Analysis
-
max time kernel
100s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14/04/2023, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
file.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.html
Resource
win10v2004-20230220-en
General
-
Target
file.html
-
Size
7KB
-
MD5
0a5045e2ac37a9a19314449de8a9f008
-
SHA1
2e2c5697bf1df291cfbe3a78afc304c78fa7403c
-
SHA256
5cc674db07c1be79e8e6845511b4cb2ca228a307d7b62945abc44f8907fb4ff2
-
SHA512
20a644c00a54d049f50f08d0bb22c70b8ff743584df50d939a455f6aafb241538c1f9e1e057a2f1bc53d306a4290f8048df838389dff24dc6dd0651f692906aa
-
SSDEEP
192:/JYliuFsIS3HF1W/UxhSnGmLOL5cqe98a8bR/:hWAIS3H/PxqGJW96l/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{08E6C6B1-DA89-11ED-95AB-DA251FB5CF93} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fba6cfbdd4578d48a4e75475bed73c6a00000000020000000000106600000001000020000000609cf842e24c520dee323bfa4affcdcd353fcd3a1cf0b7de99f6e61640f21bb0000000000e80000000020000200000004d442375a690c8c348843816738ee22b8d9f70a1751822acee268b820aefabdb200000006e1b2bda812ef07276b547a585cf94d9f6943d52f860281ebd915cf78d76d4ec40000000c065bdf33d46c0ab70994b093686426d0640751d5134d85d914bd507f7bf33a55c66062a20bde8b31a37405c7b5a19ebd4d8f2a53a2d5bbac4d449922913bc35 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "388216736" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e05e93df956ed901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 336 iexplore.exe 336 iexplore.exe 992 IEXPLORE.EXE 992 IEXPLORE.EXE 992 IEXPLORE.EXE 992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 336 wrote to memory of 992 336 iexplore.exe 29 PID 336 wrote to memory of 992 336 iexplore.exe 29 PID 336 wrote to memory of 992 336 iexplore.exe 29 PID 336 wrote to memory of 992 336 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\file.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:336 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:992
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc30804c4239c2f9534dbaa987d9b98b
SHA1613f3f423aae4da60422048e74d94fd661e99b5c
SHA256a199df6c59ddaf5838bfdd024e286d02a93513f0875a07b36a98787ad128af18
SHA51277d6cf709e723128d97d39dbca4895bf386fa1d42f7a007fbedcb3b6348533bceae9f604ebbbad646fea46142ab315da87355486f8d3558f3f02dd855980ba3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efdf568c3071d425a241bb2880499d16
SHA19a323142039411bfeee00e58f07e82b8acff6de0
SHA2563f7bc41098942eee44d267ade33bc8d893a91399726fb9438dbf043247b9b48e
SHA512384e42900b9bd90930cee40c59fb0ce51a2b0834cb9ec79358dc65a73b0b2c804007f37b19565f3dd46c0d802f408607025d042b967391bc6808f4d2314fde57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c9db3f9ed088ac5277cd2829278520d
SHA1873b1eb19b389bc193f1a52aa46eca8dc89421bf
SHA256d9230393785932ada89e02c3a1e1f6abf744c4393487a8dd629193b0486ec6d0
SHA512c8cf2d9e12c3e448556ef8356509ff9a930978cf74f9867f8dd845c053645d669d6602d74673f04d343429e883b2e1a9a57031cf9acc2a9621e1051e4a445da1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddc3dda86735504eff4fe580e2370066
SHA1962264ab86aa4e5feebbe4b3e70fcb5fad33ab2c
SHA256593a6d3b9e5831221b795108c29c84e2305acc08ce1965d215ca9d6616b079cd
SHA5124dca2a9a9e0af43876010aa7a49d5d88a4b27865d81093f65d42ee13ebee7c18f556b19fbb113d794644955570a3ed7ac89cfb6cca355127932e084ba4fb40f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c397ebcc5dbf567be7ff9ed842db9614
SHA136a4b9b8e3f733bbb99115e4e36cac936fd2e8d6
SHA256374de33e00b61aa502ef9defd1bfd5672db3131974a66e9ce83fd9ce211814a6
SHA512337c59a9c987c19d8b61015b81ea5ed7a4e4749e2ba72eca5ac8bde7b285b2c823c4dd8371fed2b5ca065912dabf7501b890aee1f5af45b8481d290f49fdb81a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561655cd64162222767eedbb72fd4bbb4
SHA10c5312c631c13559e2918c291c4847a5ead9a643
SHA2568762f6a53835b48e41b510a335a0cb5bd836461bc9406d3df59588a19a81f8f1
SHA51265df3c8fa440a7c6e7c81c8fa983774f617b27b61bc57151e0a80fb60d0cfc105f012454de5221a1d67dc869d1322d4397753e744c32cd7a35e82a5bb15fd5d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57289eca1198d72dc01f5e8f105ccb257
SHA16f52e713bfb57f07bcd44fa8f44e77f075439ae9
SHA2566b2e4aac74d63407dd938bdc8b54fab1663d0960bedb34f15451eee459dd7984
SHA512c36322635f74ef35541482de2dd64f74952fcf846c7ed1186531262e86c8ecd4595b8aeca72a818375c976750441b2c4d0d441f03afc02694ec20ecbc72856a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531d78b1da5af0717194b446f19b14356
SHA1fc08ad77878b32a3dd7d96a50478d92c86c5f49b
SHA256d764af8310c1f9e53ca0759650f08ab354eb310233a6db9f92e7c85a2ce58065
SHA512092dc3098752dd2a8615bd8f255a30f49fb09aae112754c06b91171d320fb0315e237b4006bcf275ad4bb5dd33c5eeff916e4812d30b4874c380d89a20049d87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52456e8fccd9bd52f3d87580c7c47caf6
SHA168df1c6921f0b9bc36c4678899d3ea801846adb0
SHA2565e5864def89ce525636369a7c623f01a89903cdaa7133ba984dc9a8bb713f8d6
SHA5125e53ea00ebd23ca430409d0264a144051624bffb07dff9c7bb4484ffb2343becafd24922c1c97ca36d0e228f75c0d71a12ba7c66c60a7a4501ed92dbcfcfa476
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ACT9UUKV\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
600B
MD5db72b7613f43f85d965dac562b5f8a88
SHA19da3be47ea716a70b43f1ae46aed4e48bab4a5c6
SHA2560abf1e1ab3e668bbd40668da25f3b722cc6ea17a8f0d76f8178f025e18952751
SHA51215f40d6db35569a3caa54953771667a7e63b6a35beae6bb7eaeca8b5b08c9c194abaa2d601922174d947f4508492646b8ed8ab6f91aac40e41c0611a8126c984