Overview
overview
10Static
static
7c4ac30e739...2b.apk
android-9-x86
10c4ac30e739...2b.apk
android-10-x64
10c4ac30e739...2b.apk
android-11-x64
10CheatSheet...s.html
windows7-x64
1CheatSheet...s.html
windows10-2004-x64
1CheatSheet...n.html
windows7-x64
1CheatSheet...n.html
windows10-2004-x64
1CheatSheet...s.html
windows7-x64
1CheatSheet...s.html
windows10-2004-x64
1chartjs-pl...min.js
windows7-x64
1chartjs-pl...min.js
windows10-2004-x64
1hammerjs.js
windows7-x64
1hammerjs.js
windows10-2004-x64
1jquery-3.4.1.min.js
windows7-x64
1jquery-3.4.1.min.js
windows10-2004-x64
1template.js
windows7-x64
1template.js
windows10-2004-x64
1Analysis
-
max time kernel
134s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
28-11-2023 22:01
Static task
static1
Behavioral task
behavioral1
Sample
c4ac30e739c0fbd4433ac9cfca548ed542f965607b1dc8327ca22a91efb4e12b.apk
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral2
Sample
c4ac30e739c0fbd4433ac9cfca548ed542f965607b1dc8327ca22a91efb4e12b.apk
Resource
android-x64-20231023.1-en
Behavioral task
behavioral3
Sample
c4ac30e739c0fbd4433ac9cfca548ed542f965607b1dc8327ca22a91efb4e12b.apk
Resource
android-x64-arm64-20231023-en
Behavioral task
behavioral4
Sample
CheatSheet-Algebra_zs.html
Resource
win7-20231025-en
Behavioral task
behavioral5
Sample
CheatSheet-Algebra_zs.html
Resource
win10v2004-20231127-en
Behavioral task
behavioral6
Sample
CheatSheet-Derivatives_en.html
Resource
win7-20231023-en
Behavioral task
behavioral7
Sample
CheatSheet-Derivatives_en.html
Resource
win10v2004-20231127-en
Behavioral task
behavioral8
Sample
CheatSheet-Derivatives_zs.html
Resource
win7-20231020-en
Behavioral task
behavioral9
Sample
CheatSheet-Derivatives_zs.html
Resource
win10v2004-20231127-en
Behavioral task
behavioral10
Sample
chartjs-plugin-zoom.min.js
Resource
win7-20231023-en
Behavioral task
behavioral11
Sample
chartjs-plugin-zoom.min.js
Resource
win10v2004-20231127-en
Behavioral task
behavioral12
Sample
hammerjs.js
Resource
win7-20231020-en
Behavioral task
behavioral13
Sample
hammerjs.js
Resource
win10v2004-20231127-en
Behavioral task
behavioral14
Sample
jquery-3.4.1.min.js
Resource
win7-20231023-en
Behavioral task
behavioral15
Sample
jquery-3.4.1.min.js
Resource
win10v2004-20231127-en
Behavioral task
behavioral16
Sample
template.js
Resource
win7-20231023-en
Behavioral task
behavioral17
Sample
template.js
Resource
win10v2004-20231127-en
General
-
Target
CheatSheet-Derivatives_zs.html
-
Size
51KB
-
MD5
474fb21ed6466ad2aed3f7a5d3cc490d
-
SHA1
24cdbaec78c1c2a3b409af9253f0e896d28a9f71
-
SHA256
2c7af38860a1c0b8430499d5ebf66a2582e3b71c50687c304faf4f1f4b4463a6
-
SHA512
cfc6721a73e96059ae7f95e32635e03fb0ab64421a62c527ddeec153e283c03013f413a065b6bc32d9f716e75bb21deeb291a1b15697d996d9d059b354a20bff
-
SSDEEP
768:omnahvTUXSAYQ/zrwdR6Aml9LOOJFP+VH0G8SY0ANC:z27U8JuFP+VnlYTNC
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10b159784622da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "407370739" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009159649b912a9140bf53d83809c5b2ac000000000200000000001066000000010000200000008ed9f7723e679047fc4ab9d58e441deab6012c518f3e6ddee5d2019737ffd86f000000000e80000000020000200000003d29d6e155b4dd6788358aac4f13f44b01e57fda3df5011539fccde95e19564e200000006090531b47123f86a2c55e5eb26dfe87f4e703eb3ff72ec57158d476458fd8b14000000089db3d9ec0083986b957058b40f728b53df9c802cceee03b4970aef34351499f943eaebc2758c00273f4b14ab4118cc4e29f229078a618521d20fe83c0d80d41 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A343CE11-8E39-11EE-B059-EADD55BE30CE} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2408 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2408 iexplore.exe 2408 iexplore.exe 840 IEXPLORE.EXE 840 IEXPLORE.EXE 840 IEXPLORE.EXE 840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 840 2408 iexplore.exe 28 PID 2408 wrote to memory of 840 2408 iexplore.exe 28 PID 2408 wrote to memory of 840 2408 iexplore.exe 28 PID 2408 wrote to memory of 840 2408 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\CheatSheet-Derivatives_zs.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f79f1f4ec563b57df3fecf4c58c73c7
SHA119982a1410b5a8b3a2e94e496d087fbbf0ede00f
SHA2560838e233e07b5deea930715aae2963dbdfb663798581276cffd6cda5f6932ba3
SHA512dad5dc66c3241f0ed1a2d10b9d787fe93e2149720644d105c966e2d59609c7d3b875cc13329917dc64b630132f72d72f62330745cab737f611ef06257ac4f700
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527ab10888a56920705941729863236c0
SHA1c556ded4a6c42c2fc208874817f63b57a888aa53
SHA256581f6c421084368ad876a7792b8974e591c3f7174f1d2ac9a46d0a0f2aef5e5d
SHA5129de9ef1a7c9396cb5ba6453c2d3b9ae5f4ee8074678ef8df83b5c42b840e738f4eb303a86f0252cd6a4825cb0533fd949ab4ef438cce1b45a310713316834323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fdb76f3d35319976ee60850722f70d5
SHA199dce1ef4b657bf2c1af6ac1121065d98a6e4c94
SHA256ccac85629c3bd864799d2f034f37030ab93e8057e0e8b6c052e791fd88926633
SHA512be6f9b46ea6fe539bb4360e4fc09fc8ce7f37a7af091985a0f177d7a891d66443711417642b24a23725066dc8a5c553e8759302de76e08dd8ac8cb160fc84c72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549786875f227794b4c46272dcb935558
SHA1d13e010cb560efc85af8e6f3498f8d7e77ffcc2b
SHA25643721798a876564af86a03b8b3370a582dad9174fd40fd07c3304eb93eac1ab9
SHA51255c742b647d052a267780c04f2179f97495579562a473cf67248c33f2fffcf15887a2a0a54a31553ebb7df7a8f835db5930401c345ff8e52ea1b821f2717fadc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ff076ba4f376c1d76ac645aa6e1d60e
SHA1e00302833cf17bed609f393cfe4b7fe3d1b28886
SHA256979693a9035e1c6d6f025091bb876571f6fb99e253517ae8c9a0bf33415b29a1
SHA512904feb92c34b4a0057f31ecf852fb208061b37c2f3daaccd49ca74ba1241f52c63b5e52fc9f6711283a6430c71e98f4f9eb39758f0e14cb8975ce5cadc06165d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0644541b19fa00259045c1e104bd6c8
SHA1bdf7531cac6cf1a9cff0c7590aa1e35d063c6497
SHA2564a91282bfa45ff0058f32f275b28faccd899d0cd9e296c1c9cca1f6853ed3f10
SHA5127473ac10f95c1cabc22b5e9089c221364472aa45ced1ba9870afadd27e42d71be98384eb96033c08b7c5e8ff7e7d9fe208e914c2e9c753418dc2deb86cac4ac9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa8623079cbfec70ce7e91a654f8eb5c
SHA1a65a19b071a08513042bd2508aa7577a8b6c067b
SHA256989a9f41e4886eef105c54b96f576de3e4c27521c2d4650e282a37aa4fb1c210
SHA51245e109a9acf6ae8f4da7c4c7a2e906f1dc6aa5715e0e966751797436b6214847f5440b138f0c0c2506d9267d703505b204bcf41c1e213b1c5c9c36ffcda0ef90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce9d91c1a477e5894aaaf3cd5280b1d9
SHA1f2296b76504c7e53b2df71cbc611c05a9438712a
SHA2567f8b7e72432d0fd23ed94d7543c807b09c3bd444a3a3e1f8c72855a61999df25
SHA512bf802becc64a183004e0d18d20c94f2c9c96cd574980e8708713416b6f31dbe4e1774eedb9289972709a425cf3784db20d7a9f360bd71466933286fffdaaf899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519b8945f2e36fff5a37601729f3dcbae
SHA1c4ca3e1cadba67f7105b448efcebc5c52321552f
SHA2563efc6192a0c2c74772ba38744d654115656885af78f044d89c2d88a020ee738c
SHA5125e879b0a96ae1a2ef05b8811f4170178d9110ab4bd13a4e8ec30e8b522d0b63778f397dfc047962c5654bacceddcf79988eb09a8400400d723eb63aab04a0535
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf