Analysis
-
max time kernel
97s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
23/04/2023, 21:42
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20230220-en
General
-
Target
.html
-
Size
95KB
-
MD5
18540b97144a964604b108a15230bbcc
-
SHA1
a72741829e4538e2be69e2006fd02cb1178caeaa
-
SHA256
d0eda36d34c2aef7530d55e78f2c730bf7f8044fef10bc716ea02f6d91905463
-
SHA512
bcef3a5fca429e54e5ca665923647a250768aff2d58b41a1dd5c79f8c92266ff7a0664fca34b56e63a4445923963d8c4637b8437aacb016055fd60c3b4325a78
-
SSDEEP
768:1uc/ZjNZDA6+x7ymRjymh3GatXk4fxkcv:1uaVNZgv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "389051121" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BC8E7671-E21F-11ED-87F5-6E0AA2656971} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006e8f12fa8cd8fd499ff2c01df6bc8a3c00000000020000000000106600000001000020000000bde80b1cc9aae8a7b0dd3c4274fb8321291cfccfd79654e4ec4587f17cddbe49000000000e8000000002000020000000fa1c8e7b253cddbb5084d241822fd45e132d7538b3cfd7d3e8a951a1b1844581200000002b30e7ef9356942574b7e7f8f9bfbeb10ca4ea26cec302586dc9843805e0e8af40000000e770acf7657b7855484b7413c4538b662dba7857f160ae06a7a2e511af29c1f95c5b6d6f851e1078b53cf4f72d0b8276170a61937cad7a429104ff346dcaa85a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50c1b5972c76d901 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1560 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1560 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1560 iexplore.exe 1560 iexplore.exe 532 IEXPLORE.EXE 532 IEXPLORE.EXE 532 IEXPLORE.EXE 532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1560 wrote to memory of 532 1560 iexplore.exe 27 PID 1560 wrote to memory of 532 1560 iexplore.exe 27 PID 1560 wrote to memory of 532 1560 iexplore.exe 27 PID 1560 wrote to memory of 532 1560 iexplore.exe 27
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1560 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:532
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5780145e4f529024750eacc976379709f
SHA1d228ba773ee782c6b085d3ff9e10159eb97c7342
SHA256664cf583c102b893156f3fcba78df6530fbce99baa9dd95ca3443bcd7d77fd7a
SHA5124b0a3d51984c58586a817830c5cf43c74079351989dd57978454125b1b746a615a0da6b126898ecb9dcf51960f11668edb7e4e58a56ceafa6015432c7bf711d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5801f73d3aaf0a60dfa83cb76250df3bc
SHA1fc45acd068a326e69be496be8016f806f85e1bb7
SHA256de805fa6de46de951b6de4bd505a058b9d7833a42b4b7a72f2d5a447277d85e1
SHA512d5b4bac98ac31d6868c24354d89260c28c96c58000411815745106e90290a7e2875e943426fa9c1daead9e2a2bb3d2e604c7728ade854a11357d51b01530161a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db3a6106bea227cd6047463727d86a53
SHA1e2aea49061c6f6e0dcce64cbaf3a17fea9fcbd7a
SHA2565b2fa9defd1258063f2158efbc061654208fd84e7aedbde3e3ed7afe714726ac
SHA51208dcf0d7a2a0a6138f236f6f75442a240241d7bf9ac27e748067a1a4c4cc7a88faee540344466f67e433fc19d826ee89f19f8bdaddc071f8135b33d5a64e5224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56894fe7f6f9be61c2110e9a5d6a4f32f
SHA14b20a09db48dc57f3e520cd3c15a7f20df8d0456
SHA25680fe204cc3192c17be527aa6e41fd8bbeec16ddaa47a39633b84d4177d8dec6b
SHA5126a9314a7a20b757c5a1b9d684f07c8cbf67e3a504064c8d45cde97ac2859ffe484ead0aecbd5d661058a78b7bb21c1e61983d12884c8a6262cd69e405fa2e2a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fbbc203108b363c4052d1433bdded74
SHA10d2d31866af33a705bcd250dea8f6d75da076383
SHA256f1384e8498b24d2f9258f806a3f258652b97d2514c8663cbe1d7c18a0f853689
SHA512e472a3b0db29ad76b1fa73bfd4100b0755a3c5fb1a4204a1dd0280195375b3af2a5d12609b0ec3407e89269539b790e78d21e8c6ee0325a71332365086abfcee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d02cb4eb38c2541608aade0310635f1
SHA1dc34b04bd0a7bc72467f8f89fddb99634e2b894f
SHA25686b058b145fe74a7c1cc15e67fff19586d84155dea6cb1812c3723a40619f427
SHA512f1d6d4182ea810df3214529c85243be6612965e24760cfd3c0a37494c84fe6c3d0105acf25f27e82850f60335c6dcc4acf8e0efec98add26c4000f783dd51601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559d932c047be4cdc0fe42bb28e7aec7c
SHA16ed80d49d722cd7715a93cdb3fec2e8762591aa0
SHA2567f3ad8d00c43aa2ddd97fa72ec487dfd36dbb5f1d345056f516b182898c7731a
SHA51250aecf9e97ab56c26f0fa342ee13c3b104f07707be3003714a9ca7ab9327dfdcb9fcb27b6705b69599e109dc1897a4589bf375974a794aa97c44df8362d732fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5527768a03355a432e782b531194d0c6d
SHA153729cbb892bb9c1e948fe42ed6a9a458117360e
SHA256a9bae2335f43723597f515e6f213832206eb3531743d261812e51af92b3f5856
SHA51222054918b3a40b751e8fbfccd61dd1022a0ab0445d160d6e3ffc12f31284d6672a013f6c470fa7e5d9ddfef932afbb7551416b3d45e50cd5ec3aac31eb576ec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a555380ca4e99b7ff63cef7d2694d02
SHA1e6db7674626b9eda184cdd5489a7726503fbcfbc
SHA256bd0289966c84b7116a6acf68212a8fb1bfa475c9451e16023ca350ed3e2a4988
SHA512040e473471b9294f113af81192b8dc724adfd32f9c545bc134e2eb3ddfe804b25e9317ce168e7abf4838e1dba4775713507de174a67aeb5169998e07b1d18631
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f97b7a2acb34dcb6095384e863e48bc3
SHA1d844e7030a433ed6da2a9698867be01335613980
SHA2569eb2d535d52c8df2b78a974302b97e45054c012120be3db879126963dfa7f7b1
SHA51291d9f56ede6f8e8dde77407992519156afde2306038bf757ef07f3267dcb52a1e88e4b3b23552a13619f1b4366ad777a6b0da861070e4621f01e04a3553d9d5c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VQ77JNZF\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
161KB
MD573b4b714b42fc9a6aaefd0ae59adb009
SHA1efdaffd5b0ad21913d22001d91bf6c19ecb4ac41
SHA256c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd
SHA51273af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
608B
MD5576739bae2af525c4d1e9fd5ff0f3525
SHA162cdc8ad6d29180481d586f33675025c09f1904b
SHA2563efc195ae45ff8788da1a3d412c46305a7b6ffd2a08ed0de3f52ba2eb05840c3
SHA5126d4b2e081c803253bed071ea7ef80b652f7b28409c956ab853cca02b6f65260011cdc8fd01e2a0a4c6a6f95032297c59b7acec94366c98acd953b2b765f9a52e