Analysis
-
max time kernel
67s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18/05/2023, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20230220-en
General
-
Target
sample.html
-
Size
255KB
-
MD5
7cccc9f031b796d44dbf0d41c4d333eb
-
SHA1
9ab4639c5d41d7b32d58d7e131d561b30fbce3c3
-
SHA256
2421e63f870d2c8e834d40fa2492aa3b87fc6398fe9e49ff178375b9c31d4b5a
-
SHA512
e349f4b5f287cae1013e630398f19219273fb5629a24d16efb9688e5494fdca5b7bd9da69736b8cbb75384af8982d119ff2a9165e852a138163086211df87950
-
SSDEEP
3072:9/YDqiu5PoxjNph+CoPHQZ+Awu88p1oFHbuaSYOt+h230flnSB1:5YVph+W1
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0643b568c89d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "391181312" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7953A511-F57F-11ED-9E5A-6E0AA2656971} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fba6cfbdd4578d48a4e75475bed73c6a00000000020000000000106600000001000020000000b627e3f49b25299b7f442a94fac8ca560f782618d1d48814a0d963ddbb007dbd000000000e80000000020000200000006a2bee6f7d8714d00b5cca16726817069930b65a59d1f738ac7233aec8dca4c520000000486f2ce5f407700e955fd1d2913b7457fcbd87a03bc74629053c5429156527ab40000000cf10b4ba3f3b3aeb509f6c3f1f4793a288c851a89357d675c4197db2e7530029f458532dfb5485a7d741cc27ee518c0f1141f0b135b3d5413d3791d53dc85544 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1424 iexplore.exe 1424 iexplore.exe 292 IEXPLORE.EXE 292 IEXPLORE.EXE 292 IEXPLORE.EXE 292 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1424 wrote to memory of 292 1424 iexplore.exe 29 PID 1424 wrote to memory of 292 1424 iexplore.exe 29 PID 1424 wrote to memory of 292 1424 iexplore.exe 29 PID 1424 wrote to memory of 292 1424 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:292
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5759689a9e04c91c16adaa64161846d72
SHA19bf3c81856832f4c2d77617132c979a841fbe871
SHA256604caca131e4f9c2755a638aaeee725da7b1da8de8a463c7bb661ea1d3f5231a
SHA512b78b71e9e943a9d0c4b21a71d5e14eb9dba78c9a2882a8b6411716be43d91994e8e08d19eec1a5482a8a6e11fe3e22074642467e2aee3159d7a2701557ec34df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f7df8017d87adeb1326fc4beea65c19a
SHA1be9200eece71301b2f878c336358b53a3f978676
SHA2565ab279fbb22717854d7935998df9f16edfeb7dad7f55d5d217e2e270cff7ee4e
SHA512476fc0f164a920929a95f513b404e2699780387f89e88ff1d847cd622d25c15f8a36556a36542182c57bb6c68af2638b4552fcfc4691b5aa13bb9bef60b4a238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD590021c733d6550ef15b22b586e06ada7
SHA16495355f5fd006035095d284f8f488da98ad418b
SHA256f40133c5c40a53ec702eb7da7aab9bb68f31d340e85b1078d69622d0254be2dd
SHA512824b05df2472ffb4b32f6c75e7e3ddbd0744d15d61115005c080513ed675b780f834c336fdaea814575a9cafed8ace87ed0ede95d3d6ff94d4c9a8c1294616b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d17db2bd81c94d6dfb419c92c6fe9008
SHA18c7b8e98ca7d30f770b56d8d4ed4ce8f6cc98da3
SHA256c8e5610aa614d1aa3d0cb0d6817a24441585c8d7400dcc7b6003e1d65343f9b3
SHA51233f97626556e93143edcea34a340e3aa0b4d3046d43529e3fa8152a06c3bef0b6600056394feec611ca90a0a7e2d21f3b80411aa67b789729c75a3613b433429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567a771ecd702f0ee71e33aad54017320
SHA1d75b6fc97d068f7128312169c4b0a38a2fb826ae
SHA25673bcda0cc734c3d291b142323ea085141cba5b1069efe7394873ed7b5a640ad1
SHA5122548f2cd80b19692a1bb365d75f7befddb63f1a673c02002bffafc1bc3b1ba7e9782531591c03c81a1d6ce150aa9c1dc39b46b0481570fc164f7e9ff63121c22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595638ba0523f08d5daf40704ec3bc2b8
SHA114a3d212f75e27398f2627658b67755ee8f52b10
SHA256fd12e336742035507cb591217a0c9c8e5de5e82a59762065438e888e99afef70
SHA51272cdb3bf9767e8fb9aaed17a0a5e3c7b0eb78b4d54089ad1812108be658109617b7f9952d09c780817a21a7048e80fed1fdffb66fc080bbbd59589e5bbcd520b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556b2b89b9d0a5e08b7df9327bcacc3c0
SHA13c8aa11ba749847739e1e49743c8efa29de12f5e
SHA25667d2bcb849eddb10439e3e842f80188108692d8ac9c0b3e9a635def6478c3c0f
SHA512616c5ec70aefed904a16bb6c7314fe64f00aaf91f84f23844b3d425cbd5dd49677b8f9d258a2c85491f90264f7833f59c56b30e7e87ab73f8579f1f1ddd4405a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576b6b80de0217540a8dec8544d8df06c
SHA11878058d527330f591f31711f05a5464e42cf664
SHA256d4000742cb7df3b6bca4b88e51a55e8e5223526a434c669499ff0ce4c055bcb3
SHA512d5e9234c55edd9f5e31055984360ef7dbb0dfb8ea0c43fd742b3ae746ead9af0ccf35881ad4dfd06355dafdf9a921724052d20c7038930e1ba908d7f2f196ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5112123094988ea846d38a3009963571d
SHA13bff8b1c9986c039a3f3adc588d9b525c73e41e6
SHA256240af8635d08af60108863e69afb9a66e0fa76b23b045857c74498b9cfe94db2
SHA512b06951915a1cf25aacf549591a4f008f412290967ee830475e94a1139465664c110fc2979af42acf3991c94d5bb1825baa577bd1dff9df1b52f0bceed3bc447c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528528b52f8bc14e091c3e2e2567b6709
SHA1bcb813f269e2f4185402f755a95144c20102b02b
SHA256f7c2f4710c15a1c87e5ef14f6e87ae93618336ce0d59b86a395adbbe74e64ea9
SHA512dc5f578c53326f10da3b50485712d514e4ef33b2662ec12317b9dfd62db7b2eb2860cc8778982560b38dcb4c8eb0d67584b1465990a13dfd27a43839105d166c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509ec6c2e39ac5466c14ce429814a6f64
SHA14b3f7de22e2602ae58abe1ba0c0757ef1f7dd9de
SHA256d592a7ebc0ba3402115c5c5a7c5a61450b67cc732f5fafdd5439242f57ec5eb7
SHA512e00a8255bdd3540f46877349578c634b4431f1365ff73927539be8a16adf49c6398a601ebb0d3f3984f1f79be4a77d8f44ecd62177fe34e7c37a3190c241ddfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52604727e552e508cab436f22eae39f70
SHA131750912c7605566499ae9a04fac53af3fa26383
SHA25662dc83247e86b388e69424da4432e9ae9ed6d1006ded896f6699e6e8fbbf999d
SHA512cda35d977249e77fd6c4bbe140afb568ae3fa414b700e1cbc5491de33b6df43ff7ff69fca67ae8e1fa26d00c284c1367651a6c3f2964c5b5aa7e2c7f1d32d263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5353bdb70b104175a712c6157351a27ac
SHA1ac3b83f922b1dec7351057fe0b0ce12123e6bff5
SHA256ebee122607aae59a39d4963ecb8eb952fba4dc98692b9a50d46611d47e925af2
SHA5129ca29f72559a0fc17dc836370e9cb0ba2a2e4707d0dcdeeb4d15871969322246a7c18665e10327b79d4e743823e2d6dbe989c0294f9bfc969afdba0b6a797cab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc28c376bfe8109a253f9fef468b6cac
SHA15c1d00938ad47014f7169e6e394e28792e6e238b
SHA256b5d9c2b02962324146a1387be391b5d54a660cc418cbfeca51171f37668a65e1
SHA5120ba1d6b5d71ecde1b9ab4e3257dac74e7028b9b16d52e6aaaa9f21c6961e03dd684416ac0fd52796b424858ede9864163aad222efccf64c5a480683dbca8a599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe0da44fcff6ca0c6344d2a78d332753
SHA11ead18d7313ede3446fe678e779749eb3f337f88
SHA2566f14d0fce31f349f1fecbf392de5c9efa7781fedad41446af3e4e9d60fb65f74
SHA5124bb4d3d0d914a6a663f404984b6cba8dc890fe9cdd10467f1c2b68db8d704182156571787fb5327ea05fb25b9872a8169db97c9b4db401bd5c860ceb3a3f015d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NMXH1C0L\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
161KB
MD573b4b714b42fc9a6aaefd0ae59adb009
SHA1efdaffd5b0ad21913d22001d91bf6c19ecb4ac41
SHA256c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd
SHA51273af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
599B
MD5bc03feb586c588a42557c213f6571a95
SHA1c22df5a0a2f879d276e60b26a3b05bf34ca97e43
SHA256b101d5954fc97440fec761b937134671e027606614c0b14afef3f29f4e142bc8
SHA512ea29a7e83b5d00d6decd060635dbdf8c2446d3f64e54004d5d4c5ffa2abe0b9a8b4f8ce21fbc95b9925608c573fa60040923431e8c5d5404e7384ec8efb70f8d