Analysis
-
max time kernel
134s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
26-07-2023 14:11
Static task
static1
Behavioral task
behavioral1
Sample
anpfixmain.html
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
anpfixmain.html
Resource
win10v2004-20230703-en
General
-
Target
anpfixmain.html
-
Size
315B
-
MD5
a34ac19f4afae63adc5d2f7bc970c07f
-
SHA1
a82190fc530c265aa40a045c21770d967f4767b8
-
SHA256
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
-
SHA512
42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "397145643" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c7eaec47cb7afa4887efc5e3f3ae1d8c000000000200000000001066000000010000200000002467ce30c1e2bcfa7fd859f7efb598c62ff31509ef8608d7af7bdd5051e7bc4e000000000e8000000002000020000000e33d746862f84809d96b80085b25470c7b01f5133d11e5ef0861f57764b03bb320000000f7b7aa1ab59da3098c57654a6f0a3d2062126ac05a5f56364fc4f7fe88c39f244000000069cff78ef42539b71f6e881e180d118f043698b78bc871aa90dd6300cd467fda1a8d87c46d70aa8f37e4aec7d5ceaa440984b454db952288101a953bb7abb928 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{44621FB1-2BBE-11EE-B1D7-E66BF7DF47AF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 104b9319cbbfd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1216 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1216 iexplore.exe 1216 iexplore.exe 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2624 1216 iexplore.exe 28 PID 1216 wrote to memory of 2624 1216 iexplore.exe 28 PID 1216 wrote to memory of 2624 1216 iexplore.exe 28 PID 1216 wrote to memory of 2624 1216 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\anpfixmain.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1216 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a146b588cf5be98cedbde504fda03f46
SHA16b971ea081303d56c2df38d27f07eb6d76524ccd
SHA256f8741fde2c84be79bbea55f86e8f530562a1ebb718939eb8dd7720dae6138cf2
SHA512b0e976dceb69978482c8f26131380dfd41bb58dd6b6479f2deeee9d2b127d353583c4b90af1cf8c55a6ca16b4f470a2f94bd8c5b7ee9a214fce5682060e9bc70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c6e00eedccde4e6007a314a60d12d904
SHA13fa5264d09f5cacf20cfa89759158dee97d75477
SHA256242fa4c5dfd25c16bcc49c7d68e94c7b355b6487d5f389239d449faf63067612
SHA512ec9ff169db6adf773ae086bda09e3f2cdcf40a77c7d4b20d9917da680f82638e98cf065c0964728f509d203ff71f9f3bb619891c826506fe5c2f52a2bf1270b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ad483cc2fae6d623a4867e698ba7cb77
SHA18681e375b23a2743e8cdfded8c52474fd654c776
SHA25661f1594da7fddb2156b019454f123b9e3009a5aa45374a6f35300c6cbc79b42c
SHA512211aa20290f97e2594c3f83fd85643ec3ed8f2b5032a2103fcf3d8d6e439fc515beee892daa75166625490b90703b752d48d10186f40ff8a4bf5f0e687891f52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b4398ff21dd470d99dc252eb49d3a29f
SHA1c4ad97a74ee8917d995c1af7bdb3c29272059e77
SHA256525a901517cacc757eb1cfdd144f5440fe6b25c72619118609f6413709331f6b
SHA51271bde7e4b03acffe01cb5a68cbde51977bb73511f09fbc6be8896b3ac3fef7fea1f4b3e153fc9875f61b2493823eaba6c8f71cd23d9b6977ff690e5febb06fb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f80e777b54c4b11a78a07f2e0314b65b
SHA1a6478a51715291136430ec51bab6850b5542ce56
SHA256e1341428ede5bad910c692ed223181690d380f14d0e11a1ba3d5506ce1f99822
SHA5127a555a6d09a44885ae709eb02c79d072ad3362051a5ec964a6dde49c27d1216ac3891b2d711deefcebbf8f3c5686f04ea23ea9287d7f9b80782aca7ba428891a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD555b57dfd58e6ed24c04f31917aa1ec3a
SHA11939e334c8a55aed9b7d009d3c76881604e3496b
SHA256b60a9a1a40c90fc11e638e24e7dbe2b81cab6495c008681bafefa056832af20f
SHA51214c0b018ebd39e4208df7956bf2bfce12d7d7513b75dec57903611aba2ec74ead6399f76c4e3d091f91fc0999a3e3a95cf74fe24afed5eaf3292b6057b9ac49c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57c77f55b4a9009a2470c88ea24d4f599
SHA1d0f3f988b9b3787df7dacc2b5c487c24d5332abf
SHA25664b0b6c220ef0ace9f04f4443f8f29bbe6cfdb5f1a490a3511b4ff56ed15bde0
SHA5129e5255d0256c32d9b415fed4fe035684d78aa4bf9f1a0b34224e62228ded67bd2f49291596038b8ea85704699a249a4ed170a53b752393b845745fd3b3b11b4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c1c6f8de8b6c960e78d74820b591b6da
SHA147581b25aeedc03212de94baf0e4e3db5c478a60
SHA25654f1a52ca972f73e10cdb7481b99ba4a6a7569f7cc04eb5ca836df744ffe86fb
SHA512c5652c076f734d85b61b16cb352c08eaaab73ac4935c24c2f7b0f1ff7c3eee8eff9bb020e213dc190669c475bc50f3f73cc1de9c0813859b7f72cb0bada777a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5510812ae13b6df5fdb6b1be7453865bb
SHA14a51053710de6d5dccde76095097109135b81982
SHA2566c91feaae1d7be6d6cafec110bdc77508689a88e5755a38d5aa87fe65b150573
SHA5128a5e04f47fa0cd46fed15538e7ecc1c93018692170e596b77084a17bf42d00df4191d1b046cc8a67b8a829be7b30f604bacd0a47f95ce8a51b2de41dff38af43
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8AJTUMOT\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
601B
MD58526cba3598b717785f3a988a09aa88c
SHA169bfa9a988cdc2c02ff9b521c655ce6311f11e2d
SHA256eb2b3178db03a7076181b67c54023b8213ed155bc5752393a719acf1fd3f515e
SHA512dd5254e44487c9e2842213e33cd9660c2d75e3732592470b306dd1a52d1248664ca1e906b268aa62b60b68ba6243540b6ed563c6d3b3fba5add58a18aef26f83