Overview
overview
10Static
static
852c03506-a...92.eml
windows7-x64
552c03506-a...92.eml
windows10-2004-x64
3Electronic...23.zip
windows7-x64
1Electronic...23.zip
windows10-2004-x64
1Electronic...23.doc
windows7-x64
10Electronic...23.doc
windows10-2004-x64
10email-html-1.html
windows7-x64
1email-html-1.html
windows10-2004-x64
1image001.png
windows7-x64
3image001.png
windows10-2004-x64
3Analysis
-
max time kernel
100s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
15-03-2023 05:15
Behavioral task
behavioral1
Sample
52c03506-a7da-5b88-f72d-0d619d687292.eml
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
52c03506-a7da-5b88-f72d-0d619d687292.eml
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Electronic form Dt 03.07.2023.zip
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Electronic form Dt 03.07.2023.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Electronic form Dt 03.07.2023.doc
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
Electronic form Dt 03.07.2023.doc
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
email-html-1.html
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
email-html-1.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
image001.png
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
image001.png
Resource
win10v2004-20230220-en
General
-
Target
email-html-1.html
-
Size
464B
-
MD5
8a31892e98b300cee0769ad98c37103e
-
SHA1
b759b2c575e43e4ca9ba992cc6a5d98fed618276
-
SHA256
1c6072ed4159e523f44ab7192ff79b6ff43f3cee987374be128613f0a0132a34
-
SHA512
2d4684acafab479c39b7414b28e3fbcc7c4220f5c939ad400254cb75e8b5f36612dbbb972ab16ef460154c53aac5c745e10b785f59eb07ea42aeab352356b84c
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "385625976" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fba6cfbdd4578d48a4e75475bed73c6a00000000020000000000106600000001000020000000c610f98e26c38d53c9151f143b532af39c03aae2b34b6dff623c00e3cf9e9033000000000e8000000002000020000000ed92b2f2725d91f4d83f172d9b55ab972b17f2c29a4965f92d95456f4139982e2000000077bb7f70180c79c38de23e6cb22617f49f38aa452d6c0b4b325ec54c2cb7f5ac400000005d9527c22a03fee88d7a89b959d7f068f75ad100705dd548546df0ebd31d5b18335fb8c8d73cd1b251090d7a73ef5fd8955ac9049b11df637a99ffa6b1282a53 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 906111ca0557d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F30B4F21-C2F8-11ED-A077-DE010D53120A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1132 iexplore.exe 1132 iexplore.exe 968 IEXPLORE.EXE 968 IEXPLORE.EXE 968 IEXPLORE.EXE 968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1132 wrote to memory of 968 1132 iexplore.exe IEXPLORE.EXE PID 1132 wrote to memory of 968 1132 iexplore.exe IEXPLORE.EXE PID 1132 wrote to memory of 968 1132 iexplore.exe IEXPLORE.EXE PID 1132 wrote to memory of 968 1132 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\email-html-1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1132 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD56185d3c4d8fd929b3beae8e9f8a256df
SHA1ccfddf0c2eeea1f0ffcf5f6d661d741b99fc5b48
SHA256ebc26a78d0b69a1148a06f24e1b28f9ba798e8b773b0ac176a1c08a4415177cf
SHA5122d31cb1e5b6e2fa258bad3fb3f55cc833f3f014a9edd13a48f6a62a4fa216685dd6077eaf43c75875b8635f457895b688e4e989562a194159e7521dcb25f3b55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5c6458b1aac0a1e284f90811a5a6329ed
SHA14cbabfc7da02038a3512bd963f9ba73ec9fd02fe
SHA256444ec33a4449de090e5a144675bd4ebebbe59d9e604ce2b0bf6b9c75fa329abc
SHA512d756a867589931cbc6911afba9d2be3fa419fa87ccacf6ebb6250a2de7330165ba6d2c7d889afa7b946333acc26e2c2194afcdc6b908f47736d182fa13bb4aa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5ffb7245437e1a472f66229b6ed243683
SHA1e63bda1df8b3a02cd57546427c47b0f97f8b262c
SHA256d03b925eea9f9e4fe98a90fe43e307b07e5518edd946b5ef6e52ada32264415f
SHA512f352567530ba0a6592ff6b19a2edb564d9ba5c9e1709f423557cf8a28175a5a9eb9b655070cfdb56dd07ffd2cda835293943afb11c781de3d3484f305e123967
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD548e029440b6a5888840ef9f4a27723af
SHA1a1dd3c6482df2f31c0d086e0b00f99ad53905b83
SHA256716b4d223a6650309566765e3b94a41c59301340d95dbd21f3e028f2777822eb
SHA5129d277995dcb42ba9290e3340fc46f53cbdcc5cf51eea4d929028fdaa9631f44b76c5b37224c15b6001260702a2776041a09822981d6cadbfa874b7d39b09bee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5b5072bd096b6eaf0d35b59169db2b123
SHA19c8a96cc2b05c3b6b864ef5b12b73dcebd579f76
SHA256d9002ae0f5bba331cf7e916558b7de62e3db8f56bf283c0e8cb903bf04681bf1
SHA512553b950b332fb905bcd32b6255067e1910566e52883f0f4ba2079906e363830c0a247d7a06478f56006258b73711cf30813c403d7d6caf4562b9d8a3ab80c089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5e982072ec1d44015cf8078d8921f4f52
SHA14b27ea6fbb31668efdacbe66dccd22d04c18773c
SHA256e0670d8b8dc52148ea08a7f75a4085410d558ad86a0941711d14923a402400c8
SHA5128abc7f4fec3bd5d29614eac42a942826887a773645f9a59b20ab3fdf8ea9d92415c9e17e25669af36e7f724d6b22b16130ccecbe612fc1cd294ba3994e778f56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD594a68fe5629467c0e50e71aa678c7ef8
SHA12a6fb98c619d6a21d39333ad5753e7adfa391c5e
SHA25670b43afb5cc6b48a5cf76b3a3047578bdfca0aae0cc4f3c59bfe6df9e8a92c67
SHA5123551701aea7ad2d26c1a24ecf8e471f26eef35e615d807d9320b98b8d0d240ada0f884bbc23a9bcc1303a95b153dea3976f7e2d3b36d26a73ebadef21428aca4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ACT9UUKV\suggestions[1].en-USFilesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Temp\Cab4175.tmpFilesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\Local\Temp\Tar4278.tmpFilesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\21XAWKEF.txtFilesize
599B
MD5523658ef67859ec66bd168782225242d
SHA14480a89b3a54860f0a7dc77ac9e2c8942a177dba
SHA256515fe2ef5d03226797f0dd8498b4ea88e1fcb189827a880b5cbd3e51ad30a0b9
SHA5128e21dd27198e07d13cb7d22659b05be72a32b762c16f7604c5af66129d303e1344ddbd98f6a92f182c02c9366b8ee68d16177435363f4400b93c12c743ea39d3