Overview
overview
10Static
static
8003e0d05-e...4f.eml
windows7-x64
5003e0d05-e...4f.eml
windows10-2004-x64
3QS75790832...QQ.zip
windows7-x64
1QS75790832...QQ.zip
windows10-2004-x64
1QS75790832...QQ.doc
windows7-x64
10QS75790832...QQ.doc
windows10-2004-x64
10email-html-1.html
windows7-x64
1email-html-1.html
windows10-2004-x64
1image003.png
windows7-x64
3image003.png
windows10-2004-x64
3Analysis
-
max time kernel
100s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
15-03-2023 04:56
Behavioral task
behavioral1
Sample
003e0d05-e098-4f77-c885-46d789da144f.eml
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
003e0d05-e098-4f77-c885-46d789da144f.eml
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
QS75790832498186151LQQ.zip
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
QS75790832498186151LQQ.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
QS75790832498186151LQQ.doc
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
QS75790832498186151LQQ.doc
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
email-html-1.html
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
email-html-1.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
image003.png
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
image003.png
Resource
win10v2004-20230220-en
General
-
Target
email-html-1.html
-
Size
7KB
-
MD5
202ac828678e3a929218ceabc1207ba8
-
SHA1
736b26d3bbc0aa11317163b04e63823857556189
-
SHA256
5dc69f8c8aa949846e6dd2f5fcc7e488c038d9972f40a5f4b0a2b5f0acfeca34
-
SHA512
6be42e4623e621608caa13b009bcd05bfde3a2fb28b12c4d5b5a93d5e40539e89bda5b61ccbbd86b200b1870443f48b8a902752617965911c9d7ad8c498fedf0
-
SSDEEP
192:9XZIizvXCE9ZTaj1GgOjljqj5rDsqj9jIj6plnMGr9xHI9KZ999+ATugwn2c9jN1:9p3vCE9ZTaj1VOjljqj5rDsqj9jIj6j8
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{358BA141-C2F6-11ED-82ED-6E0AA2656971} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dbb59ddc676e394a83d3f942d26f43ca000000000200000000001066000000010000200000006fe96a36ab99d7e5664c42ceb04ec066459a196274e3db94a6da31575f420910000000000e80000000020000200000006f347d3d736bcd4b0676a50eff44119a7f5f743caeed39ad30b0d4439732e4ee900000000151b3bb079a0acdcf87f614bab606b83ce3365fb620099b1f555d2904ef950dff0b88a4a9f1a0fa7ce56096c5e8df0fd4df2f09eec6c20c6ee9c11a6dcc6206e3cc4d6d1fc9df49f596a95006fd70654be498ce3bff5c4fcae6db85c6c6748fee587b27d9f1977f44bb1fa5ccae79d315d48094eb726acecd9667dda495171c94d2626e8afe8854e586160cabcd35e440000000fd0938c1ba71cb92b488bf60d4224ec8f7fb4dcf879f148216673eb2f1739e643c91100955462748b8fbc28140f28b07edc67fd611e24b2417ced7f774b010ca iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1058740c0357d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dbb59ddc676e394a83d3f942d26f43ca00000000020000000000106600000001000020000000de82d56a2233498435ca5b99541b1fa7cac8499d602f440d2fa96c1a60de496e000000000e80000000020000200000002c06d4859087d6537e9e80456a2dad3e176051ef927b65b97f073da4cbe25db5200000009646440042046cb18a23a6bd8a025f396378daa528a68da0916ca38bafc000d140000000ed4c11482ac188d49fd046f78cafa632bc376a986374aabe11e53981b6d7d8b77b7742cb51d53c6b2738a6f1e5f2cd79cd8f4c5e8ff47745e52fc0754d58009d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "385624799" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1540 iexplore.exe 1540 iexplore.exe 692 IEXPLORE.EXE 692 IEXPLORE.EXE 692 IEXPLORE.EXE 692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1540 wrote to memory of 692 1540 iexplore.exe IEXPLORE.EXE PID 1540 wrote to memory of 692 1540 iexplore.exe IEXPLORE.EXE PID 1540 wrote to memory of 692 1540 iexplore.exe IEXPLORE.EXE PID 1540 wrote to memory of 692 1540 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\email-html-1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1540 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD575344078038dcbf41292ee4d0887c167
SHA15c7aea10534ee649f27c2f0c3270bd76f3065c42
SHA256d19ddfb79e7f1d42c3f11227285626c67275c53ac67ea9ae87d7bdd823d97a36
SHA512e3a2ea07e1dbcae2fc139a3c13e3a6da82c7cd4197758d9fb8f92d507f2afddc6782bfda3eb98c39c401dc918c1e2af421e6be540b2bbbf6e68145086a0c5f73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5dd078b73f6cebdd21adffb77f606dbe7
SHA18305e81ccaea47750121753171f1fcb06a35157a
SHA2560a3d9fc4817291ece89d8f536a7b892ea8d612b4c0f5df684cff943382760c5c
SHA512708cca5d19884ba93e1164b35febe88c94c2a617b781c2f9e32de8397e0b449e393edb64f4198842a07e275c0572775a1d343f4a7320073c22b4047624f7cfc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5ec3a97d46ec24cdd405aaa4e481db946
SHA161a69b4bf10e4e852fb16a4449d0959b692b6a59
SHA256c304c93b86c1b212f6a48c00612958b4cde5b9bdb61b8c7b1fadf94498874cc8
SHA512c370860d1c594fb6743ae544197c4f30faf2a2c7257e765a5139db01accf701b043a0167e189076695f88b9c1a4400d14f43f1b92f8cd2ebaa7f9b07a17d927f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5620974c5f60fe2a66df5fcdc80170cb1
SHA197de9b98aeb24365340d798247321abb1bc482d2
SHA2566e8fa669d1eaee6a10627966e19baa6d0e92ad21e9dd3e10c38e61b0d0681f98
SHA512c6c1da71d2ad4c8cbb32f1d66ca213361fea702e3a401f1b9c99481e18ac0a8ab170aec4bd6c613ae1b315436481cfae7dfb6c90c7698a17be1f87727872932b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5185df24ab70a973a8112aa94e291e55c
SHA190412e236227f1a6ebc74327c789dfed31967bf3
SHA256cfef823fe4ddadc178d3d999ef83b2e2412b38ac818a624df653b27eb13c7d2b
SHA5120f77ef70c174672f01e33d41b32841f31ab521bc00c4cfc3f1c5f59e0d839aea95fba2ce670bf87b07ab63819006ba4ae0e4dad653b7618510dfe8508512df02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5b189735a0078071bbc07d4f9194743a0
SHA16eb33633e8d880913a48ccd1ddd1a2e34bca8baf
SHA2565ab9bca6116502c276d031be3a08dadb47f1bb047c9a9c9c98ba4c75da0174dd
SHA512f49e50927a9c6c45912ad45698c30785c5e463c3e911ac53078d02d9e3a182bb7c22b17e41e16100f36938580550b0ab0eeb72bf9fce889b1bfd71d70a159a91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD541da5d2fcc9e40656f81885ca6624606
SHA121cabe14eada13c0e21b52a708f0c449cc036f22
SHA256e6e3e1d970a5d82fd7677adfabc0cb232d89a34cc3c253cb5c65ce8e21670fae
SHA5129c29a7118941b4480b23f38f82c174bc98fc663f814982b98458ddfd46cf7239b8bf601b20eab1614e4c854742ec6dee2520cffb37075005a072e98924b2370f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5cab23185891e1e1255abd2994349325c
SHA18e4448fa5044b748fe964d5375e3ecf6eafa1d14
SHA25690633f573cfe14bf2c590499730d163103de83afda51071fa31b6f807e516ab1
SHA512cf062519467648704815aef44d2d621c8b4474648bf3067ca371f4ef4d58213f4a1587aa1a9227231ba6e725425b92215220abd5719609815cff4bd0bb7b3240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5d2f3e1c570f7f7f84fffa272b9cc1149
SHA17e8ab8530fe4b61e4ef042d5711b888bcaa9bf34
SHA256ae85401e657b1af0ee3d727758f1a2bcd81060fa3d3e18ac12447001531ac738
SHA5129f4e55727f62ff42425c2993ff4bff8c8ccdc0f48ec14e4e5097d144bdb48fbfd2c438e36d89982e7c9e20479df65bf344d172c63d859d10e415f016458ea283
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S7FIT0B8\suggestions[1].en-USFilesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Temp\Cab433C.tmpFilesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\Local\Temp\Tar46AC.tmpFilesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\HVCAZ3FX.txtFilesize
601B
MD50c9fdce57be5c91e9ec9650327cf2807
SHA1e4ed6280f87062a7555dac725b39209eb7147107
SHA2563fa469a2c5a6c25c3e1946342cc2b71ded938d6129c84781d17cef8714ca12fc
SHA5123598975bc1301017447499ae5827d7f37d506dddb32ad924bf0de32e77443f5ae710505030be010a18bb864384ee49e3de7c66342007b2fa56e7baabc031b67f