Analysis
-
max time kernel
100s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
06/07/2023, 18:37
Static task
static1
Behavioral task
behavioral1
Sample
Untitled attachment 00004.htm
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
Untitled attachment 00004.htm
Resource
win10v2004-20230703-en
General
-
Target
Untitled attachment 00004.htm
-
Size
2KB
-
MD5
54bb99cc5c1f71170185d332a2abc2c1
-
SHA1
20f25d1f61320b1c7058611e8c569874c84c23e2
-
SHA256
c5a695103bfea2f1fd6abe65764819572d95fe43d62f2f1d3d95182da1e5132f
-
SHA512
b39614041966586adfdc174cb4da92051aa7f1c5965fe6df81f816deb9668f387536e08ea361023e7a9d4b9d5629009f0b1dd5775bf5356a6291cc1f61efc011
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90412a1739b0d901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000079aadbcc12564442a62aad76c0e1e2aa00000000020000000000106600000001000020000000f38dad877dec1f4b8261e835fa540ae819da6eccaf323ce5cb2890b5df71c68b000000000e80000000020000200000007c8f3e9cef02cc5314d10c58daf96b564dbbfa4ee913d9472ae08418ea33224c200000009df1e2d14f54cbc30cab913697cea12514b135a0355335ba5221557d4fcedac24000000078bac37cdef6887d01293ec3448848bbcedd9708355aaee07b86c4c42ef0609743360c754ad60e1c94dafb3c78b4962273cdf07243dc97b2805e95527c243ba0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3E44F771-1C2C-11EE-AE21-6A6389873578} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "395433659" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2424 iexplore.exe 2424 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2376 2424 iexplore.exe 29 PID 2424 wrote to memory of 2376 2424 iexplore.exe 29 PID 2424 wrote to memory of 2376 2424 iexplore.exe 29 PID 2424 wrote to memory of 2376 2424 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Untitled attachment 00004.htm"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5162252be2be43128e467e924e03c632e
SHA160836654672f0bf855d9dcf696db121e6d74421a
SHA256d1615b7bcaded645b4ab6bb9e220e71eb6bfa3d8700f49421a9453946b9b3f96
SHA5123c8bf06b93d75cbd7b67666880643d21965c44261ab53ec8b8ec9e2e5ea81050834758839edc49b376eaf44d22568f5471be9c8718731dee6b38de0dcef73db5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500e36167bfbb8ddd83e81e417708dabf
SHA13b0945b3371b5e509a4069bf466e0da0269f4693
SHA256e7f467aca0263c5c17fe93299fa1d591b1b20626073a0d5ea7102ed5c607611f
SHA512c848f377dfbc98ebbe3c56d2f1ef48f6a57636fd027f01548cc5a57b36e063c209ee65abb1a90f7f714615a8683505f3e81a6e592a64fda75e8c85d5ded70c81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54aafd6e126831654a66090a2a27ac706
SHA136b22b77d50c4ffb7a4d89ec1a459d7217e4e988
SHA25638de95b7f1fe10102aa210ddf583ba81d341290b8481a4d7ef61ee70daf1d517
SHA512badf3ae8b5f2f6764979e20d39a84a7f2b5183878d89e51b4cbf74007fb10adfc80c7124c73ed5c0884d659c9e8caf05998efeccfa20e01d66247c23705e5a10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4b76a156bed114b01e133fbdd49b46b
SHA1d7a86d63f84b85515fd7affcf07d56577bed738e
SHA2561c7d83a624d11bd37cb511432abf3170bbdf4e08726c6cf2a2943ee55678a148
SHA512874a5238688d30321bb2fd24862abc7a9111abd070f2e92756ea9dd3d1c4bb8f8b14ad48874eddde98f734409716abd50e862b194cb08bbd1f035c9d08a3f369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eeba7405efd20ecd6e34dd0a352fe1b3
SHA19bb073d9ea38b461b962d50fea9e4bb70db1a5c1
SHA256d454d98da892b70c4ea5003bcac6a31d143516f2581d8a9301c3e7a97f5131cd
SHA512f0035d9e174f9d197f95a020e620206cf79aab832cd0e86f74f40084afe3fda4ddcef6286a9172eb5cd462b7d5b4153cf040194096d00b3764d318cc3ee0ca39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5795bb54db0ac501418f64fa4331ad6d4
SHA130d08dc7ccff6d4d702457309b6dfd45a8569f5b
SHA2567db8e59a54b2a3f4c217e1d662a53438c8e570bd9a206a46402f0f41148a21fa
SHA5120865cc5b55b2d56f2cfd8b4f681898b0a828d6ef7046ff5a0cd4aa1b910d8fa20ef39d0fd2941e406b8d5373c0b537a25f5f628d2398d5538ad6b02ddbe99ed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb3df17ccdccc264b5f5852e84db1ae7
SHA16cc91f2901e0989a9907bb5385af2cf9f1b1aa4e
SHA25652a65851cdec9eedbfba6ce9f6a47415caf0323199bf06829d6b721c45eafa05
SHA5125cb5e7f30a7ad4a323ae84013553e17ec6c8b23f1bf269cda691ca8b463adef60ed079c578e960e2f7a9434b533091d5776a3bd145091824dec284c377b4bd1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515576cb3472075267fc8e24dfb11dcaa
SHA18b35ab3ee79e0cd5cff3676ceeb56bf7a4818ff2
SHA2562347dc3841d199bff1300bea0ffc2c214cb057df54090fd13c340ab0e419a6aa
SHA512e9ff33d8cf06c4d0735ea4f0a0c40c00f7af6de4f53dcf871e76f87cb1a51c880e34df74e1cd6ac9cea02a26997732cbcc91353ca7a7253d3c988e7c6903dd13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fd57d71843829e0c6bc2cde615d272c
SHA1c42d86e2f72a149a3d86af3626713dd15157b38d
SHA256d1bd400ee38b7eed7bfa97a7da5279df8c027115e35b358ccfc2dc29c861a38a
SHA51210fb38ab7c61f18f1368c393e340e8f180dea075b793fed3edb10a7509ea27702a32114c8fdea890dd4d64fc9fc013076092173b5940e955693adce5dc15271d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8DEHEN72\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
601B
MD51b7b54bc0bfa604c1fc8316f9485434d
SHA1fd0e79567aec36ceb0be1da500cb5aceca8db734
SHA256e56a8c79cb1ab0ad7e15697015847dad359bd0cb410da2393715bb32824227e0
SHA512d83472fa77ffdfe1b5383d2be23e777a99fd6db25334066849dfae9d292f109cdc09e353a73617ca8f0778b5735b2b28673f8350dbc06cbc4524abee2887e8dc