Analysis
-
max time kernel
135s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
23-08-2023 15:44
Static task
static1
Behavioral task
behavioral1
Sample
file.html
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
file.html
Resource
win10v2004-20230703-en
General
-
Target
file.html
-
Size
315B
-
MD5
a34ac19f4afae63adc5d2f7bc970c07f
-
SHA1
a82190fc530c265aa40a045c21770d967f4767b8
-
SHA256
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
-
SHA512
42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "398967326" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000e8664bdb653864eb3b20ffc0ad3b02100000000020000000000106600000001000020000000ddc11f8a4379d75b2bdc0d223c70c1159928cf95816ba8b23568184f8a24f77b000000000e80000000020000200000005219d729268ec8702b3d3648534171dbd797ee9225e7dfa42b3b750501a67143200000005ddc01215fb33819e9ccfe393a94dd7a3325f0479a5090fed1a9ece0babed7e540000000e35ff91144ad7a3fcd6be405219923c6cbcb23c22809e4f0c0ea4d30a14972aba2cde3747b32297683d80a44979b066afd5686ddb4f49c4f245f48c2964204cc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 309ddebfd8d5d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EAE63511-41CB-11EE-AFDA-5E587CD0922C} = "0" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2656 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2656 iexplore.exe 2656 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2680 2656 iexplore.exe 28 PID 2656 wrote to memory of 2680 2656 iexplore.exe 28 PID 2656 wrote to memory of 2680 2656 iexplore.exe 28 PID 2656 wrote to memory of 2680 2656 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\file.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e56ec378251cd65923ad88c1e14d0b6e
SHA17f5d986e0a34dd81487f6439fb0446ffa52a712e
SHA25632ccf567c07b62b6078cf03d097e21cbf7ef67a4ce312c9c34a47f865b3ad0a0
SHA5122737a622ca45b532aebc202184b3e35cde8684e5296cb1f008e7831921be2895a43f952c1df88d33011a7b9586aafbd88483f6c134cb5e8e98c236f5abb5f3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5371fdcf1912f021a45462bb86f1b36e1
SHA192cf1885a2834e073ebcf59d50fb394c0f7b2442
SHA256046bf629ed2f22b0b85df4bba0f0edab41db0680411d8edb6114e306bb04306d
SHA51233f191d22a936525a8facdf1d7a91d79f5496e23f8ae58e9f3d4c9c7062fa4938aa5974657def41ce1fad3a4b3a6db8bed79049e7d18e972400f7f4796d889ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a1562c40cb6dc2724e953675fe37d0d
SHA158be1870109d4c989446d4f65badef16cf38ff7b
SHA2566e8f59c937469ae9e3aa6b9251204f819f869d422fe2de3206e6d23631f28a5f
SHA512077d22a7e903ab8cc6d9b622af03be1d6c30d04fa312310a049dd1cad2d97f0063392aa83d2d5da833b659e968c488884c0490c680b10d3df07c8653c911441b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f3aa01053c555166a9de6a89a2cba2d
SHA17e53b7ff1b40c85ab3c874e72076326185080674
SHA25643bbcc0ec4de4ebd2f94ebbbe3d5e9ec1aad604d7ba95ab5db0a4247eedd9f26
SHA512b5c8591ad464808a38fd0fba22c8949bf24a54a13679d77190b0f0ce242b52527e4b8a528123ee5e54e5ca3270b2178fd28e1f5f375ffb24c9dc951ab659170b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adddfe7bb1a1b9953c039cf1bf1c8371
SHA1ebabe2810412e2dc1261b54bea5630c5b9af23e4
SHA256b5953a0ddf99e46592db3a2ab0bee8bf94bd242658a38dadc92f9b4557351ecd
SHA512863d2e6cad0122d413f63f0818d7b4f838e376f627768a122800affaa1db603ec7041d03e100568e8bb1651767cfeb41c79c290507faa7e38a4c723cc129c86d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525955ddbf3fa927565980bc42007dff5
SHA1ec3684d70446b14f81487e88b2f84e5d924bfd62
SHA2565ba0eca6ddf07c39e36c01608a0c1eab7e2afc5b4ce4aea37169b523e379cb48
SHA51236af518ae0c7c60ad147bf9d1744b3f50163faed073dae8c4da64bde94c5b2f94f4f76c171298bed0f96a82c6dfa11c3639ea40e865bc8224e023ff493529f5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58717898572c4a1a41a4c913618336f77
SHA14ebacba66646604317b87f176fcb7d4407a10a9c
SHA256cb211c810b49b4e0cc09385588161bff7398b5ff7b0580c8b41b88b59526df45
SHA512e53a44a249386b4ec1e75b2b10fd21ca97d691cd83d81575282e92fe3046997718f6e2d733af64aa1c818c6339cadf4465b03517a8eec1ed1cb41f126570524b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d46de2b6952512c000c90d36bfb92890
SHA186decc485833278b5d94b9d4c990fd7dabdf2c2d
SHA25660d0cecfa946312b956a4931b6b8d7e41dea4966b84f2bfa3840ff8c0d7fb8bf
SHA512fe0b5e5dcfd7077d1f68a296966ad83a0b2cbdefa440ddfe5c5c47fc80ef0361683e124a85ac0f1acb5577cfe168b238c4e5415b51e125892e09c6dd331a689e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffeccc55aea2f44c92632061106b0022
SHA167570ee67a38ad7e5f26bbb5966c0ac064c7db49
SHA2565bbed1bceeeed0561141c455c8671ac4179dda18d780f8992aae8791947a1fb8
SHA512f2965c593777883b22813c2b22bb2851e6cb8888c525b894dac4f5da9c7919850f3e16a87d1f1fb705c74a7ce970e27a449a1e6b9910558f10df0d3cf59ada48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db7206b8244502e85adb7bb8e1ea5072
SHA16d5ba7d65d75afb7773becfff9c9f7f2ef60d4d7
SHA25690f9e218e6a0a1ff63720baacff37954a269f135dac4374a8c3c02e78e7cf07b
SHA512b4740e06dd0cbe7d4afa0aa401d60e8b43fd6580a3ac2ec71c9b1697f743c0c210f10db25124ed36b068cff5e57057bf6159b1283b49954f4e17217562ac8ae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5281bbac1d844f7144dfff41488de323a
SHA1f7c1edfcedc715eebe3a66504405199c4f2a20c4
SHA25672245e6721bd2a3c6e698915a0d79bfa561961215422e16d2d75ee5e40686d87
SHA512d75748e686db6bfe1daf77c0b0afb8bfccae8eaa7d27896740c6e61c49fe4678342f64113bbf4ba8a7552e4220f0010cf68e802074557c8aa388d1315502cd92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9e9c22b7cb3532e0df71caba7a5cfaf
SHA15f0c0d1d4721c4e71c5ed561bbef7416f0520ac4
SHA25671bd5719800693ac3dadb9b3478af15ef8a6623310e4c38d8ac61bf46125c5f7
SHA512bf18a0424ff98efdb03abb91043bfc17b61cc9df4374637aaec56e9a701be10c6e84c3fa8e9eaf692d6b6d5a9a5fd6a4ca23677fbac4c8ae2c46113e8e5d1f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f071e7b266119f03ab0bb19f93353a5
SHA1fa9b7cc30ce6995c7cde5907c12969577cd39b05
SHA2568ffa7b5c0c49f54dc87d40bde623167aa5a67a67d417fb0a056b788d6dd48f43
SHA5120b0736b858970141959e5c0191d7cd8ca293f02bc5a7a0d18bbac1d9b2eec6559883d460b57e97986c2d6a36ce85f7d8bc7b3c6ca78ce1ce54d01718fbd6088c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564117992320014b2805d039487cd1719
SHA1d40fdeb5dbdce52616faa46f53db9a64eedb4676
SHA25675b4d3797ff6a1a714e635315e6b5966f96162ebfdc302bc84cf5100a2de9f2a
SHA51259191628dbdfe643b66a0939d32c1e04640c9303c8fd8aa454a5740e772032b7a696ade8711a90b3f6a7df2f020ff151fa964b7406beca1a67ca95692abd5023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc2d2da8f4c1881d5718409662e19853
SHA112e3b7a4625415299f6c6a5fc5bf3f48ad04a446
SHA25601b6774dcc7c37b96a55863bdf1694c820141b5a649778d7a5123023066836c1
SHA5122bd2aa9df393e7b30b253bf54d7af3556a6756df5997055a2280601c3a964661da8aa888cdf795ea84cd339f4d89c1df730a19ce58f2de6e44e3c44bd62cfb9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7580b990688dc747b0f2f1003f08831
SHA1bfe378440cf2a24886ca2a2804a06b3c9e83aab2
SHA256995ca21f470eca188839066e2e618d9489f379f54b6c9b348f06eb337920c65a
SHA512cbac71fa4a3e10e3a45e4b27b4b78e4aed7fe5602d98ff5ccce707d69e222dbe3065038e408a626eaf59bf2e49ea862df099becd9c4399407f1389b5d109efd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5859fc43c6c7c1ed58259cfa4d9eeb29d
SHA1e2dd4600b192c0a38dce0fd846d86fdb128bf74b
SHA25655e8da5aae3f17ae66af597720d950175a4ebd0aa7d8ff4758cf5698d82ddeb8
SHA512322f697b1e96cfc235bdc8ccafbed5d9687ee45711f2d106550cced61c98877b1f94c2a7ae360456f0512c389fc7946bb401242fbe048c0df2a9bd7438cf9f21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5406a8dc69b99be53bbfa54f81ca5462b
SHA1ffcb158cf129dba364c7c2ad25398fef829140dd
SHA25670d61d67fea117406a63eaf99d233f5fbf429884b604eb0071fc160e79c71eba
SHA512fffe926c7bd18981f437d1c588e557af9475dfb927900bbd367f13313156ed050a200198a5e541d869560da51f88066049c06006f2b09b5f8a7e9f8cfde8f5ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50757c81c0584b7a9047bc6312d7841e6
SHA12a7497a28fe22832d74bc0e5ea05b5391e67ca45
SHA256339513fe515a0c22f497db46e7efac8ee6de5f2c699aad14d301ca73680ad19a
SHA51236e132d18aad6e70ddad75a9fb66f857e3be42a06a8a630e061242276f321f93e0694409c8aa2d02d70dc62e703a4149fae2241937d5dbbfb20cf94a7e7d31ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e14860ab3d3dfd7b7a17d35710e30cd4
SHA17f4310c95054ea691ee254aa2642b960c659111e
SHA2566aa33cda4fc884115e8814ddb6bc3b2511821693d172c11a5736acbff4134154
SHA5128a9a3c6cb19fdb03f143feb7f0110c5947f14a2f745e2b08463f54553e24dd05964f3c4e097ca8f42aff0a66186987620aa5082ffd09b8257e73a90c1c918ed4
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
163KB
MD519399ab248018076e27957e772bcfbab
SHA1faef897e02d9501146beb49f75da1caf12967b88
SHA256326842dd8731e37c8c27a08373c7ac341e6c72226cc850084e3a17d26675f3c9
SHA5126d5b12ec637ef4223fdd0e271cdc9f860b060ff08d380bba546ac6962b1d672003f9ae9556d65282d8083e830d4277bad8d16443720716077e542ab0262b0103