Analysis
-
max time kernel
100s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
03/05/2023, 23:46
Static task
static1
Behavioral task
behavioral1
Sample
asc0ZnSw8AoUd2.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
asc0ZnSw8AoUd2.html
Resource
win10v2004-20230221-en
General
-
Target
asc0ZnSw8AoUd2.html
-
Size
162B
-
MD5
bc56979a0b381a791dd59713198a87fb
-
SHA1
6c665dcfb0303a67024de3d694f810669ae188e2
-
SHA256
1d08335e65da7cf40d1c4a7ba0088e0f39b9c5a4b2e42de95fc9ffa69fb96c7a
-
SHA512
f0ce614d94601746ac209abceba7cca6ddb1fd5d29f5e2d731510163e9e1a64891bddfe4ca12c16e7ed99d697c7b0634603d43dc28d8a90e84c3b3e825550934
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8022bb5a2a7ed901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{83C7E461-EA1D-11ED-9DD1-6E0AA2656971} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "389929776" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000074b2d77a8e7a944ea7c282b9066208cc000000000200000000001066000000010000200000007b1f3794aab02ca05e7acc43220a43e59f998afb0f8fa4b6d6576f06cfe79e0b000000000e800000000200002000000082c3a1b1908654b97fb69b57b32950f91ffce14bb0d47cdf63723b120a77f89320000000a5c1210ff06ec5154f0878e531dccf607a9c3d71e062393fa7046c81fcfcadee40000000df60785c46f657fa90c4d4b2bd382b50ad280108f84db61bf3e4af1ff727e9aa657075d07ca19eaf8289d92d46a0060e7cb01d72680abe39d2b18fbffaf2cff8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1604 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1604 iexplore.exe 1604 iexplore.exe 1168 IEXPLORE.EXE 1168 IEXPLORE.EXE 1168 IEXPLORE.EXE 1168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1604 wrote to memory of 1168 1604 iexplore.exe 29 PID 1604 wrote to memory of 1168 1604 iexplore.exe 29 PID 1604 wrote to memory of 1168 1604 iexplore.exe 29 PID 1604 wrote to memory of 1168 1604 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\asc0ZnSw8AoUd2.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1604 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1168
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be93f5e48542c993b9cba05b5cd60ef0
SHA19a9828b94e4fdf1301b08f426c9d1f159fa9a903
SHA256f7b4a2a2436f913ce4ecc4a0ce439bd5337f972e04eadacf119cb8fb56b9b739
SHA512268093a4cd525ad486753ea888dd12d54daa9945032d77c131a1b15fa91629e0a7035e38cae2655f6f12c0d316f0e98613926b03e46965a8800ed5049a7ce0dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5942d39321e932200b1362ed8e7902506
SHA1a2cf0aad2fe5c97840dd2e59021a169194c2a3ba
SHA256c18ae8db518ccae3903bc53c169a1b6f4fe623068f52ec42cb838bf05f236b6d
SHA5124c54c0adebc59836c8f9719c24b0db6dc1a3169f4127f6a912595d52de725950c5a0adb527fae0d77978ceb194b442d1f7ba99180c44b6d11a449b23cef71749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9569ac43a3d240a7d3ffa5ead1950b1
SHA16d3637d0c4fb47d28b308d2a33a182cbdbf2ecae
SHA2561a57d1a216d4b878774a10bcd1a7e1a304ad0eefb5ffbca6c0d3649d3f3e1211
SHA512b5d7a67c44a8d7bba8fcd0f05d37d2941330d554edeb2729e6fd45782909ebd6b6f245b6d61be6f424f9f75423fb5f5fb165db4d75a1aa5780c76f2a09c8fbdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53349df29213262372a57b244b93c6ffe
SHA1d6405ac09ec468d834ac33e5076a6d108b9cc739
SHA256258ecf5290bc8f744ad91118a8a61cc2b0765b9902752c4c0f5e98354a4abea2
SHA512426a1b7cb11f97cfa5abe94856fac031d64420440adcd1190cec28188792c2d954367b2973cfe4bb00738523ebef3405fd374f79abcde9b9cbf649b66e94ec87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55863229117c72603f04765642b9045fc
SHA15052ba2a9b7490f6b93437ad8a7f0b315f19835f
SHA2562cc0ff26da5be1adffd4582f90da2006e39c985d6acfddb9eae9891fe8746c66
SHA512816920d69de893fc7b45718638bf8e0297cac9cc88d895510d6e8a519ee79ba166c27a5bcd3a609ca855693bc2f786fc0be73d000d8d05dd5631b7fdd6576002
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bd41b2947a9d44520066166b3c27f5a
SHA1ab1542947ff0c7629ae1cbfaaf829712d5d8a281
SHA25628c634272fcd3cb599f6c1669b27e8fef9a93792b6f63a773bc3a1624b729d98
SHA51235bfcf9a5a550b6fc652f1f74eab9f6f1d24f695c18a6e3aa3e858bf87fccd4bd9a1a199b4ea59b1a9ddf92301bcfef4454da0a29c2d21abdc7014fe14f50f03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0dc714cf4e53bcc072e53ba9e361f8b
SHA171f6c2865d418cff0c9962e39177ffa88537b192
SHA2569c65a80a0c7df80e2c5df1fca04816a7437d1451a227ea3c31ef0fafd886fdc5
SHA512739b6126a677af52ad526e22a548e8fa92297bbda35ef6584c2bbcd5de8a995471bf18902986a761ed5b6bca573066da31c4f16c558c68224c2aa2b1ccac07d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5460dacbcca134e72ef8199160a02b0c8
SHA16dda1da85973e923c8a728cfa47318cf2402fd87
SHA256b9a7850562fdf6f4c9341d470afce7e8e704da89f5b40021b2e0520453465b09
SHA512eaf12e939876d7573239312d6f7b7e5d04a69f4357627a22a50eb981fecfc06febd24a0e5e89bbfc4549156bdbf4f41b393810c50924cf55ad7f7474f05fd349
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QCNSQOTT\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
608B
MD5eaa95de9f323c5f3ec57eb6e292884bc
SHA161d197a6d3238702198904da52ca700ef0261bef
SHA2569914a86969dd1895c52a0ea1b22bb577a3c7f7752551df720f900677df00e84e
SHA5125b098fcb2c0f36eb4ea889f720b5712a95985962af3bbdc5b780d77de828fa04fe09f53efc7b71e808b7579fa443afb37b8c108f9d6b64371ac5c16894837b2a