0c2ac89096cd88ac90b08f5ac0d5ab4ff10b6c9a8a6086a7
SHA5129ee01d6ea30a2288fc41313e63527eb2d2f0207ae2dace39c1c1843afc59d2b2ee15646e80decc05ef158d9c71d6583a499382dd1148e52449eaf7ed998f2dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57180220ee0810c50f338437253025bec
SHA14ed61df5cb35da65f7e6cc417fcbc3ff5683036d
SHA25674864d947651dfc1f146ab0b7bba8480a9b058174d3b5ccecb2cf20bb4b12463
SHA51244052813a5dfcbfb528b4300ec06638c64c333ac77e7ff7c420e504ad35ed0eae6f9de3c97450b9237c4e904b3f355c9d81d3b91e225a2e2bd7adf54196c8065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f045b35fa976d583dfbbd56b23221bc9
SHA1afe83a4fb67b04b295642f6d5e2c4769238a9442
SHA256322f56920db44b14dbf5387ade2dc1eee0b28813b588fc742b9ab6b8f800bd03
SHA5126209399a6ba72cd728b2d73725af5863ddac8e012c33723ff2cf32a0167727db964d6ca3f9fa361abc56a134c7e4a4ad1e7076a09e60bbed57737dcef119c193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538d2499d44e89e7372ea2ea93847dcf3
SHA1fec3ea8d69c1fddb94d49039e7bf9ff792b2a01f
SHA25601bd8f98b4ba9d9f5b5470a80f3975160b2995b784d27806ace279f416ffa8ab
SHA512faa7a156999bc720b1d43981ccd6b0669c415caf1a4ccddc1bca4405fc178c4b380d3ba33e96e21043ce2ff5f7d75351ae1c4ab25c53ab9e6cd107b3caa2d771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545dae4dcfd015b595c25fdd36aa6dd32
SHA1e12dc29d3826fe5c1b7c53804db57610c10bcae4
SHA256d788d57e5dfa81506c4923b5fe91393f395896f396b0e1f74e5cc0141f632afc
SHA512ff0bba81e7e3b919805faa4bf9e93026eb75cb613d664d125182123b685bf2818fa6f755a20c4358ed3abe400a9db50d1e3f26f2d132693780c79f1e76bccff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c54d91942d3758ca59b1edbaa35bcbf
SHA1b165427417092902a842799f7305a0ff85fbbf9f
SHA256d68aaa3b3aef24581340e364ef9c4df36aa06e1e257e10a067ee6d967ef00c19
SHA512eae062cfff02475f95d3296e83094b1e669325b1323984d67239f2243faa5562f813b5bb81cda68f440e6990afe1e34a4b3db274af65e9c1190177a177e61c29
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf