Analysis
-
max time kernel
127s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2023 20:30
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20230220-en
General
-
Target
.html
-
Size
3KB
-
MD5
2171357ce512462d7f5323790b2199d7
-
SHA1
6509bbf762416eb4149ed36516d6c5484ce50c68
-
SHA256
17a06dcbc95b0843b1791503b33c0774e11481a44043d2215ba055d746539872
-
SHA512
8b9d4d9cc82371f191061faca3fbc48519b9a85c17fbead948cc38aac278e1c772d0362d620da4336115f814fda6f3c53091fb2afb030e21c7e09d5c492e697a
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000074b2d77a8e7a944ea7c282b9066208cc000000000200000000001066000000010000200000004149340a1ec0f0e1ccdfd117d851c506dccf0bdb60e139605ecd70245f3446a7000000000e800000000200002000000003502849ded1c46a40a9450598533b0e21a671c7435675789ae99129f89031ab20000000c14ff749610b8adfff05d129da432d1933348e1ff43c38689ae14d19f6e6809840000000e3f1350e3f61d181ddea14578ea59a345bf0677c1d45a8955f8a153709de2f91ea4fd6c9d5f2ff05cf0c325960e5c24ba26569ba51b9c77987d04617a2048587 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "390177213" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0589921-EC5D-11ED-9D2F-CED2106B5FC8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2031b9756a80d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1476 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1476 iexplore.exe 1476 iexplore.exe 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1476 wrote to memory of 1528 1476 iexplore.exe 31 PID 1476 wrote to memory of 1528 1476 iexplore.exe 31 PID 1476 wrote to memory of 1528 1476 iexplore.exe 31 PID 1476 wrote to memory of 1528 1476 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1476 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1212 --field-trial-handle=1332,i,1725731530175171631,5783895698415372383,131072 /prefetch:21⤵PID:1780
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1464 --field-trial-handle=1332,i,1725731530175171631,5783895698415372383,131072 /prefetch:81⤵PID:904
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1628 --field-trial-handle=1332,i,1725731530175171631,5783895698415372383,131072 /prefetch:81⤵PID:692
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2224 --field-trial-handle=1332,i,1725731530175171631,5783895698415372383,131072 /prefetch:11⤵PID:1548
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2328 --field-trial-handle=1332,i,1725731530175171631,5783895698415372383,131072 /prefetch:11⤵PID:1604
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1768
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1524 --field-trial-handle=1332,i,1725731530175171631,5783895698415372383,131072 /prefetch:21⤵PID:2280
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --mojo-platform-channel-handle=3620 --field-trial-handle=1332,i,1725731530175171631,5783895698415372383,131072 /prefetch:11⤵PID:2352
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3800 --field-trial-handle=1332,i,1725731530175171631,5783895698415372383,131072 /prefetch:81⤵PID:2420
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3908 --field-trial-handle=1332,i,1725731530175171631,5783895698415372383,131072 /prefetch:81⤵PID:2428
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1768 --field-trial-handle=1332,i,1725731530175171631,5783895698415372383,131072 /prefetch:81⤵PID:2784
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539a15e48b9e560ba380bfe84d162e25f
SHA1adfe063acbdf463230d8d210e1ed7aeba7561c3b
SHA256a23bfa5e4036d854a6f045f5382f9bc16fb27644e48e6dd03143390a7eded46b
SHA5124e320fb7088e44d748dfdbd459b0d4711aa41fa780629cde09b763ebb184c53344ac8abe505fe0eb573494fbfe00340346ee37e37109b57bac0f14a63eef838c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599a5f108c354c61aef8c1d9518fb9077
SHA1497a02ca485f7b8f8af68001a7de82f31801cc82
SHA256cd3d1c81e0980cf5b307804199e23e4927113b3508e6995c24fd1405c0440eb9
SHA51240b59f76389e548a64477d45866dda6eae93ab78ba58c18157c067f492bd34f7763f11443b3730f909af2ab26f686481d66a446f6010b5b475dba38d28d30848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb098dccf2db3a46904993a68b8e7a25
SHA135f5d91d09c345bb24fb4d4111bf2f4e345d35a9
SHA256d5850afb8d6f75a0fb49fe7bac5900ea50bf3999434f277fbc75529ef86906cf
SHA512145eddcebe20383f782c68128be48a19c1444f0622ec174df39265839461685b7403fca1f08b145726be0bc532ad559fbdb9f2565cd539c487cd51980a84c290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea3bb105b813fea9a181e732a3bcd36f
SHA14ef8a67bb8e1bebb6ce4773e3a6ca1ec8dd70afa
SHA256a5975c20d09ffe3adcd75c1bb797747f1cd1dade0447b2db02b6fdfec12b18c1
SHA51296583b49e5757f942677e6f693db75fdffda8fa15a6add816b68920b5ef664d3d577dafc5d81d74d9c860a9c11856f61eefa447b8dcc3a8a5775cba7a625c692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e607e53550743b4ea20f999ad37c2aac
SHA1ea06b778c105c00627aae93449003b01f83780f3
SHA256c1731644b38799faaa7ee3ab1143af130eee96655ef2629cfb49f6bbd28cf088
SHA512c1a848f59a62085bbdbe93028fa2b07c0f7a7dbcc1f201abc44b26d0b83decdd5bdabfcb97577436550fb4bb13008b9a183cfd7d15eba782ac98bf3d5a89deff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d650cc8757c8ee9166587be441709018
SHA11c2b114ca90a98e2d05a382c48bdc672beb4e69b
SHA256ccfa2a20bd882c07374f825719273002e4f344e51140ebff49b5c20ddaeae9a8
SHA51235e9441ce0ce7a5286aa61f5e8228880786173725a12a90c5c5ad82bbe6e05456e7e55755aac0db19aee7d013ad0c606e582e29174dc5d69dc8d1c47a1e916a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d19f161d4b2fec37e815025e4cec270
SHA1aa732a1aa66a9ba1fcaab708196fefc2d9ac130d
SHA2564c89c6c4a0b22aa1fdf95268d50038aa4db310de5a63d296701fa450bd87d056
SHA5121737c5174539762748e2e98e31059ed993ea741e4df025b0d9dde0c36a754f4f414f53f3c0ea80613f3a40b9d5c60b42792934e371083c9126bb3a50abfa433e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54df4d0d8b438b01debd3e9320cefd550
SHA17daf1801a7f0f13be99eb5ef7a7a3ce6cb9082b2
SHA25667b6d67c67a181dd546881f9bed33a83f8d5eb8ad2693797c4139244a0e794a1
SHA5120e187db3aa85eb53813593969e8118b02d19a805e7f9e5c0c10744b534c94e145e5a5d8563d6a5022d8f518e16e158cab90a39ea0febda08f4fdba29c25587f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9d1614a51cfda3846e4e5e5408b381a
SHA102e787630a112465ab25247786654116a81ec9d8
SHA256ba7394168169943564bb6685b6c5c7d2e3636dbaea960a8f554b8d7583264af7
SHA51279f10c78960e5d4dfbb3623a739317a2e0d9632af640c34b6e1af087ab19acedd70b48023430c03e9b6426fddeb6080bec761761289c7cab5e52906ff8eab59a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QCNSQOTT\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
608B
MD565c56beb04648a653c1bf4955e8d554b
SHA1cefad79a9bc9c92ed1e3efba8538e1bc62eacf2c
SHA2564c80e93941b18c3869316ba2b56c6f20aaf838c9c5da26ad4c890cba7228b2b1
SHA5120c3e03efb5c29b8cc4a4e1fe5f30fa35eeaa76b496b5eef08d06ec6f20d1e9dddd6b84cbc1ee4a33ebdee93a552239a3796c45e2314f48e59c5b6ebbde2218f2