Overview
overview
10Static
static
7f6b896016c...60.apk
android-9-x86
10f6b896016c...60.apk
android-10-x64
10f6b896016c...60.apk
android-11-x64
10closebutton.html
windows7-x64
1closebutton.html
windows10-2004-x64
1core_wrapper.js
windows7-x64
1core_wrapper.js
windows10-2004-x64
1lynx_core.js
windows7-x64
1lynx_core.js
windows10-2004-x64
1nd
ubuntu-18.04-amd64
slardar_bridge.js
windows7-x64
1slardar_bridge.js
windows10-2004-x64
1slardar_sdk.js
windows7-x64
1slardar_sdk.js
windows10-2004-x64
1template.js
windows7-x64
1template.js
windows10-2004-x64
1Analysis
-
max time kernel
135s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
23/11/2023, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
f6b896016c8dc74c67065d1f2246a32f175bbedf416fd132afc747b4709d8e60.apk
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral2
Sample
f6b896016c8dc74c67065d1f2246a32f175bbedf416fd132afc747b4709d8e60.apk
Resource
android-x64-20231023.1-en
Behavioral task
behavioral3
Sample
f6b896016c8dc74c67065d1f2246a32f175bbedf416fd132afc747b4709d8e60.apk
Resource
android-x64-arm64-20231023-en
Behavioral task
behavioral4
Sample
closebutton.html
Resource
win7-20231020-en
Behavioral task
behavioral5
Sample
closebutton.html
Resource
win10v2004-20231025-en
Behavioral task
behavioral6
Sample
core_wrapper.js
Resource
win7-20231023-en
Behavioral task
behavioral7
Sample
core_wrapper.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral8
Sample
lynx_core.js
Resource
win7-20231020-en
Behavioral task
behavioral9
Sample
lynx_core.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral10
Sample
nd
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral11
Sample
slardar_bridge.js
Resource
win7-20231020-en
Behavioral task
behavioral12
Sample
slardar_bridge.js
Resource
win10v2004-20231025-en
Behavioral task
behavioral13
Sample
slardar_sdk.js
Resource
win7-20231023-en
Behavioral task
behavioral14
Sample
slardar_sdk.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral15
Sample
template.js
Resource
win7-20231023-en
Behavioral task
behavioral16
Sample
template.js
Resource
win10v2004-20231020-en
General
-
Target
closebutton.html
-
Size
981B
-
MD5
c8efa039f4f84b2705a8e3a3b31da61c
-
SHA1
669749429feda1599c4ee980cfd67fbb1a54c1a4
-
SHA256
494693c2ac56ecac1a2588c25631e1bf71211fb0f06108649a983c879315b1aa
-
SHA512
db6c9817469c937a41eedbbbdaeb21a0860fa5228258978fe59d29c75ab1497b8d1a0ceaae2b236206d6935e186deaf0d83a73791658fa68a985dfc5c314aed2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005718aef034e0654ab00265bd8f8b2f540000000002000000000010660000000100002000000094bcc4e995fb88c94aaf1d1d5c816ece5a5ffaf1af745709a5924f5a7f7297b0000000000e8000000002000020000000c6e31472da388ed8ed3766da78e2047a37c9dfae64ad55771d8a0f717d429815200000009261809998b9da76f2a5060822cb9c742fefc12ab0720acdcee1c978e6ae59d940000000370824f9e3ecdcbf3a7e28b7520e19e0db167a245c43e871a43dba3b1bbabf32f3e419e9e5c0382d6889b0bcf559f75518500e0cbc82a48df6e94d5f62cf3ee9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9628E491-8A4C-11EE-BDF7-CA9958541264} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6022c96a591eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "406939072" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2024 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2024 iexplore.exe 2024 iexplore.exe 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2796 2024 iexplore.exe 28 PID 2024 wrote to memory of 2796 2024 iexplore.exe 28 PID 2024 wrote to memory of 2796 2024 iexplore.exe 28 PID 2024 wrote to memory of 2796 2024 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\closebutton.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534fed7911b8b313eae8d21bed112b13d
SHA18bd90f7afe93538b95d1767c4ba6b0202951cf43
SHA2561b5601b01080a09589183a50579d63aaaff7efdee00896f1a3b7787f210a4744
SHA5121afd43b98054d91fa220291217dbaf2df0b7f248aa3cb4ec7dbbe4c94861e2b116c8c3fc8d9ad7cfd41f3589ba9569ec5c779ee181942b6a864b091897feccf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4ab1bb41d06cb6bd8d35b736d31952a
SHA11242034d53577649d00a73df3066b15899cab95d
SHA25658ec8c7394e6c483525bcf2c1cb55321a49e13afa1e144b0cd81c1857d99e497
SHA512529bee412b4df075b1a8b329ea82514756195b97adace432fe771f779717de39e775d12dd728fe91774ecd57c3fea3c4a7fb427ac2dbf3451e386a12f2514646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a89eb137ecc028d391d098e892cabd5
SHA13b7d27f8302957eb6ef41a541b40db4f3be7eaf8
SHA25687103fa5d7a90ce3e7b5890fc966974149ce6a273244a7068c4a96f66d474e3b
SHA5123c5a90f7bda389545341582266b794484365a3a42e37263e7600cb9ddc4296c8253925d63511340f3fa25f4d2084d934e10234a8efb18b63a8e6ed61244682c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528c99732b991573a3f839d97c147fdab
SHA13e7d8e872c5b4db4051023e81a16ce7acc507ff9
SHA256fe822a9f67ef3444c0339aeac71ab96ce1a8ace006bcd1c49a82e87a3b0a91ce
SHA512fd9cc7963614457ea532662ff88544b1e59467182383e85d26bdc617ee3f523e93a33ce8841fa8d053f13b7399f22c9f3c5f55fdf73fbabebb520d199fc5136d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1bc7732bec727fe83c4efe7d6e75528
SHA1c950d1656633713024ac1a724ebf4a517e7c4cb0
SHA25644483511d181c9dda9fa8191a37538633948fb2c064559749857a1fe75d5ad28
SHA512e628efc0b570679e78f8b28b62fceb3b0e2b8d5ca7e18d18df790db8806ea500a84f8bc7a2f62af3ac1033dd9090b564f8369dfc92a4f7a297ebd2709a7f5630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5457dd11a80eac38045309f45ca5b6c
SHA1e41fe347fe4d9b0124c8bdc6d92bffc5aded3f6e
SHA256009102608e20abfe1cd9c56698c29ec47f1eb1a59bea82f295470e3bd1610715
SHA51213571206313162c0f965a9ebbabcd97e3766c22fb3bcfc1297e3b2ad709c986a666d24a33b949e23895b374f9743d312116dfa6bd63c204427d010569473076a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d843b44ad298ecf4e805d0050557216
SHA19a98f6ec2c0b75bcf2181a23c58f0cc1be33cd66
SHA25648b1ced799d2d6bae9bc573d8e20100b3be044e6739359bd56de05bbb7c551b8
SHA5122d8cf13ea87fdb0cdd8dd933fd72ec117ce48ee424851d4ac72f95f2146426863ae4135256c4c107a460368971855883e0d761adfe6b08b19bb02e21c33b2bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3eeea67ffb58787a8a17b24cfa65a3c
SHA18fb8d9fc841552ac7d78b9e54abac03cabe1537c
SHA256b285839081bf6c2c064b512346ad63ff9c4cde4f92489cd8693372fbd1b910cc
SHA512f484bece09888621fdc2539d15606d22e9c2810dff05f2bfb97ec11679aeef400c5c4065a743be062616254786be28d83563938727ba8870525f5f1173adebe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5531f981e83d763addf2f841cf4ee0c9f
SHA1ac8a576712397512ba801281ba9b44668e2421ee
SHA256fb3b391e2e96002dcd341a4696406baba731511d0ee97d26ce5ba5ace37a85aa
SHA512d58479a829f866edce4c96b1caa5a99a1174ab391e2d88dd501aaf4399543e4ddeaf0be5fc8ea674c6cb647848806af54c1c78b304a6d1d53658ee9946724f4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf5efdebf3d40c95093a2d599586ad51
SHA14082299ddbe48cdf7386ecfebcfbbbbfe4cd34b8
SHA2568bf16d7de41b0e30bf4240e9c012112083f3bf975bbf667aa36b9a3afe370ffb
SHA512115530354d337580a5beaa419f8894bf5400b349f70ba5545803a9da9d624da85e0e3fda04cb5887f541a7aa7b02a5e384224a6b518cb10099f32128da9be6b7
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf