Overview
overview
10Static
static
7d494040139...78.apk
android-9-x86
10d494040139...78.apk
android-10-x64
10d494040139...78.apk
android-11-x64
10medialib.js
windows7-x64
1medialib.js
windows10-2004-x64
1mintegral_...t.html
windows7-x64
1mintegral_...t.html
windows10-2004-x64
1parse_movie.html
windows7-x64
1parse_movie.html
windows10-2004-x64
1parse_online.html
windows7-x64
1parse_online.html
windows10-2004-x64
1parse_search.html
windows7-x64
1parse_search.html
windows10-2004-x64
1watch_loading.html
windows7-x64
1watch_loading.html
windows10-2004-x64
1ytaplayer.html
windows7-x64
1ytaplayer.html
windows10-2004-x64
1ytaplayer.js
windows7-x64
1ytaplayer.js
windows10-2004-x64
1ytaplayer_...sis.js
windows7-x64
1ytaplayer_...sis.js
windows10-2004-x64
1Analysis
-
max time kernel
135s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
09-11-2023 22:05
Static task
static1
Behavioral task
behavioral1
Sample
d4940401398aaeac4b523dca648577b1f39646f5942a19d62275df539afaa078.apk
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral2
Sample
d4940401398aaeac4b523dca648577b1f39646f5942a19d62275df539afaa078.apk
Resource
android-x64-20231023.1-en
Behavioral task
behavioral3
Sample
d4940401398aaeac4b523dca648577b1f39646f5942a19d62275df539afaa078.apk
Resource
android-x64-arm64-20231023-en
Behavioral task
behavioral4
Sample
medialib.js
Resource
win7-20231020-en
Behavioral task
behavioral5
Sample
medialib.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral6
Sample
mintegral_jscommon_authtext.html
Resource
win7-20231020-en
Behavioral task
behavioral7
Sample
mintegral_jscommon_authtext.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral8
Sample
parse_movie.html
Resource
win7-20231020-en
Behavioral task
behavioral9
Sample
parse_movie.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral10
Sample
parse_online.html
Resource
win7-20231023-en
Behavioral task
behavioral11
Sample
parse_online.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral12
Sample
parse_search.html
Resource
win7-20231023-en
Behavioral task
behavioral13
Sample
parse_search.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral14
Sample
watch_loading.html
Resource
win7-20231023-en
Behavioral task
behavioral15
Sample
watch_loading.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral16
Sample
ytaplayer.html
Resource
win7-20231023-en
Behavioral task
behavioral17
Sample
ytaplayer.html
Resource
win10v2004-20231025-en
Behavioral task
behavioral18
Sample
ytaplayer.js
Resource
win7-20231020-en
Behavioral task
behavioral19
Sample
ytaplayer.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral20
Sample
ytaplayer_diagnosis.js
Resource
win7-20231023-en
Behavioral task
behavioral21
Sample
ytaplayer_diagnosis.js
Resource
win10v2004-20231023-en
General
-
Target
parse_movie.html
-
Size
2KB
-
MD5
16e55a288dbbcdf5ebf301716beef02c
-
SHA1
0b87695d2bf106db0c3e071f6c0a50af82fb674b
-
SHA256
f34f9581110b58ae4bd6414ba916a1ea8d879655fb60e22ed0cdb2c549f1d90b
-
SHA512
f41383fa0e8c6053c3aea67883f7dec53afeccd97deb27882611ece0324297d39a32a8e620b8992ff91622daf5bbeff5f610e396c3657aef88035511a0d8853e
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60e955b35913da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DEB92E01-7F4C-11EE-9877-62F381BBBBA9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000efee191c820df7499e31472656722fd5000000000200000000001066000000010000200000007acc338f2bab53403c3632590b95de20e224579a269dcd1a0a2f0fbe7f43a9cb000000000e8000000002000020000000a66b5bf5b9ec93d9136eff4f0b0e7e5e75a0972b6be4d55628560e093cd792e2200000005a6b8c1109e9cb2a86bc13af2a514acabafc3eb5b4b4d48504708b4f080231ca40000000f04433122404a3684035be39e4785278cce1b31cfc81ea6a088605c9e44502c5dbee46c28948cbd62dba0c4707baa0ba1074b0b11bfafe8bed3268ecedfef8fc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "405729730" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 844 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 844 iexplore.exe 844 iexplore.exe 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 844 wrote to memory of 2288 844 iexplore.exe 2 PID 844 wrote to memory of 2288 844 iexplore.exe 2 PID 844 wrote to memory of 2288 844 iexplore.exe 2 PID 844 wrote to memory of 2288 844 iexplore.exe 2
Processes
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:844 CREDAT:275457 /prefetch:21⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2288
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\parse_movie.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56027663ea903ed3604c7bec6f643b5e9
SHA1a6e1176e4ff07d972400cb488167ebb73cc92728
SHA2561c38804f20b04e4bba5fdf51f53fba265518f37e5e2962c8251b568b2755564c
SHA5128e47299f90ffcee867c6f685a7130e1eb78ba3b27588c418241327ca66c5b519467c5a2e0935915df625cc8cd4e7f11153d2a00dd45979426b1f2e7906ff2d83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563556f99dd5b0b61ced1aa09d8c030d1
SHA119131d3daaaab9fb27a468aaaf74dfac78e4996b
SHA256282c7d52b3280d0a1ba8ca4d4e80b5898e3b61478c8375edf8a3ab0030620f89
SHA51203be13afe7965cbd5ebcd62d4ba8e7aa16bedc49b727e410ba261889c14b34ac82fae706952929ff5aa49d89b8eae0500c474b6d00024dc4a65ab4b1768f0697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b77f4d4cbffa0e87a5de998c471f0b1
SHA153a247528e6ba8c6e404f28b86048657ebe2ba5b
SHA2563b9ca9a6a75f1ed5cc219494a854eedbbdc7453ae6d3a98c0640bca042915ceb
SHA512bf11047fc04f0e670e72a9e2a213f5cc4b605020c3a387bc8d39f0252aaf39b694c3a7bf0a307bdf6cbbd9c26109574bb0b7d9b61550dbe52291a5fbe04908f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4b356533dc9e89d6bd22f8cafb2971c
SHA12e78bfc8f3cdeafc034fc81485a08ca11a8475b9
SHA2567f3f7136bb280fb33e25a41b0b150a0a33e17125a4a87dc19b132f63eb70897b
SHA512f4ce5fb5af964388ec4665cf651768b805b2ce7b92abf7699536ca9495d86d7dba5928a6bb39d34c7496326ffaac9bcd32aefb4b9866b5b6bc3d6edbb538f105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fe99c7d7e3b0cd1e4401719dc23e1c6
SHA13178a5530eb9d5793ed3f362f621ceba4374b4c0
SHA25682fbeb36460fa4da40f58723e4ad9531c402e95200d562fcc8ce9545a15b44a0
SHA5129292257c4c78625eabcf7c4cefa0c36e78ea7035d7b266475000570de83c59d6588f5a5a0bd626859af7ed966859132f6da5c19eabb766708282ab8bf4eb0860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fdef8cf32433bfc6ba6bf51219340bb
SHA1129f737a669112a755e81e08138cbbd22426e1f7
SHA256e9e1fed0ddfd388a0c2ac89096cd88ac90b08f5ac0d5ab4ff10b6c9a8a6086a7
SHA5129ee01d6ea30a2288fc41313e63527eb2d2f0207ae2dace39c1c1843afc59d2b2ee15646e80decc05ef158d9c71d6583a499382dd1148e52449eaf7ed998f2dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57180220ee0810c50f338437253025bec
SHA14ed61df5cb35da65f7e6cc417fcbc3ff5683036d
SHA25674864d947651dfc1f146ab0b7bba8480a9b058174d3b5ccecb2cf20bb4b12463
SHA51244052813a5dfcbfb528b4300ec06638c64c333ac77e7ff7c420e504ad35ed0eae6f9de3c97450b9237c4e904b3f355c9d81d3b91e225a2e2bd7adf54196c8065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f045b35fa976d583dfbbd56b23221bc9
SHA1afe83a4fb67b04b295642f6d5e2c4769238a9442
SHA256322f56920db44b14dbf5387ade2dc1eee0b28813b588fc742b9ab6b8f800bd03
SHA5126209399a6ba72cd728b2d73725af5863ddac8e012c33723ff2cf32a0167727db964d6ca3f9fa361abc56a134c7e4a4ad1e7076a09e60bbed57737dcef119c193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538d2499d44e89e7372ea2ea93847dcf3
SHA1fec3ea8d69c1fddb94d49039e7bf9ff792b2a01f
SHA25601bd8f98b4ba9d9f5b5470a80f3975160b2995b784d27806ace279f416ffa8ab
SHA512faa7a156999bc720b1d43981ccd6b0669c415caf1a4ccddc1bca4405fc178c4b380d3ba33e96e21043ce2ff5f7d75351ae1c4ab25c53ab9e6cd107b3caa2d771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545dae4dcfd015b595c25fdd36aa6dd32
SHA1e12dc29d3826fe5c1b7c53804db57610c10bcae4
SHA256d788d57e5dfa81506c4923b5fe91393f395896f396b0e1f74e5cc0141f632afc
SHA512ff0bba81e7e3b919805faa4bf9e93026eb75cb613d664d125182123b685bf2818fa6f755a20c4358ed3abe400a9db50d1e3f26f2d132693780c79f1e76bccff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c54d91942d3758ca59b1edbaa35bcbf
SHA1b165427417092902a842799f7305a0ff85fbbf9f
SHA256d68aaa3b3aef24581340e364ef9c4df36aa06e1e257e10a067ee6d967ef00c19
SHA512eae062cfff02475f95d3296e83094b1e669325b1323984d67239f2243faa5562f813b5bb81cda68f440e6990afe1e34a4b3db274af65e9c1190177a177e61c29
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf