Analysis
-
max time kernel
137s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
28-08-2023 19:58
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20230703-en
General
-
Target
.html
-
Size
146B
-
MD5
9fe3cb2b7313dc79bb477bc8fde184a7
-
SHA1
4d7b3cb41e90618358d0ee066c45c76227a13747
-
SHA256
32f2fa940d4b4fe19aca1e53a24e5aac29c57b7c5ee78588325b87f1b649c864
-
SHA512
c54ad4f5292784e50b4830a8210b0d4d4ee08b803f4975c9859e637d483b3af38cb0436ac501dea0c73867b1a2c41b39ef2c27dc3fb20f3f27519b719ea743db
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{401A52E1-45DD-11EE-BA9B-CEC9BBFEAAA3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05eec14ead9d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000081fc177b9287ed4a8181eac127bbbd6900000000020000000000106600000001000020000000fd50bcfb315cf5d761f6f4105396e47e8e43be48b61187d5e63d157b5a07f4f5000000000e80000000020000200000008e1c67281a375113cc3f4aa445263bc9cf711807e1d2561dab79abbc7aab221e20000000190ebd815a6374bb9a6e6e2cecd2e2fdc4b3380bf5269d46bf81e67c664dde5740000000ecb0982f75ba50dfc75a4754c989a99c89948a2fd5d6c6cce816714e1c389bd91e0a5e94b53253cdd928db832b1c5c0e19d9f11ee3e1f022761405be5e11ca57 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "399414576" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 2220 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2220 iexplore.exe 2220 iexplore.exe 1056 IEXPLORE.EXE 1056 IEXPLORE.EXE 1056 IEXPLORE.EXE 1056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2220 wrote to memory of 1056 2220 iexplore.exe IEXPLORE.EXE PID 2220 wrote to memory of 1056 2220 iexplore.exe IEXPLORE.EXE PID 2220 wrote to memory of 1056 2220 iexplore.exe IEXPLORE.EXE PID 2220 wrote to memory of 1056 2220 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51887cd81a2c7fbda8d84a74fdf7cd0ca
SHA1209323c789e3db4dc7e1eebc85b9c84a70d64b80
SHA256b31ae4d1399139f828faf6a896176e9d0cc4528c421dcbcadfd3f3def269a9ca
SHA5128b8ed379e090fef23a06dbd2fc5a4d0d360a3a737bc04d4fdbc5b5f1b86c5263d56bc7eb03a8982521cb1f3306b15b8af134026ed5f590173464974c6bc4cad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ddca641cd085e71a5b346e8d4f54ef8
SHA1e3a39cb39ffbfe4d6ccc66d30f2a2b9e5b6bbb20
SHA25616ce202f3291653f76178b8c462e472563b30e69b8c4b23f83d3ff8d36d4b285
SHA512a07681c3f41f0ad1148bfd74eae1d0193e080965bca787433208bf73672c058e8a8d4a12fafa0a2f76d8b2526c053172bc4245b718d1868c67fdcb4b7827a1c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbb2961905c5f462530067ef95823d89
SHA1ba1475d0938f4326afef05b79f3e961ecc00407f
SHA2561f1baff465c0bd0cc68059e80230a599a7a69998aa9a8eed6c68ad6d2d5d85db
SHA5124494b133f43a27637cc6a3e0de97ed16d01884249dd60c94c229b7ff694751d50499238f4061c6c9c05f07b43e4e51307829c2f4e3e62294d45fc169c03a81ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb5b32184ae721cd720f59cfe89bb94c
SHA134cc1f2ac5ead620017dda136c6b7a10a67bd948
SHA25659496533014ec1346a65948a969388f89c25eef1e36ab1a0e625b1e42fa070c7
SHA512fdfbd7fa47b2042d586b19ac08740c78328459e074412c123d0015f8155836576e47d61046d93640d0daceaf62d47184402e2912469bdfd27081e8ad4cf43847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d31fef1ade4edba538126c70333eb5a
SHA16904fd929ce4353a68bad4651d38bc4b669c545d
SHA25650c1d60fb2c5527848c275873803b94b89e5150e55d125d2837240fb08b0450a
SHA5127eac79e65faa14c1788971d85a982d669664cf74737ff6d631f8853a5dca6542d14b6e9b294f158aa276921d31fdd9e0eee2c02ad95c3a6f63c98bdc73e92507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57696fd0ab8b395e6eb0c2e17c4bb55bc
SHA146f6d8ee4f11aeec5a185a0dd91990e171ef8121
SHA256e7ae851ae847ff5d8ff843f96b234145df04cb8126263f52dbcbc846455d6ea3
SHA51249e56990ed9937d077ddb5fd441b6d98ae2735299ce721a4c579dbabc8a81b95aee61e540f0b59900b2d2afe5b4298457363692a1228e88828de996056255255
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f64f4e488cbe510023b6552c1b420758
SHA1b4b691cc3f5b71d89acd16b6be656ca0d4c2ee56
SHA25682d03cbd9a306820373f0e65875ad9e4faee18619747adecca12b1f4ae110f5a
SHA51259c4f352ad22547de253eae4a8c36b197746b3281ec17989eb73f19352ab0a3037d41e00b71c3ae0b2245e7ac290b7eaba875b7398d3836c6a297c3cd24fcffd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a727f2e676b9a9bcc2c91ce560034647
SHA1509c6b3df44819d7a75a0fb7a11305ed3878fe1e
SHA256f4dc67d6fc337d9195ad82dc844f7fb7fc45e33bc8da7d9cec00f33ff96526c3
SHA5120d506b598fc8ef5677fd69706815eeb9409c1a8c59c54a7927c4148c44c76738b829764c8d240437c4e670d6c9cd3e73278ffe3c75c05d8734e173a509bedc1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56224882188b32959c774084d5ff4cb9f
SHA1b1055fc2b0a50c13c3cf1ad4ea6a92038c82abac
SHA2569e4508f46a653cf89572395fe18f1a3f9eb088c169e3b9d1df9a8c8852baa6cf
SHA51214337360cdee8cc5fe7b670e5e9ae431d367978290da2ac402ccf4933f58ff67ea71f6250695cdb5fb17e6cb8155da250398d2fda48e09b730d9a18cf3f0ad58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526db41545a243974b2d1a783ef2830a5
SHA14dedf994d030c59ac62d9452b63a6af0043f8b04
SHA256e1f8e5f133751fa1008c12354a285f7d8cdb0a58beff2b88e64a6d9c14a835e3
SHA51240337201466555e6c9ef92a3aa209fc299b42caccdafa5445ee710aec8c61cceac08e03f0b16dd63d14905c35c983c1708eca3de8abf3b323ad7454b16f506ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f227f7eac00de72ce8f1042224ed6125
SHA1e46d3b2ff40eea50b2bbb6c41fe16465fe846d9b
SHA256a4343c39ebe315ad9c02d258c78bf9460d569383087bf3de176dda750ad963d8
SHA5120e0b85d61da17c5ba66b273d393b831eb3ead2a366e546c30dbab2e14e409ea2800e2507f9eba611c232f279a4423e4d539cc39be8e9fe583f2b149289dc28f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a666e749266a8e426600e9ca50c18959
SHA19b109654add8ef0eccbc5edc5488734ea51cddca
SHA2566b7e20efddef0b2ba7049841f88c3499f9f14910814bf0a01042f8b64f4549e3
SHA5121730bc356d0d8999a28ffd0c62fdc67f0a9064be0ed22dc62c4073b7f80ba804f0eef9b525b63b8b1e62f09ae16a71d6080782a9f14a28bb33fd21b70e7a0420
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf6b6ad42cbbff902bd4f969f85e1e24
SHA104a452634c1dcc157d26e5285196cb093188c59a
SHA256d00b49c74f08ffca72656fe16df357b4d1c9953958bb8e26d029f9960d7a0ac3
SHA512d6a3e424ee2fb41c20a7daaaad13ee609812a1c0cd08b3b007a4151920eb16ce7108724c43309a3c8944b1f2dfd5dd410a0d50b3275a41291cfe8238a6cb7d8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538a12fcfefbb642b452dfb342d1d6237
SHA19928052206150f27298efe33c892654099df78d8
SHA2566981e57bce7b47748e912aa791cef8a40e6d90e5d60a565672d6c15801f8a170
SHA512b85311d485d233a4e86aa4fb46d538f40cb0e20e69c1ef07882858aba3d77d76c04ef4036aae66dd885bed19c7fb3253ab2d17a2dacf28cf993b5b78c04000b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5633622d7a3b7affadcef2d6b8bfea934
SHA18be5951dd09f18c8c2eca0df4a5620daa75065c6
SHA256bb5713ba54ddf11a7eba54f3515beb818ac15ed473dafbb8279d8897296d8562
SHA512cfd686736c1a14a1f1886c35f3c4aaf11d7d2d462ae4b732db8a02cdfc51ffe10756e606350d5a4c23dd55386cc0402c7852d525cc205723b850e7c3f91a0dda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d36c49553f38cb6ea996bed096ec6a83
SHA17efa66c9547b6850d7c01093b9b2a33811449559
SHA256d7bd1b546cf0743e8df1410f4fa5526e491e4b6b27ca31c0a5781d751f6f7041
SHA51218b220766d69197f336290717f9526f2576f2560e1052527a351c89250689905d515d4fd2424c1efc7fa6737130a0d057a12bc4e6e28cce28b3ef1c6f9bb948f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545a5ae8530043227835b0edc7014d8e3
SHA1f78c7b7f091b39809a1722c1b6fdede6731b2be0
SHA2560758b19d4b961927f00d06bc0f44013d2c7ba23f9dcb1a581de098b78bbb3978
SHA5122a58a4b6c6ba2948d0461345dbeeb41401a028e301a24a2508d4938f013c4691b80bedf334fe8cc754387fca7b75c9f1e6802873d2de23189c9585a171d31abe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d918a379a33fffee19a822062e37e54
SHA1b970e5749b3a8b21045e1cc6d14a3f41cc053ada
SHA25622b52a9ebfac79b118c2c236580bfc78619fe76bd30ffeffcf4c9c07b49a8427
SHA5124db89fadbb599f460f8541ba987d24ed53f66ac22445b2a1fd60f91fc64c40500ad3bd3588a3ed3b8330f49076706c97825c51854166ccf58915847125a44752
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf