Analysis
-
max time kernel
97s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19-04-2023 13:56
Static task
static1
Behavioral task
behavioral1
Sample
_CFDI_92430.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
_CFDI_92430.html
Resource
win10v2004-20230220-en
General
-
Target
_CFDI_92430.html
-
Size
3KB
-
MD5
a76342b3c5b5c4c5116daa82ea740615
-
SHA1
7e92ce52048d75f3b1d3c43b03444cac0f136378
-
SHA256
e583f06ebf937f9fa59bbaf24fff40e852a1ca58a0e0d510582dbf6a133e435f
-
SHA512
36317d45901ef590a2c98d83b10b0e01a09e69887af3ccb72c73ea0df86e114828a703fd4cd575c457ff950db4f8c99954552e106282375cf07c7c012e0e2cb4
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B6725661-DECA-11ED-A133-C227D5A71BE4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fba6cfbdd4578d48a4e75475bed73c6a00000000020000000000106600000001000020000000bfa73f1e3fcbcd25d87ad7542492c103ef7cc0fe339839d72f5a69f3c0c0a122000000000e8000000002000020000000a583d7f15b3dd8ae4dab7271b6d10f80776599d1be6815f8d0bb69c1c48328eb200000003ab3f1d3da600f44d06c2c309e014e52545b7620f36bd7b9f21a1c6055dab8dd400000007badef85030409dd62f49250ae0cdc8b2ddf914bd02896b2a6997685f7a4b761398bf643d3e6e9f7022cb0def9432bbb5e32bb4cb28e1dc949593441b290947e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "388684750" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7063a890d772d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_Classes\Local Settings IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WINWORD.EXE IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml\OpenWithList\WINWORD.EXE IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml\OpenWithList IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1236 iexplore.exe 1236 iexplore.exe 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1236 wrote to memory of 1708 1236 iexplore.exe 29 PID 1236 wrote to memory of 1708 1236 iexplore.exe 29 PID 1236 wrote to memory of 1708 1236 iexplore.exe 29 PID 1236 wrote to memory of 1708 1236 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\_CFDI_92430.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1236 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1708
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e02c152434ed4a9edc1e16b249b97078
SHA1a45a129cc53056e1f4a3826493e4c70d096e3b1c
SHA256494ea20b183d7ab8d3e8dfce75bf4577e8e01a86d475af032a5fb227a1854849
SHA5122ecdb9cc9f1883db2faf0c0658e572607b3c76b08ef294d52f3e22d13d90d694aaf9535bdcb3365c529426d3e41e225524f0895666205c026b31a64b93ddd4eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebe643dc9e8db4d15f97ec421a071f4d
SHA1fefd5e98c468dc1245da094e91e428dbf7f389ad
SHA256cb2e2db343cfe234389020033f44baf932651da015cf30f5d8c14ea6e040f69d
SHA5126f00b33bb7fdc883919ddb5761588dd3c3db69bef496e0941fcc9e6866b3ab8024e4889c111cc3752abc16d47631e581a46418602cca8c2d42f8cd0b80602cf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597d38a3fc84e7e9fafbba5e899c9f6a9
SHA17b94349d9af9d3c7a58ce73b39b4311208e289a9
SHA256c922b0cf913b68306e7f94f3b6744f8cedbe6d20fb34f923713ce5644d00d1c2
SHA5128961725a8f19f70c72772fa8b75e0150df5e711fcef4a16325191c0abd3b1306a9a7caec3bc8be26c69531238f5439f64b4e79fd9f5a6566fc6860277fa4de5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a6842378d502215d4add3c38496e700
SHA178b0876b393ae6fc3bcf1769db4d20645db09ac1
SHA256fe62d25c0316d9abfa3854c2e7ff59501aa74e203e2adf01b5d68c21bbedd6d5
SHA51201be8af4e3d4a4f0e9b77da56617685899677825a377569e6818e485224ed208ff3f5162f0153c3158ea923ef920f0202f35504abb4ffdb7aec3adc7533a9070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517e54189b37c678f3c22100beafddf28
SHA179396302c2e9e559c49299008e772af38a6f0438
SHA25601d7d406c09ca977da5a082872a3082c7683c3848aa65c54c1b75dba7736ed50
SHA512e1c456dc2218ebe694bb4ddb27fe67e5c0754320dd1c67311ff7e2b86cfff707775ed69ddc3678886add222d307c91ed409209ff40ee9f4e5aa73d0898ab6333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d43ca7ca3a6df77983cee3d66f4af646
SHA15fc19edcf8e9672e810cfbb763e40bc1db092996
SHA256d667c05225a77a9210e51e6cacc461fd75ac1248e6327871b8a927c831fa480f
SHA5125afcf2c60a30949b0bf8ba976dc459c7afba13bf5ee6b145a1f9d3ce681192c06613614fbcf4ca6c1739e8e0e2461fde1a18ccf3fb3ab123d1d010edcde191e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7d8528f4c20153dc7deae15301c9e29
SHA164280c7531546710faa19a72f6b674d3b5d7da3d
SHA2560f39af121eb9c6d2ef6acb9fc110e6a73ab7466379549641a83e121cecc9c7ff
SHA512289565990fefa0ee129a191787f92ff5b726ca6ba10434f664094ca19dac493f2757e42b4ffbb56398052d8c665d6235c9930a61d495db10346d3374b1f517cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59711f1c1399556a6e66b36f2d4231037
SHA18ec6225694f132b4bf57ce0bc76165674decf1d5
SHA25678923d747941f31653fe986d432205c4ef22188d8682ed92de3b6fe0ed6d2ebc
SHA51240cdffec4cfe09f3c4a9aef371799ff358072ca3ba9a01898d38f1faa4b51be5a7e8c0f4dd7ea244ee9846dc10e5a5f710c33d964bfe1d5df5929bdaf644eb9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5760ebc81ffca037d831c8df87e15ab65
SHA1c0f856d3b3fc4c414594f8b1a32ce94b01fc0bec
SHA256fceda2c826fa2b4e14555ceed42f7aec10bd613b2db8296dfc3cd1c1438ce3b8
SHA512492946ecaa9e8e903e20d97dadfeb5eef4693485782d310666ba4ee57354c59202b5453d7900776c35d22141c7ebae719b370a39d8060cbb5a29e2c39accaabe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c861ef14df2f473ce7864b7082dbfaa
SHA1ff50c9a41f2b5bcc543eb3fb39eb3536f764fb6e
SHA2564125dba27aec684cf9789e396d5b235133b159863b28178d6185fb16d9131d89
SHA512b6a07b83a0ba86bc18b64858800008319a7bde15a451f0eac2373c66bf78d59a75bab99211011a3f2dfbf369e65d72e0610019d07f06c794d3682d5bbaf00343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b09c5f6b417971182cc839c7ba73b30
SHA1bb2a507b96ac2c93db0aa1faa1ddcb4aa77b9eb1
SHA256972e6cf42bdecba7dcea22fb5b4cc18cd9fb7f722fa9b97c0a83620327c029e6
SHA51291d4656106f045d3580e709ec1bb94c66aa3db1729aae1113d8ade01875fc4f6ef3ca74c8090ee7e00d2bdaf6432cf78b329b5190bd5a4f8917b45c0b5c03198
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ACT9UUKV\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
600B
MD5ff91906c16f053a3d6a2634599c45a28
SHA1fa5de078be0137acea4cb9115e9a8bc427c59cf3
SHA256d963654cf9609c270e5f3ab358a3915ff653da3cf5bcb50a81a5bb5e92bb70bd
SHA512022ad49ab2fad6e97ee59bbb982eefc4fb30fd8facc12ee50ba00cc15cfc7362811fb10b15210cc18fe23a1abf87a95da4eb2b5a509fb8b561b355339e5c7053