Analysis
-
max time kernel
135s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230824-en -
resource tags
arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system -
submitted
29/08/2023, 15:07
Static task
static1
Behavioral task
behavioral1
Sample
original.eml
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
original.eml
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
ATT00001.htm
Resource
win7-20230824-en
Behavioral task
behavioral4
Sample
ATT00001.htm
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
email-html-1.html
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
email-html-1.html
Resource
win10v2004-20230703-en
General
-
Target
ATT00001.htm
-
Size
468B
-
MD5
fac2a724d851220cf0d6be9efb4f1793
-
SHA1
1f5fdcebfad91235fd1a325d8211810f75db281a
-
SHA256
708c473e0541c7304ac2836f02d42432e041b4ecb211b4f5a669ac81f80b18d2
-
SHA512
fb7cc6c9371ca7e04a494def16924889b94c9a5e3aef5e7d15ece32dc1d77186e89cab6a1c96c174885f43e75b6db01fe4841ee1fad5c7074ee23897afa6005a
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D6F04171-467D-11EE-8871-FA4AC7FBC740} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "399483547" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007527a1bfe6a818429fcd5676e9b72b270000000002000000000010660000000100002000000026fe25e99338fca6df8c3e0f6e11412d9a20a8d1a04de11c2ee37ece767700b1000000000e800000000200002000000008156bc7289906174bc98dc5da29ff7b284700a700241efadba1440c262061b120000000f0eb04e101c47b02321fccaf8611f2b04cc3ad13314c0198023ef1705697d9084000000069d6524be58859d6ed3e78a099183b743985028d80b5cbba206c6b3e48c6648f2f4fc45d9c940d424d6b6b0ce75359692a4298394d77181c091ced1d465c0deb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 804cf1ab8adad901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 1952 2208 iexplore.exe 30 PID 2208 wrote to memory of 1952 2208 iexplore.exe 30 PID 2208 wrote to memory of 1952 2208 iexplore.exe 30 PID 2208 wrote to memory of 1952 2208 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ATT00001.htm1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579f4236926bfa2b218e82f108d97ea9a
SHA17af6288c698a592e15d5366564197ba6983d00ff
SHA25611bc3730a26224148b52dbc89ff04a5a429010166daa14785e83f66fa5fc6b1f
SHA5122a37e419db17ad5447ead8dd462c41d2f934dfc96689166d823669668453ad1b05218af357e8d021d6fc10581b9d90757987a6cebc230804da0ca7059d5a70bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dee89706198be5417e7d5a69e6926f8
SHA13d7943a97ebb83aa038148e3df35f2bd08643c6b
SHA256ca7fe37efcc62ba3e6ea2880ab64c9a526d3f79072f69125dabc2082c9ab5919
SHA5127721b56982929fb2660363477aa542cbb900b007e11af1326484869f0900bd8b8783ee4f586291da63b0ed86fbfdaecbad26811598bd71abd8d931646c1f5a40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c3231ffbe384fbbcd2cd7f80fb4402a
SHA16da576909c3bb969947bbb4ff9a31071f2ec2667
SHA25694a7e829b708506fde5a220584171f613c19c6ee26597bbb39bbe85dd4769816
SHA512f042002a8662af4da9eebfc4f03d16af2ff919ea71593fbbc824c4cf4c0d487637dc2befd8ec68f42095e0bf1ac281fc71d28c1e56af7cc5973c38661d2108c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e85b56ffa50b7f13d40cfa95910e7b72
SHA159de9825e4480a2809e92ccb014ef4e513a0399d
SHA2562a725878127d79545b5323679acc733c374ae9e60e333405e9ae7468895cd1f5
SHA5128ac4376e1d1e72867656872b6abe12689866ef6a122c3eb96fc5a0e227a30aa452116a5c72d6bcc3cd1a43b2e6cc886558b3cd969c6bb47c2f83ff222bf9008b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590f05c59c87024d5ddd9e26b6c899f7b
SHA16f9c7afe320414aeda5462cff9b8f82be3b88ef2
SHA256ced46bc490436681b3da9f59a042a41df35c88e09503cf585471b7e2a7f38549
SHA5129298c0bb0e422b406b7812654b48d55a73e5a317ea5095beea683fe38266828cfa1b5539d12ada630102c8ec08f08ea9b22c72fed92f9dfdcd0eacd2fd94dee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526f580bd3224815c46aaead516ca1de2
SHA168cc0e0cc3ea9281e5f0df8fd2874a444882e8f1
SHA256d10f81ac4ed3b4e6348a00a9568395b06bd54430407ca4e628494af317e41760
SHA5127606b2abdba0a9b7f34241d482c24d53418a5047d8827eaccc684de634a43b8ad5aaef95391bfe0ed15b44beb4bbdde4df66971e032c26a306b3f910e4a4b528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cd9ad0a1317c013fc1bc0a3d4863638
SHA1f66c89dbab9758b6134f7c22f598cea0153e7768
SHA2565d75a884176083c8b152e92436e713e528d60a4afddb652e61a43f87a6c95bbb
SHA5123339aa0df6ed0047144331e82a1d523a57c6f7bf4b99cb1dfa17f70110012c6c46fa549f3a5e6b4300673201327aa1ab7a232573a9e6df42038686fb55166928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506336fdf7647b21581c5897cccf4663b
SHA10ca738c3dad6fa404269443dfdc31145a6e7a2de
SHA256ace013dfb48a7aae4eec99f387d98934ae674fbf519a91aecf91d953d2f23a16
SHA5124d4da0966ad258894e007287c027230798c4cef536e61d46e547c2dc8166fe476995ffaeb919d1665510c08e85e50d184808d709587f3e533a439b9a69d33d76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523d549e9a3107bff2e520388f11bd4df
SHA11cea0c176ca306345642f6b364b4d5ae0e303f93
SHA25631d932a54a9f93027e9492a8b464e3edd0b215ce1a0254efb8905c53f248f64e
SHA512052b32056bb871ac1da316fccc271ef65a33c7ff326e1c6a54b32542da4c804b71df9a2a4cc23560be2b2b0dd960c2e7851c7c58348452cb8d23d361ceaf53d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f0b9273e7461954a5c6a8e68cb3c28f
SHA1a3f0b94184843569473be612f554a88a2b2478a9
SHA25617e57daa2a5948dc5941e740fc9e8ff9c9459a7d3042bdc40cc7218f5ee31e3a
SHA512a4e9a3be3cf9c90cdaebd87bea8b1a0f63e577d77ffdc5636578df1a7ceeefd5fb112dbbe712dfce1dd553a22289558b628aa5435ff123296003160d0e9e4400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcf666c5e6b40e981439058677bc6b1f
SHA1307b497a78fe0ce24e7c81294d76c4c4ac14e1b5
SHA2567787e9aaf23c766b8c0dd5e0c4aee5e55481b74f6692830fd4ad00ca7bc287f2
SHA5121d72dd92f84505f028865f1852fd4ada5c48448964dbb15d1a3419487777f02d6d54d1f521790672f70f14c114e989e9651f686f1bff18775286e27f404fabe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9b6d1ae239c462660d9687a6cabfef2
SHA187189da00eb9ab0036a20d37a20cb7d55fd74f3a
SHA256b7c7e1fed7e35687d56799ccacb0d57e03e793e8f51abf942aa158ea86ed331c
SHA5126dfdb2279ecd71469546ef9f5356fd3f105259d22633db4e06aeb8d5a6d0ff19f2cba7769d4f0870c35d182a8930ffb1f815b23981b05bacb5a8ffbd2a3270e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574cf7354fe10913a6e791c5ab678160c
SHA1aa6ebb633db5baa9232b7ca62f27729a60d8744f
SHA25651ba5abfe0ca39f7836b5dea200bf5ea2733f482900e2e8f0133889b92414434
SHA5124bb65ab2a80748e7d74427d0d9200c823b8e2be44b7cb62113ce3fcc298cf4c8215f3b7eab9e71910f90c68cbb627a1610bebeebc7f8062215ece863a8a8d71d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574cf7354fe10913a6e791c5ab678160c
SHA1aa6ebb633db5baa9232b7ca62f27729a60d8744f
SHA25651ba5abfe0ca39f7836b5dea200bf5ea2733f482900e2e8f0133889b92414434
SHA5124bb65ab2a80748e7d74427d0d9200c823b8e2be44b7cb62113ce3fcc298cf4c8215f3b7eab9e71910f90c68cbb627a1610bebeebc7f8062215ece863a8a8d71d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563611edf6d223a4437d1941e87dea0e4
SHA13026e7a7bb6c11071db03830067110ae42c1cf35
SHA256b6feae156b3003dee8f03eb3a12ef7079f432f4c181ef43e649969aeee76343c
SHA512901d1aaec17ea463227e8b2cdb466e17e947d68869ed4b797a97a8614f950b004ae1c426202fb440edda257dad2c59d7eb73e59281a6d5d22b4502717cbc65ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5291a4e37b7eb38b16462e6d0ba5abdaf
SHA18e6941dc0776ff47261a3296daf7b08402058738
SHA2564614cd31016630dff380e7ff74628529c518ba0ede4369401c5089f7365859c3
SHA512d2d2bc9f928887f16221da6da4284194aeb02b0965acefad911d4c730617b661fd25813b4465a7e30e4511f32d9253e0ce12c7d02659be480217714c841bfd13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502385a6f4c333adb01dce00a5f7a8643
SHA12d738ac338a78c8d04e29428ed04e02acd91b5fb
SHA256621ae08c87e8b20d0da2599fd6c4d70045a6c78f69a7da6783b60bafd80e8055
SHA5126fb8f89dbe48428822e584db8f532a7d96b28285c18dc53b43b7675b07020172c6c996dfc4c897bb19a07405c7ded359eeb655031db1c64d53d828e0d69f83cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523acc28da3f6768e619821a121052e4d
SHA1396c8a3bf9ef14d4503b03a9f21ba44d6f7dbd9b
SHA256528f13ec9c2671a7a3659bebc78f998732c45b42cb172a506c0d1aee35f66043
SHA512eb960ad755f45cc61d75be7e22e65a295c830fd5150e03d967ae10adfbd603119ec85328cfb1527ff91c821070d4e727231cf6d94a2aea2902caed5a4a5c1d34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55daaefe76360b0afc4adb96e5755caee
SHA168dfb4d539f0a70663a59a03f2846a15b7f5f18c
SHA2562a9958259aa0bd9f1bb50771a73bddc04a7be4091d43bb168d89a76d85a7442a
SHA512318711b754f853c0d20835a517f52ab08a36a863183519e93a7fad232b441d817fd8f3cc72cd59566cd04ae3b616ca72f26ea7c427202497ce8cc175fe870439
-
Filesize
61KB
MD5e56ec378251cd65923ad88c1e14d0b6e
SHA17f5d986e0a34dd81487f6439fb0446ffa52a712e
SHA25632ccf567c07b62b6078cf03d097e21cbf7ef67a4ce312c9c34a47f865b3ad0a0
SHA5122737a622ca45b532aebc202184b3e35cde8684e5296cb1f008e7831921be2895a43f952c1df88d33011a7b9586aafbd88483f6c134cb5e8e98c236f5abb5f3aa
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf