Analysis
-
max time kernel
134s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
23/08/2023, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
buildcr.html
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
buildcr.html
Resource
win10v2004-20230703-en
General
-
Target
buildcr.html
-
Size
214B
-
MD5
77704c728e9d457471c127bb75b7f274
-
SHA1
9d57cafb42266914dc5a156b555b69d5c74641f5
-
SHA256
739b4029e6a615386ad93dce34ca743e9fa79bc5b02df73937b094e34b1289fc
-
SHA512
2fca0991f9cd4a3db56ca31b00ffb67a53f87f36d0439ad220124e82b5bb79411374b32743dac91bd284e4eb497ecc1aa1a4c96a88acc324e99f94d81ca1a6bd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{15EF0CB1-41C6-11EE-943E-76CD9FE4BCE3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90dd77ebd2d5d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "398964819" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000dfff1b3a562844db5bcdd926cd827940000000002000000000010660000000100002000000074db93804548ad33363e9c147a58f765834c0e5efbd42052031f8db473cf7395000000000e80000000020000200000002445457f711b5945742f402fc0cc48ed8a771052b42bdea8d4f971aa159e5b8920000000fdc0d3fbc811bdc7e472888c7015d1e480f8afdc860d9fd32fef8c0a0894fd8a40000000dca3d10a00ed256bb620a6f1e5765ab55b2da6a2dae981e8770649ad242ce75d93def9194475159c2359e0b9b665325c01727355e43f6efff21831cab975d0a9 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2288 2252 iexplore.exe 28 PID 2252 wrote to memory of 2288 2252 iexplore.exe 28 PID 2252 wrote to memory of 2288 2252 iexplore.exe 28 PID 2252 wrote to memory of 2288 2252 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\buildcr.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b525af7e610a8a703ab9a0e24fd69392
SHA138cc82700cbd7b9fca1ca6465a9a9065eb16ad0c
SHA25667e16a0576488064cb0e818b04afd38496667ff940b5b65ce6095b59bc90fab0
SHA5124ee22da42d8a19de8e56d9808bd47521e788d9b6d30974880f80c19271e83442b26791ad6f9917863632c3ea768f5af4a486c973bfffca10739398e38e4e1e1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c051141630908003e4c579a1c77c30e
SHA1c2514ccc060c6629a10cffe2955759c757c9519d
SHA25682f61f117cef2ce7cdd035576f78ee98ce70cd99ab43394dc805ff5dd0f81269
SHA51247d37b2b81205d2d78a2b61345bda8045bf6d23d1b6525ee8c3050750634091b00dca06afa859e1c4482d22aea96dedcb47411b44d55642bc3a7f781f7c5de96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e54856b45d604d586dccec7e3189567
SHA12a07a57e174c9928a92f9b54384910c8d31f6dbc
SHA256dad9f6554f73c13a9d12a6c1fda0e6e442a5057022f02226395c9c572dfa7d13
SHA51251b0f22e4ebe74c6c6fd6ee5f89195be47cacb18641483e27adc44b1cdce8507b04fcd65a86089bf9e68c955a70ee467ae47bf84357093ff60c54e489447ef90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e0bd32e6afd0830e3600ab0fb7cc8c4
SHA1c6c4d20f43abfabccc314beffe4d401f3da98b93
SHA256872bae580f7dae80d5de63d4ba810df85d379ec2a64ea574032b4982a8856b30
SHA51248abc9bf63705e0afc1aa92df20fa01c248df1ad655cc6c5447a971306739be68a537399788147d858a59bed0f614686bf96e23013749ac824520c04495ba3d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54af0ef6d544bae766a169cac62913d3e
SHA18484f8dcf48446c762c101a461dfba6cec5c2775
SHA25684b11def26e0c3d9f61df7213fcd3da5480d5d14406d680625591c5b69270ab0
SHA512e67fdb0437c32a83ed853a9c4db466177e8ed42cf59556e86e336ccf9a4648d1390396767e9f7227bf6efa02319432df416375bcdba7dd01ed6531183bab1036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee20a3ed121bb3ec1f63c0bf03d6d55f
SHA1d764fc37f19c64ea0dff34cc28fd5232faf839f9
SHA256de64e20d6af4a753a90a7434b0b551b68964a3e514c995884cf074e5a4b3f9b5
SHA512b0be379b84f613b1706c1c6d87915a5b1604a067cce73590cab65be8d2cec5e9e858d176d4dae31533e63fb4c7f62fe34fe1d66f05af3601dd5b47dd3845c80c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512004370a64fb84d5f15d7645b8bd1fa
SHA14bb4d3d3861f3e12da98a0c4db4a48c101138532
SHA25640200d3c51241947d35fd00c53738252939d318efd2a8ea1aeb3e0e9933a32bf
SHA512d7a3684097ff6c2937521f3658f0dfdb360e8540dd0e0620402d2a65514c29d1bc0151abc9e37dba68698c57781ba97a2a1bf29b4b99a28f2fafb86827a9b6d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a65464697d7e783c0259dd380dfe9138
SHA1e85ab2bf15acb1948f32aa24b6ffb046acb08e2d
SHA256c9bf6c007413ce5eb16082125e93805e9001f7e7aac9bc183540479eac031bd4
SHA5121a7a99713a57621803274cda8cc0f2884f47e0a525accdcb02e3bfa4f8cf7ce715d310bde62001f4a3535cb3084550e5a8af900e3cfa83527f6529aa4e439939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5006731de0ce069e97b9c0f7da4b9f50e
SHA1eb87c0f67257139fce5b523813f35b5eacd543b6
SHA25683453cb34f2343124187b8c6c88d353d4f6dc3499fe1dfb895ebaf697aeeaa58
SHA512d5ac01e1b1989501a89413af76e65ae02ef7c15b6a2ea1ca9ee9c1bbef8dcacb0c343a9fb4094d1faa042344eedccce5ff590d45deae2cfe7bf554c3c8db85ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549096c48ca50b0f52b879b5a9316a096
SHA1cf651fa97891582b5ef38252a34d2a6f0de3b014
SHA256b2191055d04e109fda8b86ab4495b02c226b86ca4b1afd32a5811d148510c5d7
SHA5122b4b34ffb4e09bb7f2fce374054c3f7eb6f82000e43f4c47bdbd77fc86dc8538d6ad8084d72724e217ffe43ed2211f6e355b50d8afc45cc2b8ea8f97c396cfbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59199b513072263ffeb26211af6173834
SHA1efcbdc2a58bd7d0c1f192fbe2919b8fd5d34e95e
SHA256298237f483d5fe5d8ebfafc1631b8334128903517fecc170512c4ab4473d33e4
SHA512b78a940bd563c1d36ebdb27d55068c306757bffe38377356e0ad4a9f2a40041c35161ad70f2c85de54008d6c134bf84129ff4cdba718eb09ddf5cc4b047e81ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c30a49dede8dc0568d98a9184a45362b
SHA1b8967bcf127f16840124c4d2f6f9547d635677c9
SHA256c90b9ec32bf81c303c1bc078acdc5cbdb38d639edd184048f144fd11060f497f
SHA51244e95d195ef9c61a670cb9791765ac5c69a8ca839ca6a2eb79a614dcfd19df75b3680df66c1e36a4bd512a4449670413ad05fb9b9f4c6b1c6e5242eb68cf0384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a5f0f1831e974d77999a42cdcd1b654
SHA1b4d2134ed982c0a76d6b0d776f337ff685470436
SHA256e2c1f57c2d95025557ba0f21b4c231d44add2b255e27a53722dbef15c244dc2a
SHA5128669b9db1f39019df6d80e63a1066ed9fd125283eb48a160da42d9fb5e5775408bdf12427b1a2b4b62d3c3c61b03ee1c23a45c82f09ffdb4e605b64f1845b704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd5c96e507b8c4aa13f74cb468526494
SHA11475dd6a6b7494af45146bfa4fd7ce5c6f377497
SHA256728da36ebb39b4e08b6af0484fea8441a84fdf8b471ded26add44d0d3052e4ea
SHA512ac99a322a7fd0251333992a024e3731ec83468bb81c164ef848e84d8ad4f54dc8cfe3aa8dfd619b38905af333f840d74aaca2c0851373e45b132f9f2faabf37a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5054e14979bdd1f2875cf184399616a92
SHA1853552dc5d6e0e47785dba5fc5104c49ab7786be
SHA256a2a79f8723887f2eaa1a29fa7cdd8482b4639505ed277619328cdb6480c3b478
SHA512555d94b4ce14fbbfb97681fc6c715ba3a181f0a2a2eb24585daa31b32ef6eed3c34d3ffb269ff12a0bebf2524f8cefdfabf7d35cb502fbbd56a16221896616a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b3274014ed05a9155c17c6964e5577d
SHA177d40ed33a63061fc9660e777ccc3d25d94e5313
SHA2569cc16558e7d85c5cc4940b841dee40b70c070109551aca07e823a87b5be8b8b5
SHA51280bf9cc15a387aeb1a6e3cc9f44f2d6dfe0b97ffc99646530f6c4f51cf76800188d073d685c04e7472f3c037c25294213592cfeba80e2c849f5066f283a502a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a872c44f437b9593536971095007a3a8
SHA172252bb12d94a42d51f4716208cdbb0109cbe46a
SHA256b01ddde57424ee0b1b24a4085775da15e3ad7936f92494d4a0d9c46aacd0123f
SHA51293873742438059f9d3812127ef7e13e1c9c8f82609c61e69cacae888c8f48c20abfad6dcd0bb341eca6cc91f97d2a9b04c93d4c73d314b518afc494e78293aea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2a46f4324b758627f7c1a3c2e675121
SHA1789c84f96653882449c3d5efc5226777c53bbcb6
SHA2565c3e8fe48e5094138329b859a4f7485b50ebf114d10f107f30ffa679c54fd75b
SHA51235afc960a7d208d0f9adada732967ab6ab08967ecffdb24388399d06f1cb00ad4e8f22d592725b36d5ac0903a11f998f65670c62064cb8cecee09ab940a59b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccb4f86b629955231291fe47c29264b0
SHA1e72a6d69e8f811fe389d1253ac6d7239495b07f7
SHA25656b0f7611f65b871d52bf113837696e32fd53948fd7a57448fabcd2f73ce32a8
SHA5120889450dca594da3fd37a096f7c940b1d18295d120a7ce52489af7af3387986b1142720cd8d317fe6489393e41bf0c8aba05990dbad68c0248be1233775fe7c4
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
61KB
MD5e56ec378251cd65923ad88c1e14d0b6e
SHA17f5d986e0a34dd81487f6439fb0446ffa52a712e
SHA25632ccf567c07b62b6078cf03d097e21cbf7ef67a4ce312c9c34a47f865b3ad0a0
SHA5122737a622ca45b532aebc202184b3e35cde8684e5296cb1f008e7831921be2895a43f952c1df88d33011a7b9586aafbd88483f6c134cb5e8e98c236f5abb5f3aa
-
Filesize
163KB
MD519399ab248018076e27957e772bcfbab
SHA1faef897e02d9501146beb49f75da1caf12967b88
SHA256326842dd8731e37c8c27a08373c7ac341e6c72226cc850084e3a17d26675f3c9
SHA5126d5b12ec637ef4223fdd0e271cdc9f860b060ff08d380bba546ac6962b1d672003f9ae9556d65282d8083e830d4277bad8d16443720716077e542ab0262b0103