Analysis
-
max time kernel
112s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
11/05/2023, 16:30
Static task
static1
Behavioral task
behavioral1
Sample
vPOEb.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
vPOEb.html
Resource
win10v2004-20230220-en
General
-
Target
vPOEb.html
-
Size
3KB
-
MD5
e8aa928602da4f4a4d0b4a920aafa660
-
SHA1
630bf25bba124b866cd164996e1c416828de004c
-
SHA256
ef7fd83a2da03d3e39b3ced47e0189008c65bd6131391abe721a01b6412a08e4
-
SHA512
4200211889dbad661dba087a63d3e0a6a8398f91ef74b80109ec5faead16885442f26ba58a26eaa54cd2dbaae747eb33df017a91e0cb155b154b797668a3f693
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{03A8F891-F02C-11ED-982E-C29BF59226D8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fba6cfbdd4578d48a4e75475bed73c6a0000000002000000000010660000000100002000000091a6a0443fae52a405bdf588aaf4b70ff65bce5befce965862a0678dba6ddef8000000000e80000000020000200000006b7442e64e29e77b29f2d3c6bcb5d0fbfc1126e07bffc97c510ee23ba6cb7a8a2000000012ab8ba2c0cf70be0425b4b136a15ced3dcf70ccd9024762364ac51eaf8058ac4000000092e2bde12425781615569112dde24868ce00a03ae8bb253a8aaa62177f91542104894046ac2fbe23eb9e06ff9d43a80c0ab9452cfd3ca43b0b956337354149ce iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "390595726" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4010d7db3884d901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1356 iexplore.exe 1356 iexplore.exe 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1356 wrote to memory of 1928 1356 iexplore.exe 29 PID 1356 wrote to memory of 1928 1356 iexplore.exe 29 PID 1356 wrote to memory of 1928 1356 iexplore.exe 29 PID 1356 wrote to memory of 1928 1356 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\vPOEb.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1356 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1928
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5da98e5e0727abc92c1cf9b507077f709
SHA1a7a4f1f7542cd2c6408a68a1bf510e02ec144f5d
SHA256ed8fb64e1e6d6e9c32dd9fa35f12bd345eabb4915129e374cea33c814cfa4986
SHA512c517cee5b7a2ed193fb8d2f6634a160fad9cf886e5841a4042908a25572330ae58155efe832053b6fec996d724f6717539c808696838197e5830ce0931057fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5120222e9bd7c758cedabe86a5f3fd0f0
SHA154a94a376246a3d0e73953b0635e109130972b8d
SHA256db0f545e808922333e8be4bfa421164d39a17f3a22f0e49f5d14ac2845b27c0c
SHA512b31af987a6c4e469fad3bef76639982999aa1fc00e9f7604429522ef080cafee4b0476e87fc36394e22184d2dc021517cec991a7e9124f5cb27536bef09ebbc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d19439849dacea9f0c1b91a05ce27062
SHA14f4f92fd754aff8c70a2cad11e7f15902aa75ca4
SHA2566cc95b06d30f9e06ea4e8b7ccdefb5e7fb1c611014bd2c5225441453f7ad5c0e
SHA5123e1c270c47b6331ec9dbebd62c06801aaea754519db29650d2bc2faa583ef32bb5a6db1d8fdef0d5ab9f05b0ed7bc73b246b8137b7ad95698a7d72e68667d8f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD552749966ef4c80156beffcf3adc72763
SHA178fe686f6b93d8ceedff64c32c892ab7a561fc10
SHA2567b36f8d35f419a7f06f1c957c7cc8ac08bd816100e0bab81cd095350a0c76433
SHA512f6ccae1fb0cd15ee0c528bd07b7409972b8bacb93cdb4025003cb4f1fdb424edd44679072c247686ec3861749a3f6b8e129339f65939e380e86529d74624936c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e4ff1bc7629572cedfcba979e5da8e09
SHA1038fd4d6256de0819444b64bcbc9d79f00a7799c
SHA256abb1285ef928675af8317660d095cf335aae8fa49645cc8065149cb47058dec6
SHA51222a5f091ca44092cd67b8473b3799925a23214ae887e8dc0ffdc635f1b75e121674b6f5a40f735636177609ff7ca68ef9923546d145ee522553d48c85efc78e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD579252fca81e9a51603cf72e02b56aacf
SHA14d8219eddd92d4512d807d7e01ad9be7089df288
SHA2567e3abe1d7a1837568700cdae5de970a5266f3af45469bc0752496aa1badbca6d
SHA51242a46d6a012f89fe360ee4fd582b6356738993ffc9062052ac2efff42e99ec1c405fb25c821544f6e09223b922be7af1cc300a7ec5f95ab55c85480e0b385c8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55a153746c7790a6b9e9ffd1d254e52d3
SHA1e46eda544bb9aed2e601d7d3557bff7766650bfe
SHA256a479a568c6a71a109e43509d314990424fe0ad4414a31a2c6c41ca35396569ef
SHA5128960f0e8aebd3cfd8748337d670cc7dde7b626eedfc50fdb847a1d9ecac14a3f893edbcabd72512f05ce850d49ca7e9436433990dab605f9d578467a0afd0038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58aab42efc9a6488bb2e25ff3c2a0a016
SHA1ab95be9313f573cce3a059f2a1e402f20b897824
SHA2563b41bd03f23b2b7b199d7ec1882eaaca15fa8871d7c61d1b8ad86c3d059a409f
SHA5123f5a8c18cd548b8cd18f0666ab911a4ff1549057f612356e3bf415a3fec3202830d95adf9564b3a9507d92f003e8ab011d6dd9bea6fd87bfc69efcd5fa08adb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51f6106aa95cd27ba1db258c330a265ea
SHA1ab90a128f7f2fa91c101791583609237d7a59ace
SHA25665248be775803f1ad0bf19722ced64eccf78d469da5eae50937f7bb351eb09d7
SHA512b3031aa42cd95bfbe0014a1cdb9d5708a46fb5ab8647c495f72f07c893fd54356096c9ac77239892502ae141620387e22429309ef73fd2f9f7c6a2da9aba710d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ACT9UUKV\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
600B
MD50cc6f918fb5f46dfaf3ebd1ba8bc68a9
SHA1bcdd80143aebd4f97887bb2c6c3f10c6bcb81924
SHA25620b2626354759c96c6e72b5ff6fd652bd8fbbaa047730074b59d5338f92d030b
SHA5129caf6c7d54b49b5ebf9a1c9be59fac7437b5e5cd60e123e81771cdfedd37da6cf53e63e86b4179a5f5cd826ad774c6e6a6a17849b98ef588ea7f01e3ba6ea3ed