Analysis
-
max time kernel
135s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
20-09-2023 23:48
Static task
static1
Behavioral task
behavioral1
Sample
autoplayoptin.gif
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
autoplayoptin.gif
Resource
win10v2004-20230915-en
General
-
Target
autoplayoptin.gif
-
Size
374KB
-
MD5
e05c7a9974ee490c9fe297d73dba0a42
-
SHA1
285c9d4453af92222c679fc0d9b9deb95f342b7f
-
SHA256
8fd2b471c95e14e08eeb2151008424e53f72cad4ada494f1637f4a79e7a9b69c
-
SHA512
5e7f56e12e283cf8cdf3b8908861e6860c796dca8b0e0c9eb75a20d4d8484f40a8cf6ea0ca5ec9221fefed7f42d4e499f78e0ae1f89a8873e88e898fcfea74de
-
SSDEEP
6144:QzDVFFOeUhcoOMArCqZ+Oyp7epp+Z7Aj0K7PWH0vl8ee24FHvUbSvb+:kO/jGCqlKeuZm0KqH8l34Jrj+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d087c80e1decd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007832999c35766c4bae1b34334b3bf81200000000020000000000106600000001000020000000306e78fbb32aef14b9bb567793bb82af8fbf1bc4b52a83b6cc2de20e2760f802000000000e8000000002000020000000512151c0c96ec4168148d01fc17ffc32b2bc30a45c495ffbe6fce2f9e212d001200000005184ddbde5e95b75f511d337b13d5edec3d25792003f2bf455956685faedd81b40000000f2ab6dedfece9d348ac1381a34e83171e170d56109e91d98fae399ee049b559be40792b0ecaadb5854e0e2e0cba23f88a7fa16ea3abbad8895752cebd5dbcd4f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{398F2EB1-5810-11EE-A690-7A253D57155B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "401415589" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2276 iexplore.exe 2276 iexplore.exe 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2996 2276 iexplore.exe 28 PID 2276 wrote to memory of 2996 2276 iexplore.exe 28 PID 2276 wrote to memory of 2996 2276 iexplore.exe 28 PID 2276 wrote to memory of 2996 2276 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\autoplayoptin.gif1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2276 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec226ad96e30b9c50efc1eb205446b97
SHA1c5de7c4f7a7a42c7454d8ba4a2596e4c21331ec3
SHA2562bf8883d7648db62b4001e85c53b1800b2bc0da2fd1fb574fa1c7b6b95b527fe
SHA512fb25c7c12b32022fb3e84e180080a810f54bfe835f09d330b7ca01ade157dafd2135dad7d230b07cd9b0dd91f5c07ca0ce944f01941ead43cb7e82abada0204f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9d6d9ec7e9d7f783c1f40b8e01efcb9
SHA1785f414cafe6911f23342154241a4d77c24822b9
SHA256b14eec01469561f78ef418cfe84a18c7ae096fe043a9d49c3eb9353d856675ba
SHA5129c1181450debd09f8e7ce97fa79efcf138c0b1389ca00141d44a5e4866d1007df38c772bc276cf274b2f8bd274186972947e7a23c02340cae1344c1fec3a86a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d477489bb8b512a6c2d0bc13e3ee94c
SHA1001cf18f906661177fa18d91437759efd26c7409
SHA256c5384444c766ca6058d111ffa750a2ec33b62e317be1a76bad8a7aa52b176061
SHA5129156d78da29a156608aa094f284ee626ed45af581235704b883ecc4bad5fac145952fa03263caa95989e990f4dfa17f49e20e149513b452a38cfd863ced11dc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a098afccd93623efd8c52fd8b8175c6c
SHA1b0a7a80414ffbc06b63d35d82295262a796c6386
SHA2568c08535733086ad51722d73e92341075c24d1f52e40a7f5be12581dbd487ded5
SHA51273b2696885b029489f23c689da66cd71fb789803233184a6bcdf30600ef8808bbf337b7866b8e814193897793d22a069387cfcdeb40588db230ea52ba4065080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd8760dff51e9026ae72d2d33b4abc6d
SHA185a70af99df2bed0abcf4fa81d6341f47e144f89
SHA256ecc5ce6700d961d49ab71679afc66a000da74063e59c5a50c4c18e2a5723521e
SHA5127884b7f55f65e8975b2c07106478aefa83dd15f820bd9e24f870bd2bd1bb28c4bb32eefa263df4136f43d588c517991cc8b8be7c8837c4bdaec946f2afbc14d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ada30a3e8d90508e18c0c438e8c93574
SHA1c497c2a715b4879cf9aa011328adc0681e64c63f
SHA256edbbd384ccbeb5bea003c9c6341ed5381afafa454abb5f5476fd37eed234015e
SHA5122f410731e7adb832df18cf023a64b9e622ba914e273f6359f7f2328b1ff229c23f56d56a1a4933134fd047e79d0fab719e390ee4e072d0607914fa834e97135c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9a6dc0071a1040933d1d264fb5f7c65
SHA121ec2f42f20840a1e5343974d1d15f6f3f760f4f
SHA256f01ac17696329f342c6396f0b8221a32aeec453b49eba3742eb88a4b5257376f
SHA512e01a9fdaee5a1d55fecb3a298cd11c9f1430b8cd7314a8fc8f4781c75a056c3333be481ffd13d150c906836454f7370d2d0fc5d08ea6c5f3fc1f8aaebff47c2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc9571ca6fe54be76bef9edbca7c6f2e
SHA12c49fc1f5886f2724142e8183cb509fab3cecdfc
SHA2568830fc1826260adf00021739118c8a284c6cfa47d2471e06771bff43a9cb340e
SHA512410e75b2df8b240bf7955cfecfe934af5cf3d34d71e7d1308520ff7dd8c68b956a4106975fd6544d38259f1de099144f76331a7ecd91711ade497f0afaa21b64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545a98403cd6f4377245a7d1cd83421d7
SHA10bc1035f710ea8cfbecf2e8cb1ec02f3aec65b94
SHA256c973be11145ab8e303e561e4caf625c0d4db24a3dcf5535cab031dcdc9400117
SHA512230251fef34153d5819cda3329fc8ec55dcad8fde6a28ebd1cbfca35c8171557cc3f03123f4627279778b3b46fface864fe93ac921cafafbed7e61538b294c46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52454003a6868195ad728bf6336fc632d
SHA10e4a15c92af943196d587ba70e0468061b21855f
SHA256f212fca448201ea67709bf25e5fd84ba717990cd214a71b4030dfc1d1a8ef27f
SHA5125563e8bb256c8cbf41a08e3df37f2adf70027175ead92822962d4be1d75a605ce87a5c868101149e3814b5627909b516367ead27829d9e28bb496cbd936613d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de05941ea090c1cb43c016538c59def7
SHA189ba46788b9cc2c5b06d5fcb7e7350afaee02f69
SHA25676dbb5be3d5ea30d167c1efae162ce41480ca3500624d8cdf1e74052e33e091d
SHA51266ecc1cf24e693e3761da35ce07a4f8a720f1adeda969acf41a6cccb7d53f1204c211f242cce8c433aace0b542e68e6e292044986cceed4d31b3433b62ae371c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6e09950823472b68e18fc2e004f0a8d
SHA1ce6dea45f1a8961acdcc4a2c4f435d0d3ad501a5
SHA256127f5222e7a25e166dbc1cac342105a43a66054547cf0c89491897b649415c25
SHA512838f15367da3e25ac907b431881781f3463802695034d5d66a9c8aeb840a7d4660900c0ca27bd6457996a72687efdf0bbcfd2c1c6333ebaeeef619569c52e776
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507e833ed6a3effdc5d93a31227f72068
SHA1c75bfb31b501e94eee8129895a617b420ced8333
SHA2560d7f6591318526af07e1d8b956fbaad09463138646e20ef3a98fe8340339f967
SHA5126e2b5bd4dec095a76b5831683999c362cc4584d65fd827a336dbb759825c6123d5a493559223a9ab06e4b4ab9587fbbf2095d951ea9408421014d6aa2139d42f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0ceababa51675e50f23567c87afc1e5
SHA1980646744f0264ff4c66aa504de80cd461210442
SHA25622e3f55367103214c304bc322ab55b56ece62f069968003d7736c4002aa80aa1
SHA512c9f3a77f68df90f3d947975b9a0023d6a9759ac326d387ec2545d54e328d00e359e3206f9d11e939d122c64d24dc520351b89eb41039e0279732836c05883599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596fc0672a076d576d00c061c57e55f9a
SHA13eea0a18f93f1dc3b813ba6db2d160fc59589875
SHA2563e69cd0965d7f7e1aa04f7f91b8c303c969e97bb60aa330f152e14aafb9549eb
SHA512144e7ca2a073a44401feb2875f7a30a3a7000694188a95202e22e6622195e541e2fa27827161e4e059ec1249178c7e35d4810f44dd88268f99012319c566c97c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559118f7fc33252eecf8f8cbda8f52569
SHA19d2fee3255d30a2c62d6431db7677304879b85dd
SHA2566a6726e4ee46391e9d00bf2301b9636fcf088eccaba8101e4cba9b2cd0cc8688
SHA512fa121ceab0c722732b1be8365ae1899b9f4bf17034fdd8f864cea61b53cc319220e624009b1e298dd77e906fb41533c31e9dad8c6afa1c6cfdc372d6060cdc00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ae0da0f77260bbd0fb881a4045be724
SHA1d0fd63b4d15a4f9f18364b02ee2cc0c243a8127a
SHA2561e267ab20f5ce12d1c288129c5176ae0ff71ce726df74dc177e79d34df9efbf1
SHA5127d122f0412d2c6246555a92cf5c9b1b1d58ceb3e3da43329f68f3e4b7c20cad0ca382fbede019828b50d2566cabe185b2b834e976131a937d42f8f445b5a4632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a8ec140b016c559671829ebe71ecc0d
SHA1d4b36612a71424c63ae6049843c8c3cce1b1ea40
SHA256ce63586b385d215618d9009b2d19e89d366c0f0e0fd80f7247f0be8d41612e09
SHA512a52fd1d8b60435b358761ad7e6592008936cec34e15a8dca57e547778273aeba37802d62a694db4a2a2b7324226e348f7b58c08a53e97ebe93822bc95279fdcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3bf14b5530b0651cc0904a6eb5c8a98
SHA130f7449839cd8e63f7bbe6879215547edac0c1bb
SHA2569cf6552fbc88c8dacb22ca1863801db3b2825ec9b5a8fc923a763cfa4d96389f
SHA51260b50ab513db4ef91c82b9857858412075e1a015a4369e88e4c61410b1dd1413f1cd0e31900273cac657f467d8f9e7fa1a23a23688d25526b925824c392a6594
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf