Analysis
-
max time kernel
100s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
12/03/2023, 07:09
Static task
static1
Behavioral task
behavioral1
Sample
XLXKR.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
XLXKR.html
Resource
win10v2004-20230220-en
General
-
Target
XLXKR.html
-
Size
9KB
-
MD5
a779c4bc46b7d625fd4f67858f0f1d04
-
SHA1
d1bb5bcf121570475e5ba13b3ddb3d9f2cdcfe8a
-
SHA256
0efe65b70729a35b71b8cae4f61a77f7488346c9d41581037b80d28fcc13d873
-
SHA512
4cca566f64ac7fb8df81d38f84809fcf6cac6191c859ec1f6e9a6755027b1383349b1f497b0c442c3906385a4b0b102b049a5677dfe59a2e3303b7f56ad7c5c3
-
SSDEEP
192:ILlg+wuv13xV1cSHYumold4IINNM7ucIk+Lx4AgCXtTHxxSZ1yz:I5g+3v13T1FH6MKIIPa1IZLx4zyt6u
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "385369963" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 409795c5b154d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006e8f12fa8cd8fd499ff2c01df6bc8a3c000000000200000000001066000000010000200000006ca21f19c3739c32aa51e2932c34d8819c607d481aa790044d4af0d0e235a32d000000000e8000000002000020000000d6818c3a78b012dbb642d0843f983b5f099fc99269331c43843b46d68ce58112200000007c55364162fff1f00d0c10fd3281980f336c84d66c47ed0804f2a755cde5f6ba4000000026a65317bf01de320fceb78a1d587b2128a5a71712a1751801b5365dbf378e573b4f6967a1d8e500e96d2a075489bde1e8002d822d983ec9a113ea47230e1395 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF56F161-C0A4-11ED-B5FB-D6914D53598A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 748 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 748 iexplore.exe 748 iexplore.exe 1492 IEXPLORE.EXE 1492 IEXPLORE.EXE 1492 IEXPLORE.EXE 1492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 748 wrote to memory of 1492 748 iexplore.exe 27 PID 748 wrote to memory of 1492 748 iexplore.exe 27 PID 748 wrote to memory of 1492 748 iexplore.exe 27 PID 748 wrote to memory of 1492 748 iexplore.exe 27
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\XLXKR.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:748 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1492
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df09ea3101e6a614f9ec7f0f09fc5217
SHA17b4f87656cb36139bd2408742d9b67ae00a423e1
SHA2567acdb048210244a64ae48b2846445d4e17c65af11374d717f7734afc419e8e0f
SHA5122ba0d3cc294e42da13008d5728cbc2aafcfe1682380f6dc16d54adf149193d11f6535295eeccdddd77f8828f4190becfce269e68034e960234c9a785b398f7ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cafaa00e070946be46e736c6b4f30013
SHA1249e2d29c5b9f5b1e73b8a6735bb47fc673d8742
SHA2560e51370e8051a046a18c9e2718b89383507e76a3498a918d5428b4987ac4eef6
SHA5121cdc11e5a5bd8eb7cfdf2852112387f464304251f054ed67d95345e6f19cf211cba93c2b66e5a44b417c3a9f35c6a65487ced78aaefbbe8d1ec3204dcabc8914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58397d93347b9a093345822f7ee719717
SHA12f30357ce24edc0037da4c5c494250975aefd68d
SHA25642e18b54891f7eaa2b202dc5f5ab70b12a4b62b832e2fa2b8ff5336c39fb961a
SHA512136bc2a7b3f59348fdd9bec6637a6da6810bd0755885b16a428901f0d3ebcb58c5b86257001198b630e02b0740ba707809a5940e58e173ea70884eaac0ffc5a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b139b8d4927071d074d0f7c387ab59f
SHA10f9f7077391f620ac03822fb90a42d47d2fc2906
SHA25622f971549dcad8e80fed2e1d44448ec044d4fb01315ecab5433a36a5455c7630
SHA512300043048dfff7e6dac51f1f86aaefb11c94ca7a8e6e3f7af590687f4cf1b3ca935e3cc85fd50fa12a69c1fd07a416d01047b0c412afcadd5e68ddc937be43f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7d96cceb92ce36d06cc29b7477d04b8
SHA171eb869241f043b98746c74fae65c7068070f691
SHA2560d3b3fc47fe37d35a4b0b3510f8c8b1dea95e9f3302c033db7d75fc3fd795a84
SHA5122ffbfe438a39b47a09d5ba332deec564eded761b9a80f11578b9d5a5954ed5f3d925c1c6566b4d6c4a786dbbfdea8222306607711b579fe82aceac9b5724bf21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e42c368afa171877959360d2f5c7eb9
SHA1e08d3571fac5471d016e4b8f6ec0ae7a02c0cf04
SHA25699b78b161802415d8724b193344029b482826514c43461a0f7162e12939257a8
SHA51270efda3f51c743f540e0a6e6f9e951ef5c140b410765b458de70d58b232eb52857ba75afb18bf37c77638926b42deed73ec4dd90e6e8d6c78dcc3d2cb60f899a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b070c79d9d907b96a539328b3eb8003a
SHA16f1a42c1172010ecebd2b06561f84ade21203149
SHA2562637f3fe1ef7e5cc855611fd9bd7053195463c313f50cd563c07304ccc339fd2
SHA512299384f9921709fb92e33356818f84540c178466df81024f255a124955fc7f3ca117ae9e204347214a13bc338e13c1b89a780ac6104cf496c4cf3eb568c2976c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5decbb51fb477355e24fb769030e0fb92
SHA1fe0002cb9f3ceb617f17607c5bed4200a59e6adc
SHA256e6d71a14aa1ec4656ce6d32c4ced22ef2b513722ba8e83da8e98c4e3331b957b
SHA512d642c65a7bda947da18a4f73672bf349e3f154c72a3af3450d7544580155e9b6f4de586b33725cc555bc78efcba3e8c926d7946ede6d32bef397068e30a80139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5136a50e12b11eb2bd7f87ba66da96987
SHA15b08c63d5ef52523c1004e3f3bda9e2948c2d86d
SHA256972454cf0cc311707956d819e6dab2ba35f0e4389599869506132a83643f0c22
SHA512c1383b9daeb0be31cb2b6b0d5e65e8cd349eaa9c2a29ec8dff44758fa4670c42d40581e3fcb2ff455a097092df21905a903d6e3aa9cdf86ea3fe6d59ab14b787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5628fd19cf12226a39752d1974abb7ae1
SHA1f61553f846ea4eb7045205dcbcda15f7a64a0626
SHA2569ca1ed48c6987359dc0e6714ace7b2152d78a797f986758d58797518dd5c5e1a
SHA51267d01bb89beb0563d8496fe197bea312d508a26c0a1d0c941389bf8f4ef1f5d95aae79c8878eac223419243fea6b531c974a0b001ec4337d55640eefa5065861
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UIC7WQYE\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD573b4b714b42fc9a6aaefd0ae59adb009
SHA1efdaffd5b0ad21913d22001d91bf6c19ecb4ac41
SHA256c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd
SHA51273af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
608B
MD5979225b88033102d9c7f68a964132591
SHA15fbf4f512c49b535c48c0b022c8338b69c241471
SHA2560938ef7238d0f2b27a9d511fe91048dd47729bbbed4456aac37a29ae7cbf9854
SHA512884f8d11419f9b41eb6d29c361c5144739e6bb46dec36104b217dee8744fea7f5b8c2dfc29e677b8613309ffa97f0408512a58d501b97edd38ce2a00537a537f