Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
18-10-2021 16:28
Static task
static1
Behavioral task
behavioral1
Sample
PO#098273.html
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
PO#098273.html
Resource
win10-en-20211014
General
-
Target
PO#098273.html
-
Size
3KB
-
MD5
1f8ba9d2c06ce44c29fb3f67958d5bc5
-
SHA1
d6063dad4bd7d9d270687efc564ea5b83d88155d
-
SHA256
dd1aa00fd577744f0997758e64d2dbfa340da856a0ea5ded9935bd8a7953cb5a
-
SHA512
1c4e59a6fb160cb7ee1bc277ccc53abc8ac4bc419828b3b27cf9677f5f7e19ff22d6ce59af09c3910b69312fc2e47c003ed9e6f02a868fbb3b0bcd61944e4d31
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "341193296" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "341241882" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0a7e8e5e8c2d701 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "341209891" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30917352" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30917352" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3813276655" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f9406ff0332db44b36b7a7c571692eb00000000020000000000106600000001000020000000904e7f52afbfe862a655a4b0aa9838354c2eb80061e2f5bb665738c78c9ea4d7000000000e8000000002000020000000790b551a7001d809451dd9cfeadd60eaa020d4c3da899760457fce96d3a5a37320000000189765a6bd73df1cbf7bc149d0a80ac097d7c2fb499ebc95543787566ba9d64b4000000074b557626a82c0bbbb7c68eee0590e85e4cae98adebc495dbd2e23ef9eb582ee9a4ad729ff8ea386805c85c4d3415fd97875568d9f7e1ab4db0856bcf2b47a22 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f9406ff0332db44b36b7a7c571692eb00000000020000000000106600000001000020000000c095bcc8fef4c6361ba0d589d997c928f1daa3856b909fa5de4a1195ade48fbb000000000e80000000020000200000001816432c0f1c540b2afe3fc20ae24f1e26ea7328d4ce4f2bae7cba7ef4a77d80200000008a18f1e0f03d647375d829d54cac9aae411727886ae6c58fefa90e0bde0e5859400000008521698d1a644b35306bdd69ef029e9fc689ce9167f3386d6ac9e0ca30091504ba1192a74cf3860d6893ef202fb085f002ca6d04afaf8d83ee556ad947ec3908 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0BEC2E3E-2EDC-11EC-B8A2-62C53410F9EB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10dfd7e5e8c2d701 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3783432910" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30917352" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3783432910" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
IEXPLORE.EXEpid process 3972 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2164 iexplore.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2164 iexplore.exe 2164 iexplore.exe 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE 3972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 2164 wrote to memory of 3972 2164 iexplore.exe IEXPLORE.EXE PID 2164 wrote to memory of 3972 2164 iexplore.exe IEXPLORE.EXE PID 2164 wrote to memory of 3972 2164 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\PO#098273.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
882b7d298048bd3250b652b6c3ef67d9
SHA1187b1ddaf8f76d88e2eeb87756c6afe6f6ee3c6a
SHA256f22ce494c102cd6864cfcad74d2da2276fb5704589c433d65911a1044e4fe440
SHA5123f7c79ebf7ead6031eebd48338ed3ae98f4b47d2e78f6b9094fbcd18fc3483fe7ac18dde0c588fbb28bf092b6c26505b00ab2f5b34fe60c5a014a9a2b7b51e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
3432db2e69f4200682910fcd886273a0
SHA13347692ff07ed0c702a1e37d258b11511cde71ac
SHA2562df66ac2ed10885df32d519309d7097433ee682eccf8bf9058d6ea9cdedf01f2
SHA512f7435193ae50d6b4ebabe1a018aa914462107d7fee10424b1b2d981e59e346e50ab97af36e710e0b41e6dda25d40aafa85f1622855aa405b10aee4143e8fb8eb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\6HQVALL1.cookieMD5
f0abd2e75c5fae1505388e1586216042
SHA155577d3bc5cb6058a4ac7ba532b560e77f8bddcd
SHA25690c0b75b011af3682f1fbd0c4004c9066b19b481c5c28ad5aee5d47826fc48c7
SHA51233c0ce551c2bfb57c0b6882016b0d641936b552b08f32857b39b6e9dac0db173b27a1f328f3f8a35b771a40f151a10f02f122f3345f2a40c57958f02b769e81c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\BMQTK1Y5.cookieMD5
0bf4b6de82ce40ad3b196acdbbc857c8
SHA164e7a97f9fb48262e617aea89c2d0ecdc724449e
SHA25673428ce9ad4a3519256570016483868003748dae9f1817de8292d0393263a728
SHA51288568f3313e8b515b368aa3e0bc3b7ddd7fdadb47e1d96905af59ed69e3491744e7a75a2c0c3acfce626c47a6da9e07b697d2e153871a7a09cbf668b58e1a21b
-
memory/2164-143-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-123-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-122-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-148-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-124-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-125-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-127-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-128-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-129-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-131-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-132-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-133-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-135-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-136-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-137-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-151-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-140-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-116-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-115-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-145-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-117-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-121-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-138-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-150-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-152-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-156-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-157-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-158-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-164-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-165-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-166-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-167-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-168-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-169-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-173-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-174-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-177-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-178-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-179-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-120-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-119-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/2164-146-0x00007FFF06FF0000-0x00007FFF0705B000-memory.dmpFilesize
428KB
-
memory/3972-141-0x0000000000000000-mapping.dmp