Analysis
-
max time kernel
100s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
27-02-2023 18:04
Static task
static1
Behavioral task
behavioral1
Sample
word.html
Resource
win7-20230220-en
General
-
Target
word.html
-
Size
710B
-
MD5
2fe163e42526330097fc39697fe1d2e2
-
SHA1
648582952f7383f26f0200c08c67997fcf0a0caf
-
SHA256
a71e874d64e95028dd5667f3493b23c43fc57402dcef42dbcbdf15360928f86e
-
SHA512
84138bbdf2e7dad0c0a322077f31bdda2ddfa8361cf7d27d6992f3067f9a56ac38a1b7aaec477bce47828f2e559b27007ac212f27c809245c7e2d88dec83d71a
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8CA81841-B6D1-11ED-A85F-D28FF4BEF639} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000074b2d77a8e7a944ea7c282b9066208cc00000000020000000000106600000001000020000000644ecdcb899aec47ccc1601b001c2c7a5b3face484aafd802332fc02be26f130000000000e800000000200002000000051308f042d8c8512de67f87237ca2df1b23506a414d9500532b13f9adcc63ac620000000dcf599217bb2295f1ec0ecd02630f35d106938687334f1c6af04efa4b7bc2be04000000043cc74c13ed0c4ef8f3bdfe1f6ef7a73166ec6b40a12e8864666403d9d3c4ee328793def96236329db2c9b9a607b39b48201babeaf2ae1a5782dff81062f37d5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70463c63de4ad901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "384289639" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 924 iexplore.exe 924 iexplore.exe 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 924 wrote to memory of 1672 924 iexplore.exe IEXPLORE.EXE PID 924 wrote to memory of 1672 924 iexplore.exe IEXPLORE.EXE PID 924 wrote to memory of 1672 924 iexplore.exe IEXPLORE.EXE PID 924 wrote to memory of 1672 924 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\word.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1672
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5def07f6f480aea20e532e39f553ea133
SHA1df42800b3e94e54242b6a6eac29e9026e8cbfc41
SHA256dfd088e57432391e938bf41da78376db7221fc62090e80e80e713f447ca09773
SHA512bb00d0bf0bbd12ba9b769fabe62c9ae2e975cf880dfc83b40271934a50a019b50b3503a8e1dbf277df9b623e27941d2217b2ecab2f6c92479e1a26a438f50acb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520c5318c030ddddc68ca2f929606a4e0
SHA110233e080e12fc205d0292407b7ab4bf5c5ff4c1
SHA25632c0c8788487a3d356d22faacc88d3a899a2a58f7ccd34a31f83e5716a74bdd0
SHA5125c2adf931575003a5aba117fa14033d6212648d04479711654cb5ddf4a0a7b9cffb57dc2ad5eb033e2dfb6c593f9c7691d1a608b9e02012eb5b10d9d5b3bd3fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558fed046d76bedde1adafb5a228d00d2
SHA177b459ea59f85a36af89d0b180d3d7c698ffcd36
SHA256111b605e225be62081d08dc2457733b1f115cda3fced27ca0c48a3ea56c73b7e
SHA512de94613295dbf43e30937b0f9aca8db266430f9e3b9fcf5ff3ebbb06aeaa8ab84b7b2bc49ee2e77d5a5bc21eb8b302d3181f8dcd8ec90405973a0965239623c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a162fd2a636dcbeb26389edd58e0d37
SHA1358e8396362f6e072005769270b494ed9e2d3933
SHA25666e0a747259e9a6e1cd70f043df232145b7b40fe8c7f5b6a8152c97d6cfd9cab
SHA512c8b311798a7e3948d4751897556ea5166a5945d974d76467a62d8453b30d736256171254143032dbf9b23112858f21ed4c8c147b3b3a3352ce231ad3d07f6cef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ade6d5df72973da3dbd9b9ecdcf839d
SHA1cf95f8f292b8f65fbee81211be9bdf9119d05fb5
SHA25669c66791df96aee1c5a6c7ced7c298d6f9af7f3756e3af0b8630ac252792cac2
SHA51235ede2967b206d049abda3dad45387a34363ab521ce13f5c57cd46cfe0615e877384686e675d2a368b24872c8d5b7a355f3060acd7ed2beeaf75392735ca0ca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e93933a6a8f35ba30389da553a2280db
SHA19682e7b0ac00a39c151a2818a76a4b6809bf23f0
SHA256aa94bdbcc20a0860a3063b1d431cd592704bb18246203452d854978815a6b9e9
SHA51253acee93694d2a64385f68eba1c6c10c221596850d9eeec3e85bdcf50ad07d8d7f483bf513d5cbf252b54cd7d3b6306ff36e74e99a871cdb555fcc18c3b0de01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7d902f1d8e01f77fd4fc1a4ea596a89
SHA14045d3bc1fbd9c83c448509a5feb9bd467fcd441
SHA256feb17edc01d6a6406b21ccfa81496e54fb02a27c1f9d0b5485e26dfe917c4f1a
SHA5125a718859571f482aa6d5646e6dc29c4866c70e3a2e9ed10a14b59a56f6b5f8824171f37d9fc8099ded0922dce3d5fb1e08279e37f2b988a1ea16e4832ec3ffd9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QCNSQOTT\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD573b4b714b42fc9a6aaefd0ae59adb009
SHA1efdaffd5b0ad21913d22001d91bf6c19ecb4ac41
SHA256c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd
SHA51273af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd
-
Filesize
604B
MD5986d9a87ba96d9c666a5c31d02e163c0
SHA10652b077301fa87c88bd9178f456a2760838d229
SHA256c69a902aacb1827a0ae8395d94d08c588be276f24fc50bec38e0e5546e7aeabf
SHA512d09081b002160c4f848dd435be19af7db2690e98dc9e95df953470a2b5b6056ebc6a633a97f08972480a7fc44f5702cef9058719adcbcff8292c1c35dfd50409