Analysis
-
max time kernel
837s -
max time network
840s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
14/07/2023, 15:32
Static task
static1
Behavioral task
behavioral1
Sample
attachment-3.eml
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
email-html-2.html
Resource
win7-20230712-en
Behavioral task
behavioral3
Sample
email-plain-1.txt
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
image.png
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
email-html-2.html
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
email-plain-1.txt
Resource
win7-20230712-en
General
-
Target
email-html-2.html
-
Size
3KB
-
MD5
0e3b48fddbaf531c3cb92a45c570db6c
-
SHA1
08eccf5f4b81c156f52e4e5aef7b05b186c91b34
-
SHA256
b2ea6ab20ae0a4b02f76ea95cddedc3642f431fd8e6ab1a2347e6c16b147f4a0
-
SHA512
9601bc6c3fb21238add9b8d34e8176760252c9f43ce8f2c75b80b1f74f7fe2ee69393202756edc2181e9f20aeef90402fe2a146631ce4e2e2f22f79443e68e94
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B8B45B61-225B-11EE-8428-C20AF10CBE7D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d00dd68d68b6d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "396113757" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002a91d4b999c9854dbdd04be1b9b2202d00000000020000000000106600000001000020000000ce87d8e7868555a36626fce588ccb6291a724cf3770ead4cd1b1891c1206ef5c000000000e80000000020000200000001ae596ca88aa83272c08b6015a6a426060e8f46c5282c569ca25e2ee7dbf3c62200000001d497538fd6dcee62618bb8ab28875c428da459152cfac1a97d71c00bdc70ed740000000b55dd0fd00a8c693c2ef09e1ec68ff7f98252e1097a9159f9c5fa960439723e3aeb7bca2585e96912a4a7686f3c3e48e22010fa27f61d3ac3d6e3a912a524166 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2820 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2820 iexplore.exe 2820 iexplore.exe 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2932 2820 iexplore.exe 28 PID 2820 wrote to memory of 2932 2820 iexplore.exe 28 PID 2820 wrote to memory of 2932 2820 iexplore.exe 28 PID 2820 wrote to memory of 2932 2820 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\email-html-2.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2932
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5427e6a4572bf769dd2531109d7e25885
SHA1c1ec9fb4df25850831ae4f64afab3a89dd8c860d
SHA256acbc23d750446c0c521bad6c033f2b2432838460561aa16e4a093e90247c9c9a
SHA5124220c9886ea82e621d54a40795fa43d65db573b6b837fa0a876ca81f8499056c0f97b1d008a3dd947053da6641668475178fa4ff623b839748661bf56ca19a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbc69c4530560d5564e8d9560864359f
SHA192fc5f78ef0f25de362ce3c3f40b9d74d2742f55
SHA2566bce30467edf2c18005a96da0bb8aaee3de10dfc27d68f3a26c5e3c65cc40087
SHA51247e5781761884f1b803b1c014258f6fc082d1ebc4ae9ecce9bd4ecdd0f33f0dd4b6aadc9eb39e4c9ac1cf5bc162de3ad6220aaba55f8f8c591d74d637659cdbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f977be58b81c5413e9ac63f57e54848f
SHA172bb064297b17a9f98423d253e2c6af493f617d9
SHA25646d71d5fd9b268d129aa36239e67761403f5e275c0df12d2846373a55b688cad
SHA512984be33a104f619e76d18fe40d52ca338385871d9b0d9cb9ed6479fe7943e9dc92e66f812ab4ae5a618276fdf812a01ab6ed0c7e43ef72e3c0bce4f3de7f60cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5146d2e7e05a7bda20ee7db21e012ba84
SHA1c2c65aa527d089717734071843149c289d76ebef
SHA2562ddd12d68fbb11000756de08b7da3daea8eb97e25090262dc4a225ab3285892e
SHA512e8015fca4f589c0028ed17c992b3f518bd561527028be3faeb1d45a2bb97bf4380d25a3547226689e60e4495f68eeb78c960e02efdfc6b576583b01e70325100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535f904ba226d55ed3c8560ef9d983584
SHA17cf760e2ed386f32089fdae9c7ddf38fae4a00fc
SHA256283ee2de9d515c058f23d8e0f64ac77aa273463dc8dcae7b3bd71b732a8f62bb
SHA5125a120f988bfda84b1b79db285a39e59c9e8d8529d3db7999221bd3194bdedee1609cf8ec41e79f982b3e864c94270f5025c7156b95fb676df48481a81a90d53d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6d4bfce917ffa6cb26c53c190e15d9b
SHA1f1def4d701f158dec1940b68427c039cdf20ad03
SHA2562ce902d7e54e4a26fcdc0d3fdcecde26f75b4c7ad8d46d7bda65047897790781
SHA512fde5150f4a1cdadb61e62d64e0a139a18b67870f2954f2a6924a73f39b54e18057b4cdddd357b3d8e9a7a6644b5ece440456b9c34796083c962b5921a188485b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b9d0cc0060a959823408226b82fb6b1
SHA15607b44fe5cf45fd60878a62885c122d28a59987
SHA256801c65f598fc005379796f2e03eb45c8a7c30f371c976e18ac9488b2fb496875
SHA5126ff58bdf3fbb41bf6b0a6fe86060fa39c9baca055916a9f7648e2621b41f25c92cdafab2feab74213d77165992620b36d13d31557a52f17d904df255102d0d4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca7fbe589f0a692e275fd70ec668ad02
SHA1640407995e427a647a8cff7e995c2bb53d32b0e8
SHA2560c1dabbd6948828c4e039815ad1d9fa601542f7620f44519b71355e86fe9e909
SHA512ded2620382b7fc98890fad19b400bb08caa0a3ad1d9266b9ff23a646d18b3bf0243baa970c6c3c46354605e38e0ce9ebc14559439b5db09cb80944cde0e3d19c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554e3e3a188224b0b6536f9bfce2997ec
SHA1029398efe0dcbcb450d6c85cd4866cfe7bacc0d1
SHA2560ef8740ee90131163cacbc445bf2fc6d7412bbf386ef493c1e6880e2d74588ea
SHA5128525860c34b1f33695deafc5d16882c82d775697785c454832642c9df2b0ccce4be29f51c4821be892acdbd63dcc689945df35d998896e275e5a9341b4176d3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0eb5890387b82781e7b9493de762676
SHA145e7010ebd608b345c24741f3bb35e7bd2df425d
SHA256c98a7a984f60c8d3d68e0185e9a8eaaef38ad15dd8668e3bc9fd680d82f526d3
SHA5125b3e3fbf058a8635bf8dba1ce905c83f4e086e1ccd9a3c2af074f07977bedfcb01b6c4033bdf0d5607203428ca8e376948e9993dd86da7da6d1ae484d55ca661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cd0cdbc41835e9af02f694024b8a2af
SHA18d98fe53df9c1856a79bf94649a6b50df56c6e7f
SHA256fba6fcf690ff502ae585b3415f295c02fcaaa74252dddb9189d0ab01bc30780c
SHA51208bebf6e7c782e6050060aa06742770c2672669203e4b57486a9f9e354dbcf64b346ebe3a905f41d8b18617a09fb53b85f72a62d60a161652147177b40c8adbe
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\64WRFCMO\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
605B
MD58b466f126c76269285b2b81d28c0881b
SHA15ec81ba92647948bc8dceae9ecb0adb8fb638fec
SHA256241fa25fbcaad2481867fe177481ed60bf46f44cffc0c1e978a830e0a61aaeab
SHA5123658d126487314ef1ccfa56d24be26217f9de6bf94c7d7602c4443fbfd82fc757e8b1d1db71e1d3177005b1f79e9b6aa837808646490cc9d776a7a060b3e0d82