Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01-10-2023 00:13
Static task
static1
Behavioral task
behavioral1
Sample
idiot.html
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
idiot.html
Resource
win10v2004-20230915-en
General
-
Target
idiot.html
-
Size
1KB
-
MD5
d831ce75e4c598d73b3e85bb8e09b6c1
-
SHA1
a636f3945a34615d4cd6fd3b0613227c6f5b69e5
-
SHA256
34a4d0d9ba8779f8c7ab17105de8da68c981f06f06775f94b65cdc5fc36ecdc6
-
SHA512
a672b36a2712aeaa45b9bd943cead13b876f9fdde1d0745746090658975d5345f0ba604e41c5e91cf73f59c38f3eac5f638f3fa9d5b6ed3430f6bda5aa2e841e
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "402281096" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0beb838fcf3d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{63D94571-5FEF-11EE-B5C3-5A71798CFAF9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002bccc567d90a0b479b49b1b2d43318c300000000020000000000106600000001000020000000a17af62e467999acdcf0da294e39933464b5552064d534f55453b5e907b60f6c000000000e80000000020000200000005b3572a75d76caf27dfd50fe31ecce34a48524a3b186ffe7306e7b6699fcacab2000000016967fcbb9da6c7282beb13f3dfb6f40f554d89545c1b769382f711daffabde940000000c30974dbc026455660ac9163901361995b9fddbcf8ccd9e0ac5befd5a507dceae609ef3d02b250b83a598f568fe781910e7033d868f1ce03d346e9dd4c62c6ab iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2016 2148 iexplore.exe 29 PID 2148 wrote to memory of 2016 2148 iexplore.exe 29 PID 2148 wrote to memory of 2016 2148 iexplore.exe 29 PID 2148 wrote to memory of 2016 2148 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\idiot.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ea3263fde8487990908231e89bfe4a9
SHA1b78e5aa9b8e43002714445789aacec6a86879c3c
SHA2567e700bb8b5d86d9d8c8fb1468c1d0939c7e391e10ecbfbb05f76214328a4b924
SHA512b4b65c9a76cd6954ddddd4843833ab655e0d9e4a2e96d16a3ab948688895afe05df3e4d535cfdd1faedfde62df8827f9227d9dade57c932500c6d94cf995fa2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fa1a60f7961fe2c378f84ce06b1d00c
SHA1276e952dda970d816b088a0bde04643abe17fb04
SHA2569e28693a0cf2923596126b7a711037924cf2598bb9b21565228df10e736723ae
SHA5129d4556ab5d5e60970a0a3d73cb806ad606f564819519a3a1e60e5e89a516b7550606c20ed4eee9d4d9260e5a360539d6f2ae5ead57b207eec874ea723877adce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5728c5d56050f428a1d86ac3d9d8bfe02
SHA151af9291982137979232f4d68ffd619617a0ae3f
SHA256cb7a052f1a427f7acb3776e3add16eaf0b486adc0e299db74b19c6eae287ac3b
SHA5126e6f428d9b1b625946428648019a26e90de637d0dd5324b0f72cc46aa7471d4c2baad7fce202f8de1932a02d06d5519af7bdad94d4bf8cb476408662136dc414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55dc7e1742910d5e0c740c005177a80f2
SHA12b79594e9d2c172243d77d94e03f07289645c9bc
SHA256e60a6e9eee233d850b6f19c3b59d3837a9998d88d2809b1d27c41b68538dd078
SHA512fdbc08cacab1dead7f8422c233bed6e6d141ad8ee7967ec782f6336dd74ffb5e12baeb5adb8b84fedf1432b2e187bb492347a4b44140287036b483c3a1f9b9a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd72e1fe0ab63c893dc314c425a4f79c
SHA1994347ea05c3c044be3ccd563c95b1270465e3d9
SHA25693e3678ea3431597fdbcbd6e48e57a40b71c5f03631a175372b371d50d7e481b
SHA512b55d39adfa3657367df8dcb325926729b8561662172c8492589891018012e92263044a8db5c0b9dd978ecf5de00b49284efa940a749d8df12953d8db55c5831e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b43762943458e1fe45c10b698a38db50
SHA1b5f98889d79c8d2fad358d4b2ccb88310dced67e
SHA256eba0227fed3c4290733ee7b836589948019ed466d3d83e723ecdd201d4e21ebd
SHA512d630f96cd7bd0f167e6bf1ff288a5eee8ff2aa1856560e59a60479f7fc7bb5ecc0aceed213ebce6dacd248cfeed4372143b3ed04412e2fc6bd8cdea20f9cb5f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5768736a6ff2727fb2dc469982d081150
SHA1e88ec1757a3afe659868d9d414f6e93bfbc06e05
SHA2565528bf7d3bfa52052ad91fa072a1b2bf3b9481e3b05e8d53f79faa48dd3d483c
SHA512befbf0a20d93344eeaa4daf47a08fb8493909c4680965d4e7bfa257472212b69525b965e4d724b5281e5568de15b2ace03a4a4e8c28aa8161657e9349eb696de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58acc95b596ce0b9fc0bea561ae774d24
SHA107d3ea14ba700f1716b5e45724b0bbc55ffced25
SHA2563520d711b9c5975ca194d2420ff6f41ec876d8cd6228ef3a950dd65482b46325
SHA512969a7a7a7b8395e733e288eeab06a88d6f7437848a99beb185f3dafbcaec34e5aa3e2e28698b19476e649c3bf80bad8f9db8fe66e579326b74181a0c895fe398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b568e738ed1e3f5c157e9fa928f6d879
SHA1d51517ead76e33cc9bd22e6715162255a5398208
SHA256e791b97203696c195e129b694d892b986db76c54a159c1517b4693dc587af520
SHA51246cf4704ce1e4733321466dc462469465efbe9f0d2d304f748451077783fba6a70056e771ba975889c12d52fb3b5042d33fd8e6163160ce489a3b08744f42dda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab47d973c5ee4d34342683cd0a7adb3c
SHA1130eb219fd2b6ca6a66405f4f13b873ac759b367
SHA25638a77e012d9fa85d6567bea1fc6b023c964d84ab0941b27c0cd9155bdcd9591a
SHA51225186daacc9fff5dfdc8602b192d600fc9925bff6acf9170d98a368a1b9b8529b9c4f60b2686d8ea5d9986561ab55c1e5fa8839167661a1d6335cfe7c6749d20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ead482f495e5f0a16b77e5d13ed529bf
SHA1baf68a6d0df72458c8b9ec2e5f00a2ab5d6b1b50
SHA256b8eb255e763dc08356e1119aec7a6466c1fbe21619532ea1f9abccfa16651a4e
SHA5127f4c6c107d9bc9272b1498443bbc43518e92caaecd7e0197489cc7b6c7ea963193e1783c63ed83fb265b78da41f9415e5427565f39ebfb1a13584ba7004ca0cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3957ed9762051273d536fbe55036db1
SHA16c5f699084ad4dd7459019bf55cd6f42d2cf05b1
SHA256bb1cb4c30c1b5b054238e266033bdbd7e3bd42c07b6046555efeaf4b9c062a0e
SHA5124977843f27fc6242f3050984f5e7a641f5d55e88a15dd2c9a4332a55ea357aa7fb4f300e0faaddcd2698cdc4bf0ed1ce0241348cf1f40a5743d4249ad602ae99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9f34b786be5cb887245286124311730
SHA18f274fc37df8a4786aaa22422554e02e040ac81f
SHA256289cfdb20346c9296ba9a914e3eb698faf83c7a5ef86af432f10fccdc31998d3
SHA512f7198bc33c90fdb94f6adb338d41cf6c63272e9b85822a8e160e737898f2997aeeca5caeb867e3eea79b8b9acbd4831c5b473fb2bcd190a9fa06c066b92a1b7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb05d0afb88b0d3da82b0995cc65f31e
SHA141341c6abf685d851bb83cdbc7b9e878d90b4163
SHA256e3add512aff2439157eccb4eaaef8d5aaf75572268ed9f79da44fd0673484cd0
SHA5126f9370e5e1ca3c9405c73c8829ea254a8813f85563766641aab4e916c448f7ccdc038610c57e3a22e35b5e6ee764149571c4875355385689a9ac30aa12a399fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504bed74e0e3ef5e3f9b1d7e3fe611f17
SHA13233d4a504b9364933caa300849819b3d55da5f4
SHA256adb06a34a1dd7d66f53f9f4c9327f89ff56a6d10a3ced27195a7dfaa302475d9
SHA5123e991f1bf1e895915a9ba2219484f91ccbaa8ce7ac5022ee062345718cc04eadd981eedd81bae1e140ce3ce14c9fe146667750920e91b4d3c71871659bad2d8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5029a3617837f01e05b03c702d7034097
SHA12b4038de918b1f7566039ec8c6436759cc6de4a9
SHA2568d8cd57f4ca710b91ea50907ce83849988f24157e8cc7f0770613e4f4198231c
SHA512bd42f7d6795d4446b914826b9cf1df3574161a8f8add69ed7e3443cdc2969f8f2987b63b7122c286e926854300bbee65dbac81369f4c131779d2152f4f968bc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab5ff783484af028d8fb07eaccfc1d7f
SHA1f8cc6adf0a55a65ad2f4bfa8a23562306988ac10
SHA2569afe0ed45a2512a853154a08d1ffbb31a82be384f7dded528e7f9918eeb2c68c
SHA51250c61a0f21a81b364354b86659b9933fca8d926d444dc3a1a461475037ad91b24bfef948add7a130adc93a240f7e71b8eb84a1b618882ffd0193142eb40f2c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d67c22ea15cc6e72ad99aed936ce04ac
SHA1cfc1036e59d5892d3abdcf05ca24cca45e9f79a5
SHA256c7a0bf806d378ffce68c4ee20e06d25231a35dc9d84337ad31007133d03c9fdc
SHA512bf0c3b7bb35add74431ceab5472683809a430c496df80966a578d39dc5b8521d90e2134e3cc6e4ce80d8418ea12e313d2235fb40a0bfb559a743e94c043aac7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5414375c5bb73287924dda706160fb8f0
SHA1cf56044d11497245ce37885af524c18840f53c97
SHA256853ab42c89868ca9cea90730bce764481ae4afbef3efacc36a40627e68656539
SHA512f1c078e7402723e7049f7f1a83d63c6a086a8e29b912ddcf19c48bfc482383a46de5cd442899bf3f27244ff76ba95b8172aed96a8e1fcebce9c06149b9a0466c
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf