Analysis
-
max time kernel
100s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07/03/2023, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
Resumen-de-Los-Ojos-de-Mi-Princesa.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Resumen-de-Los-Ojos-de-Mi-Princesa.html
Resource
win10v2004-20230221-en
General
-
Target
Resumen-de-Los-Ojos-de-Mi-Princesa.html
-
Size
258KB
-
MD5
60eca923afc526af36a529972162cfff
-
SHA1
1908cde0ec910cefa47a36bdb937e64f588e42cd
-
SHA256
468b5c0bb98145f5a0944e079029a0b4d56180909a01eca5bcbaacf4e0afafb3
-
SHA512
6376fc52df91230b768145532f8bf991b6cbef2697aa928514e50be60c95f07f5356c8d24ff5363f8115c38f6e033ac4929c9f92417aecc3e28dcc6847dc745a
-
SSDEEP
6144:W4qmSo0APa6lhaH09YvmBv1jwSLuZJ3taFknIKPfYkO5PdfTvk/J:HSyPa6SH09YvcAZJ3taFvKPwkO5PdLcR
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "384986630" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5BABCA41-BD28-11ED-96AB-C6A949C40DC2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000074b2d77a8e7a944ea7c282b9066208cc00000000020000000000106600000001000020000000e0c62f0b1fc69ab27b4002873082b4e3f0f3b5f5a34f4c50af0d94e8b8fc2484000000000e80000000020000200000008cf610c9f5f0f37ac0d324f181d8ec4dcbb79ad3d334670936c24cd414e0cd7e200000004fd7de1a1fb22bc7a5d991b0b93d60f960e5dbadc93ed0f86487a28345c94ab2400000008305cb4b84acbc154a6b3545cb5ceef833ae766589f4ab59f08deeae4944df3f430f4930dda154bdbd82e5f497e6a7c6c371585f1f594f5e454e7c9b96e57bd6 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00cc69363551d901 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1764 iexplore.exe 1764 iexplore.exe 668 IEXPLORE.EXE 668 IEXPLORE.EXE 668 IEXPLORE.EXE 668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1764 wrote to memory of 668 1764 iexplore.exe 29 PID 1764 wrote to memory of 668 1764 iexplore.exe 29 PID 1764 wrote to memory of 668 1764 iexplore.exe 29 PID 1764 wrote to memory of 668 1764 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Resumen-de-Los-Ojos-de-Mi-Princesa.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1764 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:668
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5551f4ca0906427eddf93bca4292671f0
SHA1f5102cf7c8231482da8224a8410ff5edd055a67d
SHA25641dfe8dc04b60c9ed33e58d000b0a6d7df7b9424f9f960160bf1808117e12dba
SHA51265f27c693631b9dc303c3fe7eee095c2b7f2ac006a2492fa50a1a8c7e1f49fe9c5b8e5f6f74495a40f7f60d8b8cd1d6885f45857deb8191b53bca58b7e6d71b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506e3c31dd346ee3fc678cd7c66d065ee
SHA1c5f65167b7ebc101e2db17fb98e4b17648637ada
SHA25626e15f77442ea4454553fa74eba98641720521d7cd055e3771c6faa8e0799cf1
SHA512e1777007625af87fa972e7fb0d578dca4824ef367abfa389dc1abaa263766ca36299e16556e84a1b1adf0979a6f67a271b38b8d0b0d8fc8b3a1ba5d48d4c198b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2964d9ed2f532b8fdb9d27adb9396db
SHA1a04335341342e1527f66e46195d92466f3bea3f4
SHA2564374c8a94bcec24724855942506027cf88bec4a8560c1bdce6af95302a9a3ae2
SHA512087eeff69d640c8e07c67bf96c11f01e928c1c2d206eab02809d8f29996f7f76b89a9ed70554d79464264c0931a4aa40e0264a0c8e3db8ba15e4a216178e93d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0356f166bd793160befa788d5d20ec2
SHA1c401b7286a8cd419ff2e761c9a1501451f32aa18
SHA256acde1ad468b682305dea7df049614136aea4c1c6a9b32600a4410484f6064bf6
SHA51262cac661de5f31edc7fb4f4e469fb97173294c12a6152035d446ff9d22e0309788426d2041f37a35c6008f5d6e4f5707570e4e21f92cc412b10431a5aa31a3b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c4cd26c0c350182776dff5d2e3b569e
SHA1357e8862acf27e84378fce6116b73addf0e53a18
SHA256625efee217c62c459a29c7797f094e008fc8489f9339667d7316abb8a64590da
SHA512b6fda69ec57dd7f146d3a97da2dbdf475bdbf171e179a4d794a240562f779872b087cc62459b43d8bd45b23097c3b3de9760d3fd0424217bcd407174bafc3d30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f02fc6134541d59a52f23123457bc811
SHA1f31f2495cfe9b3a0bd49acafaa826643e44ea7db
SHA256bed8aefe4055c05eafeb5566c400f5e12449b555f68383853f0798af5d11a6c9
SHA51283c63110249fe4b6aa6f9ee797009b3f0d956a8214af30af878e89d7e0665ebc67b4c97b76debcd8583565016434c52e69e0ea42ce26ce0a424aa34fc47d8daa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eff16442257fe3a487801e9763d446f
SHA11f6d8c4ba63bb4791d1afd8f6114cf422b2edd6e
SHA2569d521407007db253613f07ef9d98434b65f44b80305d9d01878e696f9d786c46
SHA512d931a6c1addcc68ed19bd55a02c61cec5b499ad2d5b548698588bbda2416568c4e3db05d98ca0af9a0aef44ff1aabc57ca7abb0376518d007fd64ae50869d5b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6b9c2b5c34ab914cffc9c85cda06a20
SHA1ea45b79bce40717291182b4d55692d248dbcf067
SHA2561105dc392f61bc81a10124813b56ef499016e1c128ab0740f282e837ebee7396
SHA512f81553d4807302a7fa4417ededc16929f6980e565c623bbabf54e4c694aa357478cb504f57ad5d3bacd569a375008d475e745b6675a2347df0ce12231d6e0724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f57bd80c4334fca65fd1cadee4436f0
SHA16a473b8a59f3f465102792dfd13bc877b0ad685e
SHA2568d524f927b0750ed14083f8dcf6fb1379edc14be739ec4b4bc24bd8731d80289
SHA51243004f3c907d5ccb94a59bffe31de4790192c21563552364d0a655cbeefe4710b252862dd246c141e254bf71e2f4bf3f2c88e9cbf9bf8b1a96a240b63ca9c263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5650595e84a338542fdb4ebd685237200
SHA125596a3a93675421c300db9cdc569df155b792b0
SHA256f3d5ab8a9f355ab5b7f00ef17a8373f2545e17c6196986e3a843530f8f3c883d
SHA512a6fd5d4b20e766ad62203799765a87694fce0ff43daceee7fc6d0855d16cae6c2161e58694addc6f29171162af1f8a1581055c7e84571561d86ff04c3701e6de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b27dad75f414be9351b457cbd414184
SHA1f8471ca99f19ea5c983285455b15fcdc011e26da
SHA256372241de9b758f50c73d35be0d23860c21b7e12febe4c260b4d039159e901cf4
SHA512d7d5fee83c6c63e199f4669ed8e6080b6ab141bd04f0d4e0e5c6da355c9723a099b65b6bccab66135e224ad91f3fcaebe408470cc2b1aa8f0fe4d439532e71b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e417f57773b350120761f78d296ec7c
SHA103c39350dfbb3974f1b9a1a16a54ec628565a605
SHA25636ae6f5150c30190863152de771eef3374b295158c405ad400e3c744cc015134
SHA5126dae57a62c23ecd1d5295059b886da37dc9a1877ad69ec1e44b3b50997cfe8cf62559aa3485f8bee4f9332d9a8dc7dfc1ff0a7c146c3871111adf0e384a625f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c173066f94c01fe61466738be51a366d
SHA155b740f4833bb629daf974000f1e26019ccef91b
SHA2560a9f115b19692a1a8e95d7468ace331779063a34e3fd49c207612a57d6a36472
SHA5128428cfbc980e5b9996c17d3dc81b8bcba7f635be5741771fcdf70e3e6823a9ba2fb1615869e7a86afd76e2e0b08bbc73ccd6c3f669ad254f5d69330cdce24684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a068ea176f459c130f4d9c5a870ecf8
SHA1b7b734ea0aed11e17a4a607a221a5a7b67fabbfd
SHA256ed32c4770b8e9de53bf0ab84b93e531cebed40033d1b8cc59f61b51dde7c053a
SHA51275aa504da95866984148ce3b2ed6cc204db5e5633d286edc0b248353102f5886778e88b50d4ffc4943cd921115c02d5c317074155cfe547d45791d826a6d1f7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1086dabba8c4cc50940e932e1030530
SHA1797f6837bd0f68241e4742ba3a3807077740d625
SHA256625e121cd9ec8fe9b6b222b09fc3ed85fbf9545690c52db8f7eb442c4bf97887
SHA512fd992850ae068d83751c5ec374a8c6a216ee888a63eb4fc08e1df5db53d71ae13cd3fc17d67220c81b0eb2fe0c3b84530be883fb62bde169ce3305fb7d5fb19f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NZTPJYNO\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
608B
MD540350f5c807d8dd5d76297b2550b1433
SHA19cf08217b838f6819b58f2230df4cca5c32849b9
SHA256ef586de4b721244992b903dd6ac1d2f256d0f1f9fc29eda814ad763704fb14e6
SHA5120e70d3af9b1b52df711ddc318814a1c16699fddea840c6443cfbe3583f53924793e5a78a9ed3966edfe1070d005f30bd1c9de7419412d180ac1a72abe1a959f7