Analysis
-
max time kernel
144s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2023, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
PO-7ab23 for [isabellaxls.html
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
PO-7ab23 for [isabellaxls.html
Resource
win10v2004-20230703-en
General
-
Target
PO-7ab23 for [isabellaxls.html
-
Size
3KB
-
MD5
4d772e61c6ac7e3e1ec139411653fc8d
-
SHA1
408d80d1a621adfe94efb0bb92c0b07017be71f8
-
SHA256
af7fbe5f4fc869e506804f55b2ca0cfc4901c9a383621311a6376754d415b02e
-
SHA512
7028695d8aadfd360d28ca4bda3fbc93609e7c312591b55089902b4a821265df921e15beb97f23f2399edfa34196494671ed455ca470ea24f8974ba76cd43566
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eb4bce00ffaaaf46b42b39f311b0211a0000000002000000000010660000000100002000000013c974b2ca686dbef114c8b548ca2c3cac20488f04df8e62858d47f8060eff2e000000000e80000000020000200000002b36f73461a288db952ba432414a419f01609e5a92a1bf95f976712fee11521a2000000056bffcfc6404254b2602ddb74216685db2ec4cf75e0c8ec578d217291b81cc084000000009913715710453fe7e5cee2b355eea4db146120c47df3ee9099d054218c8edee68812e55094e809a906b5438aa7987e6405e5542d9e822bd68975282212defb8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{642CBD51-1F5C-11EE-9095-CAC76BF7DD72} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0b4f33d69b3d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "395784192" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2964 2872 iexplore.exe 27 PID 2872 wrote to memory of 2964 2872 iexplore.exe 27 PID 2872 wrote to memory of 2964 2872 iexplore.exe 27 PID 2872 wrote to memory of 2964 2872 iexplore.exe 27
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\PO-7ab23 for [isabellaxls.html"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a818f78b82f4318262ecabef1e834a2
SHA1a3a16aafbb26958f40f6624a77e9c86f18966cd9
SHA256bb4b57d00670d5af8ddf8b20f46d5ee3cc304c1542dbbeab4c2e05344148dd58
SHA512d3e138a5bcf8d6194135be21d820387482fbc24d87ed13d7e7beaa2a266c7c7343faa548ee022a9e6997b6dbf7e0052c76b27947d49f3d57ce828c0fe3df5fff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503bb1569fe6938ac417ecaf3d9789d02
SHA1671646ac750655579971d4d8ad0cc7bb032b4099
SHA256157ad4f9986df331823b6755db89638aaeb4051bb3db1913ebff65bddb08a9ae
SHA5129274b44d7b72d77e2169b4afbcee5576b8a315dc9f99d72d4e172aabbe61d2aea5afea325f4b45d6dc899315bbd3aa2b4da70d8eddcc493efec24f541e57b092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a07b093b4bdd4dc566ba499bcf9f1957
SHA168751ca362c8b8af0103ca312e5f1c52c9a76e98
SHA2566675c30cda4abcfd1d1b18c7a41955f8f7f6864f63517def4a3976a86baad649
SHA5124e7509d761bc6b570bb6df93572cf049f2ac7fa99b5d59cd636991e2e269db37f118d8320969e45a6d571e286e2cf9397c97faf2db8e5d2e0c9b93eafcb4c72c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7b022036d5606f0649e5fbf347ea372
SHA1888a4e8ec56d8fcb9fe81faa736821e764665534
SHA2562dc7d95239918b10e151a7b884ebaa5011bf9f207f57504fc47332c63e079339
SHA512c634df5b008085ecd080ded2840772866d37812181e72fac8e280dcd932bb4fc3273f8633896efb3e4e1e564ed40e28c62e6aab3589094b8605aa812a60f6163
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52aa19f54e918a27dc70d3828e3760f44
SHA162d8ede6b487d70aa9ed21126d4bee439ae0d213
SHA25663a991050464d087961e8f9c6e9eeeffa8ce0ddafb3013b9463ab082115ccb33
SHA512bb3c0e6db390a4daf95392b6baa2d049b38da50d1d11e1e1263b386ed83b847ecd98eaccd2d0eedc00a4d35a34a1268a24af860eb67ac5d254b61d9c29d12395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554ecf2a54e934326f68b72abbd71d9f6
SHA10b1884eff137af2b65c80de69faf4ba79cd66299
SHA2567fd118226f142d950ed564525dec10115ecc5febb45bc67849755ba5cb7a45ab
SHA5125abe05f8024ad5a1f01976db18c03587c8de2f285c6bca576fb93cadbf0b9f66455c245a57fec585f00fca54b7d05a3533a3d8ac291e5eac4c46cccc1ef4f9df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d074174b7b9fbc67f0449fa2a324a634
SHA1e53497daae3fb3dcaaf14485306d2bb5454fdb10
SHA2563a03089011fec165f5c18971c4f04a99d831b96d48d70dd94c90e56251d59e8e
SHA5128b0ee1cb0d3cf6756b8fbc1093a2774a084c417c98a830559bcd84355159fe58a5afcfa43073e37836fb68907497af36f4248138da407d01faa15e2a443faa61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb9afe7270c1fb19b1681b01636ea2f3
SHA16041e37920f2086d86a25e31ea63b570d59ce8e2
SHA25625b3bb7f2fe0718ffdb651d415de398b939eac7252466a9fa420d84964b0a683
SHA5122ce68d81ce1de21aa36c76bb4661315d8116aceb2adaba775bf34a709ecd654e6578f814dfa3a70d429921c8fbebc45f9f0d22e062b792414946b80093825ff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a27fcb759a3a8b863d5b73570451ada6
SHA1e0cb59c8bfd35495dea3bd94ce960343ace774a6
SHA256a5e98812750ade1b51e2ec38887fc9d922c471a780e2dfd722570cbfeaa547e0
SHA5120618c2de8634bce4adca9e076338c9414b8fd40a2b2327a618e9b7e91e8901a23a3852d2bd6f4c1a909b565541550c8867e5a489cf80af2df46611d2a07eeee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d60cc411386ae1ea6b70d40c704e2325
SHA1da4f796d2fa2110b621053775b1a658b881be992
SHA256a18260e95da0a4492db558ffa467af01f226d23f15e94f71033f6385d8a9b557
SHA5126a8c88706a9967b3b77851d4b7b25840fb2bb037ad12c0a03197dcdbba6544069fac54f6c50e6f3b84e85752ec6f84102cfc5f3c9d59e670a05ce9c473225134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c941c893181867667f9584b0d5765d60
SHA14977705b6c2feafc136788fb96f078b8099724ea
SHA25673a062a9949735f7398dba8e5116ee73d8180a14bff30e8444d66c0702f18472
SHA512310e21ee7332acd6f9e06f1ce14e5be1cee664104403122ff0e97f269c9b052e5b6791e59678f0a7b8e46dbef8dbf5f49157964a9cbecf5a08b2b8b42fd4ada0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5I9HDCK2\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
606B
MD5a96b70288b4b99296d9b1d75bb54a9bb
SHA14af84cbef2a9e58b2f45ffb29b60f8182a14d488
SHA256d81a9947eb6a5d41f25788994f77d6034a08cf40427db08d3484ebd48bd64dbc
SHA512ffe98e573bf49d62cd162df39d93502a4a16d0e158ccef62f51f759492edf2309cb0a19d1f42535fb21bfda53e25a264026f9e02d49414d50614c08c981debcf