Overview
overview
10Static
static
7c4ac30e739...2b.apk
android-9-x86
10c4ac30e739...2b.apk
android-10-x64
10c4ac30e739...2b.apk
android-11-x64
10CheatSheet...s.html
windows7-x64
1CheatSheet...s.html
windows10-2004-x64
1CheatSheet...n.html
windows7-x64
1CheatSheet...n.html
windows10-2004-x64
1CheatSheet...s.html
windows7-x64
1CheatSheet...s.html
windows10-2004-x64
1chartjs-pl...min.js
windows7-x64
1chartjs-pl...min.js
windows10-2004-x64
1hammerjs.js
windows7-x64
1hammerjs.js
windows10-2004-x64
1jquery-3.4.1.min.js
windows7-x64
1jquery-3.4.1.min.js
windows10-2004-x64
1template.js
windows7-x64
1template.js
windows10-2004-x64
1Analysis
-
max time kernel
134s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
28-11-2023 22:01
Static task
static1
Behavioral task
behavioral1
Sample
c4ac30e739c0fbd4433ac9cfca548ed542f965607b1dc8327ca22a91efb4e12b.apk
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral2
Sample
c4ac30e739c0fbd4433ac9cfca548ed542f965607b1dc8327ca22a91efb4e12b.apk
Resource
android-x64-20231023.1-en
Behavioral task
behavioral3
Sample
c4ac30e739c0fbd4433ac9cfca548ed542f965607b1dc8327ca22a91efb4e12b.apk
Resource
android-x64-arm64-20231023-en
Behavioral task
behavioral4
Sample
CheatSheet-Algebra_zs.html
Resource
win7-20231025-en
Behavioral task
behavioral5
Sample
CheatSheet-Algebra_zs.html
Resource
win10v2004-20231127-en
Behavioral task
behavioral6
Sample
CheatSheet-Derivatives_en.html
Resource
win7-20231023-en
Behavioral task
behavioral7
Sample
CheatSheet-Derivatives_en.html
Resource
win10v2004-20231127-en
Behavioral task
behavioral8
Sample
CheatSheet-Derivatives_zs.html
Resource
win7-20231020-en
Behavioral task
behavioral9
Sample
CheatSheet-Derivatives_zs.html
Resource
win10v2004-20231127-en
Behavioral task
behavioral10
Sample
chartjs-plugin-zoom.min.js
Resource
win7-20231023-en
Behavioral task
behavioral11
Sample
chartjs-plugin-zoom.min.js
Resource
win10v2004-20231127-en
Behavioral task
behavioral12
Sample
hammerjs.js
Resource
win7-20231020-en
Behavioral task
behavioral13
Sample
hammerjs.js
Resource
win10v2004-20231127-en
Behavioral task
behavioral14
Sample
jquery-3.4.1.min.js
Resource
win7-20231023-en
Behavioral task
behavioral15
Sample
jquery-3.4.1.min.js
Resource
win10v2004-20231127-en
Behavioral task
behavioral16
Sample
template.js
Resource
win7-20231023-en
Behavioral task
behavioral17
Sample
template.js
Resource
win10v2004-20231127-en
General
-
Target
CheatSheet-Algebra_zs.html
-
Size
55KB
-
MD5
2c5cccb517b741613ad2c1f7a1cdfd85
-
SHA1
d395a1fcf335361ceffffc6804af5bc8ec6a7cce
-
SHA256
f7e09bba5c901b4c216d77fa99ff7b79e970a0578ae32be9ee67c3daf880d59c
-
SHA512
83dad758cf7fbadd1aa2450353c57aafd9ec3e94144c3a9848156a5b9ae37c95b5d48e86fa17b666588f1871af6a203e8ba3abbabf77e10f16836d65e65d8ee8
-
SSDEEP
768:omnahvTUXSAYQ/zrwdR6Aml9LOOJFP+VH0G8SY0ANEn3:z27U8JuFP+VnlYTNO
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A6BB68A1-8E39-11EE-865C-E6432E1EF08D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002e1e81ecbc95de49994f369c3e7171840000000002000000000010660000000100002000000079a23b6a89eb36413e589dcc9734b738075c97321b28159d40e2c3e5d157cd21000000000e800000000200002000000088d31269c6d13d152fce0e335bf8632b72185549d4058c601148fe33accd1c862000000030abdc314ac43accbf88514f9cadbe13452f5a416a4a7df8e9e88034437acf8a400000005e36e31d3b21db34dd5fa5f2026daea5558ba755260d8ac0d7a9c4182f627651c24e9e4b05fae7a3e2f943aa9920098b43ce6e9b3a952a683c6ccf162b5b5f6d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "407370745" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0056207c4622da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002e1e81ecbc95de49994f369c3e71718400000000020000000000106600000001000020000000d4a69a1b7831f9c55a4f956e872b481033513b5d797eb8ba4d876d17b2d58d26000000000e8000000002000020000000592ec3bf942ff586fba13c3af06c4133a34730d6499f41c496acbe4c96eb065c90000000950e6a2446479b3672defb8ec6bfb187e63c0d512ce52b175ce60f615f87522afdc3aa7f375509159ab3277d5b5fa9e02909b67f481e79027e71abc7d4b515db81cb9eb59a0f0797661654c95143740b65e10c2f577d4d0bc05309626431c7c606c994cd74e57300b415569a5fd7037116a9826227b0e70fa6e7f4ce5488e8349782220bffae2c9318fe30c68b23ea1140000000cc26242730b9b1ed4befa1ac43db4777567617cc45674829f7cb88501c0c2dda00f4d26bb5dea112c398e536cd0ef6b8da627a99378e0ea8f71d4695227ccd6f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2656 1728 iexplore.exe 28 PID 1728 wrote to memory of 2656 1728 iexplore.exe 28 PID 1728 wrote to memory of 2656 1728 iexplore.exe 28 PID 1728 wrote to memory of 2656 1728 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\CheatSheet-Algebra_zs.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5282eba019e600ac47f151a3f267c7271
SHA15c9aa2c42ceeb0f91173c2d33b4c8d30c2571f92
SHA2566c2b78519a526098fa0add718b25bba0d18daa18219b9678e5c2c1b770170d7a
SHA512738de73e860b55b4b2b270ba4e8a99dfeca36f612be8c475da22fa188d1c40b46ac6b36e4b0fafff216ed10e824f792b8de39e707d8844c8b41b8b8bc319d24a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524732a726968bd9291a09046933d44b0
SHA1fbf65ea3440110747415a6dc5e0bbc78f31ac20f
SHA256872689319fc57bbbd6c90ebfe30e63088a972093ab9bccb8f9eb935c8c87efd3
SHA5120eeb6947ef6a36b2f326133c8a4a9e826be3f6753cf95e828efa5ebd85a103291893ba6cde7138e5840abe5ab00837ab7c96ff11a8623f8db5ffb0d3c3807240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59056d55635af9187063487a60b3b17bc
SHA10fd209bd9a9a6bc5525712555a2f9a551f868f0d
SHA256ea037ba9bbf804218c263d128992d202555abd7db70c08b84b894fc55a7f0f27
SHA512c33b7e0cfa2c5cb8bc1c30627f592482ab1bbc90f16c5ed2385d704c3026ab69a163b7bacdf244cf390424f2292cc34f6f1b89b2a95e3272513c819b9421cdd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50062ebe1b1e01aa046d46388de57f3b9
SHA1a5080779d1e5a16bcc9d0101c37ded7d940c20fa
SHA25696bcb9fe1cb09fb0bcac2ac80a585c077ad970c1052efe847f9d7788f48f7383
SHA5129e1021d562d8831eafd35fb433bf09721e580629629c7b1473b1a186e8cdb511e6f615414dc9257a65775e1f5d70e8aa9613f63363da805d543cbfce2f696d41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514b3ab8f706e746bd3770372a7401612
SHA1f8a5174e4e18a0272323fb14a4e6f92e8d222102
SHA25609d23d2e43ae013301bd809ea7056883e90a43676b1f97ca67ad4b75aa9e3ec7
SHA512f739fe97d1c47ac8c93d57ed45f98af010475e9ee60cd7234ad63eea5216500dfeeb802df12b46a9543076e8e898c5a8ae9cd127dfaf08fb73d3a8151e499ff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a6918229db00974ac8a3e36e1ba437f
SHA1624cb384f52795386f8c9aed7f971101c2d0c171
SHA25636695199bd0b0e52cf64c8502a8519c283c3f4e0c5059f3967f034c04c0392c3
SHA5129e5b02ef9c8345ecced1f29cafd37c4196a7f3a283c97ad973329ecba468fc07821b453964f9364ec2f3d412cd17b4b43c4f6b1afef6c4f7846a342f0095ecbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515562a63c6e0d8ea3ac011ad8718b7d2
SHA17c24d6d6a2634a98471f6406ac11390faa05fec2
SHA256e5f115f747baaef9a4a82edd5c451d3467f4d5581d79ff67bb4a1d3f85837026
SHA512b4aa39c84015b86198b49c9e59ee96c5be185faaac9fffd58a5dbd324aabc4a61ff38efecec42ccd66feec9ad929fb04a26c3486bb7450a54e4da84a67e8205c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5229eaa38c8a166e3d0fa407423574388
SHA16b29daf3a69b958d5e23964db825a14db9cd5212
SHA2562d48b0c50c55f9ce956b78d91493eaa2f2d6157ffaeb142d082d8c5601f557f4
SHA512c9486cae91260944dc69bb9531f3a1d210de446c312ed6506106a2892eee73564f8039a1e787a911b7c13eb83aea525e31a22533b80fb85dbad67d11712c25f1
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf