Overview
overview
7Static
static
7com.gstarm...id.apk
android-9-x86
7Account an...t.html
windows7-x64
1Account an...t.html
windows10-2004-x64
1AddFriendInGroup.html
windows7-x64
1AddFriendInGroup.html
windows10-2004-x64
1AddOthers.html
windows7-x64
1AddOthers.html
windows10-2004-x64
1Angle.html
windows7-x64
1Angle.html
windows10-2004-x64
1Annotation.html
windows7-x64
1Annotation.html
windows10-2004-x64
1Annotation_arrow.html
windows7-x64
1Annotation_arrow.html
windows10-2004-x64
1Annotation...e.html
windows7-x64
1Annotation...e.html
windows10-2004-x64
1Annotation_find.html
windows7-x64
1Annotation_find.html
windows10-2004-x64
1Annotation_image.html
windows7-x64
1Annotation_image.html
windows10-2004-x64
1Annotation...r.html
windows7-x64
1Annotation...r.html
windows10-2004-x64
1Annotation_line.html
windows7-x64
1Annotation_line.html
windows10-2004-x64
1Annotation...g.html
windows7-x64
1Annotation...g.html
windows10-2004-x64
1Annotation...e.html
windows7-x64
1Annotation...e.html
windows10-2004-x64
1Annotation...d.html
windows7-x64
1Annotation...d.html
windows10-2004-x64
1Annotation...h.html
windows7-x64
1Annotation...h.html
windows10-2004-x64
1Annotation_text.html
windows7-x64
1Analysis
-
max time kernel
135s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
12-11-2023 04:55
Behavioral task
behavioral1
Sample
com.gstarmc.android.apk
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral2
Sample
Account and payment.html
Resource
win7-20231023-en
Behavioral task
behavioral3
Sample
Account and payment.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral4
Sample
AddFriendInGroup.html
Resource
win7-20231020-en
Behavioral task
behavioral5
Sample
AddFriendInGroup.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral6
Sample
AddOthers.html
Resource
win7-20231023-en
Behavioral task
behavioral7
Sample
AddOthers.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral8
Sample
Angle.html
Resource
win7-20231020-en
Behavioral task
behavioral9
Sample
Angle.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral10
Sample
Annotation.html
Resource
win7-20231023-en
Behavioral task
behavioral11
Sample
Annotation.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral12
Sample
Annotation_arrow.html
Resource
win7-20231023-en
Behavioral task
behavioral13
Sample
Annotation_arrow.html
Resource
win10v2004-20231025-en
Behavioral task
behavioral14
Sample
Annotation_ellipse.html
Resource
win7-20231023-en
Behavioral task
behavioral15
Sample
Annotation_ellipse.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral16
Sample
Annotation_find.html
Resource
win7-20231020-en
Behavioral task
behavioral17
Sample
Annotation_find.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral18
Sample
Annotation_image.html
Resource
win7-20231020-en
Behavioral task
behavioral19
Sample
Annotation_image.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral20
Sample
Annotation_leader.html
Resource
win7-20231025-en
Behavioral task
behavioral21
Sample
Annotation_leader.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral22
Sample
Annotation_line.html
Resource
win7-20231023-en
Behavioral task
behavioral23
Sample
Annotation_line.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral24
Sample
Annotation_recording.html
Resource
win7-20231020-en
Behavioral task
behavioral25
Sample
Annotation_recording.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral26
Sample
Annotation_rectangle.html
Resource
win7-20231023-en
Behavioral task
behavioral27
Sample
Annotation_rectangle.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral28
Sample
Annotation_revcloud.html
Resource
win7-20231023-en
Behavioral task
behavioral29
Sample
Annotation_revcloud.html
Resource
win10v2004-20231025-en
Behavioral task
behavioral30
Sample
Annotation_sketch.html
Resource
win7-20231023-en
Behavioral task
behavioral31
Sample
Annotation_sketch.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral32
Sample
Annotation_text.html
Resource
win7-20231020-en
General
-
Target
Annotation_arrow.html
-
Size
1KB
-
MD5
73d689638be00c31b4a4ca020ae5731e
-
SHA1
6cd5af97d26223fc6afbd09d07efae1ddc8694be
-
SHA256
1f35cda71e65de7e0c99af0b8c70e3db4226988f519c7e03aabf776af33ad057
-
SHA512
fd2891142691517e90cbe1387e2e9544484a600eacf139d0a078741e8414ae64da099eaa2b1f3715024860b03ffc0f67495a0761461dcad2cb3c8a09deafafe0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d79072038c960342ab421b8facb933e900000000020000000000106600000001000020000000338c84998d38eae188cb25d88eadbcbdb57b7720c14e8524a6f4a38b373fe8e7000000000e800000000200002000000096753147626ff48fc863260b6fc71ca243b1af36b1ce331ed5a65ec9ba3bea5020000000ad23657ca7e24be3aefe825a31a366968c1bd910ac168186e381fc13c4c1fc524000000039678b1930ec94fd83198b65944ecec11d57de2373eab50a5c7da6d9ba512bb73db603f91092df49426b386ee24301f2c1147718cb59966440ae767c305948e1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "405926889" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DD9C77D1-8117-11EE-9B22-CED6FD478C3D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d79072038c960342ab421b8facb933e900000000020000000000106600000001000020000000a9421f74b5bc2d622ae24d20a55109b6f5b447f2a1ef16e736ee355e748aca1a000000000e8000000002000020000000bff135e29a37f637962d90062ec860c5cc26f7633e2ac4512b157ea8fad31d429000000039c42ebe20f89daf03b7346873fcb3ed3d409599ef36b12b4224180f183764af558ccf286084b4d175fd427ec94ec2b7c1010273972e6c91c27a67a47f9387d83a5512ab4ac1a7f593dd26b602a0c4fbb78067fda8bc0bfcb665fbaca2d8d16480d4a0ddf603327d00e358918aec56aff8c370b2e17dbf0996e9f543ffccd2be9fa467157acbe86857d935a293b42a4740000000bcba9b52b0b71749bf60291013b1e10f465ac2b84a7b8e90994fbed29a1b878ff8726679fac3bc37c18752d6edd5aef3e017ea79c5ed6f051ce17245dfac4eae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60b76fb32415da01 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2896 2168 iexplore.exe 28 PID 2168 wrote to memory of 2896 2168 iexplore.exe 28 PID 2168 wrote to memory of 2896 2168 iexplore.exe 28 PID 2168 wrote to memory of 2896 2168 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Annotation_arrow.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522e93f9e85b3d4f5a7c986157ef008ed
SHA122aa3c536313a01eb5d385ec4747c353da88679d
SHA256b9752efb4185ac9eab24020113cf233ca914d0daf85e9b3c8a105f828c5bbacc
SHA512cb41f33e20d0f3ff97f718aee204e091143214c953d061964f5cef3656fc141521d139bef6eacdec2110f5c51a8ae1826b160e572bbbe2d8168b17e8b7e2209a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f2da7ecf8f5af5b247b5d09c4be6cb5
SHA1e0634e669b3667f194f3ae69a373536fa787a718
SHA25664648b5373dccf7cb730216c0ec271c5b5f4fb548eab31434d0fde01b251d3f5
SHA512f7e189a609be124b396a7600c901919ea988ab7e311fb571ce9cf4c7b71cfb35e3988d863d6496a4acb7ff756cd8a837ce501af15c2c3cf7a5fca0fa2ece8960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d55e6ed1053d7ac9f5d284abf62192d
SHA15f3dedd89d785d8d2d16af54ea854e300cf336bf
SHA256e84778ef0e6d0cbbacee28b2c647ac6e2c8b5d1f4e6f140b522b624c6498665a
SHA5127b58df44d44947886a3dbe305495eea86b0c1c06ffc78854f909999db59ea0642764d106639903a0e4c16f34def6ac6a133e099b3f7ea49d489d252c327e6994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a2728bf2e5e10c27b67bb342b8477ae
SHA18d10d909834373365bc4a1c9422a78a189a73c33
SHA2563c6ea86665829680b42788b1255247500f5aa593f394d9382b67f15990f678c1
SHA5128b4a66bdf517b996a113e2153f1fb7f66aaccbbe97aae43fbb5c4833d34504f067873084c5d1ebcd7278daeccb06e791dd0fb840cc6a8795369f724bd8b32c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fbf6b6ea685cc529d1dd194d62e97c7
SHA19602c97013e9b67696a59146d1bf50177089dda8
SHA256ec24e8bab311c5934738d91df7d338311302859973e9c42ed53b40956aca542f
SHA512af7b4946fadcb30b460e98cbaed0ea11f9b3e276718b36d53ade5a4079cea917aeede46d87e6e0317952f0dde93c545ac20fce5ae5804dae6b4412799b9ae2ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535110467d6c578d8b36bc0ac6abdfa57
SHA1e7b668e5d009a72f42ae4ec26252dc34a18d431b
SHA2564568ce3a2bd88e5d58ee71b11e40263612e9243ed9636d0f2695d5feb93a4904
SHA512e8d1dea8ace35625a56959e4ba4864b386add1fc8592c7d9fe5f13022986f7bdb16ae1bfa0d51ef3cdcbc1dd1c412fd897841015686515e575095bc0ed2fa83b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52035c15fb6c479e4a1613084efeb1785
SHA1f07b682452eb9e410d4b38843b518edf604f289d
SHA256935f40cd1d14d446fa34defe5394c6f06fa2109aacd132b424989a8dd1840264
SHA5128e6241757ebb14c12e7df2ce78e25cbbf275b9f6af17fcd88b5c50ceb5796dbce067ff426b2d0b1a78d433eb95cfe19150cfb28231932242241e6f94e440aa55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580232d6bed30c1b33cfad30d09f90a29
SHA1230418d4d871a98e82a6db83b028c289319c7887
SHA256ec93e71add4aebd43fecec5db60e200c8eb305de0402aa7bc35fa25511a0c582
SHA51234263b47e34552c7760e95f9920ac233f5bb04951d30936cc483e99f2cf9d49f44de4022d9faa2f798194bb4df2916d328ecf8595352d70feb47f140a8ebd69f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567e18d8769e864b9ecfece01685a8cbf
SHA175e17ea694b839914bd6dbac26101502c3cc7b15
SHA2568300375853265147677bb25ed7e0f46ca9cf0df94bb9b5b1bc8f8d3af904d16a
SHA51237655a892806bb49f8ce98214875b53ac0fdcdf6f775a252bb9259e8707e39486cc7c825230701be0b48e28cb1dd19181aad4773472f8fd9018e353ab7e4e151
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf