Analysis
-
max time kernel
134s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
26-07-2023 13:39
Static task
static1
Behavioral task
behavioral1
Sample
serv.html
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
serv.html
Resource
win10v2004-20230703-en
General
-
Target
serv.html
-
Size
315B
-
MD5
a34ac19f4afae63adc5d2f7bc970c07f
-
SHA1
a82190fc530c265aa40a045c21770d967f4767b8
-
SHA256
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
-
SHA512
42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "397143747" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000dfff1b3a562844db5bcdd926cd8279400000000020000000000106600000001000020000000a88a736403bc7a8cd44a75b4e3b70e939afa907dd3d1f7b7f0d9fb3e3cd52f1e000000000e8000000002000020000000f57f6d85f6d13307d9ddc9c2482d1f1e90d78d81493158c5bf21b1159b0b0c1020000000b86da7084b07f92483db6cf2d84531a922aba9e8c33bb9829023ce609ace336540000000caf49c03f4db3ff54eaeb4fba10e621aacb9d39938d5ca9b94d72b56cb433c6b98c775f682b7fa01a4f3abbb832e01018c8810b255f175ce06f74943a87f2928 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0333bb0c6bfd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DAA39DA1-2BB9-11EE-ABCA-72E7016CB537} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2636 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2636 iexplore.exe 2636 iexplore.exe 1684 IEXPLORE.EXE 1684 IEXPLORE.EXE 1684 IEXPLORE.EXE 1684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2636 wrote to memory of 1684 2636 iexplore.exe 28 PID 2636 wrote to memory of 1684 2636 iexplore.exe 28 PID 2636 wrote to memory of 1684 2636 iexplore.exe 28 PID 2636 wrote to memory of 1684 2636 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\serv.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548a6bbb8f18c814ad2b26bc313cdb613
SHA19900c88e9e9305756a8fee430388fc5441a77e9e
SHA256827c708f70731716f42c9cde73a9541b46102891a82d318855802f46ea12de22
SHA5122de6a50d76d4cc7852f218456243bd76fe676d7d41c3df1a16e9f37cfe4fad12ead5b63078a9178e047c5c172c7ec8461462aebd74357172f09c8f11101e8200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bdd93d8d1404cab24f8ce96ec1eb2a1
SHA1bac0716905ecda31c09aa89058da22ccf34ee23d
SHA256c3b607f3ba5183e5025030c398c84eb8f0b3f01c98dd1e59e961aff5b758a209
SHA51220d422eaf74bd2735892cb3f23d9c1737d1c6b94f75136222c7c9968485e348e4b9fcb3be01fb8b4e85c46c3158a8535795d5e78917df011c2fdc304977094bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56341e10d45ce011bff73caf98c06562d
SHA18b06363f68bb8174e7e6eedb36ea45cdf89d6f12
SHA2562f2eb0ca222ae7796caa11116d51b97b27acc86202a196dbb28c065fe0276903
SHA51213b9b7f2ebc70c394e52be9b6b0997edf1533b0c02da9e8a27241bf2dcdfe890629ef9a2da01c7d6afbda16d31f178a8e769c8720291bc4cc73f163544f0552a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a984b3f24cfb603c7002646e5db2748
SHA1e6928fd634b95201825f47cdee29bf50958c19a1
SHA256e957193a4f3fbe6b3e1e82316147e4431732f55f61d93776ea308769fea9e55a
SHA512f964632287d24999f38e4540bfd308eeaff0013b2e95f8728a5849416470a72024688337b72f5cbcaadccd11fcf2628978fe4061002395dcbae656bc02c8b59d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d6364bf47b72f06ddc0aeaf35b612e6
SHA1b053d4d5bb57ccd7f80511eb3744b316f669c5d6
SHA256c239df0abbaee558276f36a4895f8ab71193e6b06621d4f9328add738e04a77a
SHA512b75fd1f5993bfeca33a9577cd18f9c1511bfcf19effae7e56708d4e9bbba6c7937afefaebc8e614cc2cde6da11586485d0fb002d89399a89e1e3f3bed58915ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53985bc094fee7b60836459a3e2ceec28
SHA1cda10a159d032611a3d5e15ab8da15709f92c664
SHA256f8a8bdeea1990ef2c4d089ca82b27e8979b5bb5622c63e1aebab43ade8c32a50
SHA5124fb57bead9dc7a5c891a1a099a548070650e179a4d0b0f83fbf59dae3741b36747302d0ed7ed07f0c12de1ef55befb8a98ff9de30dadbe38ca8ca13e3de41249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bce1d89ea4cbd1164b4acb77a4dbf7be
SHA1f839bdef7940ee8ba5933d1e6033dd1391a1dc31
SHA256fc0bf855360d9504a875c63f3418b34d743d73d968eae5fb911994cbf9a55ad4
SHA512457164d1d63005c7228e0237ed91e08654c89ceb065f5b370ef00c477d02ac302fa5c85c941479b07a2660c454f41531002804caa5544276dd63d8c898c33f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c3a0118899a6d96d0c490870fe5685b
SHA1e9aa063ea81133674aeca1601225f89e0db3c55e
SHA2561422ec2be87773bdf2f78cc8b8ab01c28281063b67462db8eeef358037cc20da
SHA5127b848b0cfc272b6297dd73fa49e607fc93cfb27a1be4d7a8b79e79c5aadf7c6764b0c844986b9cc38cff59df14606aacfa8805834c6bb0452ca3d9e4da6aebaa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TGCFYHZ3\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
606B
MD56cb420608934a334b9e3aaf3072a83a7
SHA12e7db64da28c8fc18e58c14d78e7b200c3f7286c
SHA256b56bf6174e6efba19dc3d3df84d807e025a328060d1d0d4cc2cb87be8912283e
SHA51265702c58b8d4914765b35ab359989b32ba45668a126c0ad8e4401876504e51726c41493aed0647dc272ddde40edd272de341f10b8c4f41ce4710cc9145ba2c6c