Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
15-11-2023 04:22
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
.html
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral4
Sample
.html
Resource
android-x64-20231023.1-en
Behavioral task
behavioral5
Sample
.html
Resource
android-x64-arm64-20231023-en
Behavioral task
behavioral6
Sample
.html
Resource
macos-20220504-en
General
-
Target
.html
-
Size
18KB
-
MD5
8318b253535a1dea1cded139c1595582
-
SHA1
24462256c3953cf4004dae519c2b8c9f17e3d1ff
-
SHA256
6dd8489deb3b71a9d3efa35342fd62e3926ab3b41d5a355fea9e32fc22c7505c
-
SHA512
6bd3847d317b13a537f311a3f2a00b08f070025df6f580dea9fd45325bd3d7bf1127c33e5275e7868033423779acaa9f28d6d9474bc5b7b2dc4351bd5bfe619a
-
SSDEEP
384:rxb/cYktDpmReVoOs4bn9ylKeGMUU8HhhboioWG7sMN2wenlhJCBXQL:rJ/cYYBVoOs4b9yI1M+Bhb/IsDfJQQL
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c027c47b7b17da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000efee191c820df7499e31472656722fd500000000020000000000106600000001000020000000ee4db3aee309ae913bde261f616b52704fdd9651133bf248b39d7cbf60672478000000000e8000000002000020000000bba1837bca5aa399635b3c3bc3fffd4e7dac3bc0e8b8d13139b78ad9e2ed1ad320000000b0241fc4b311fd27d2b068a9abc05512626fd2bcc225a05666518206acae38b040000000588ba35c935aecf071176e82f85300469d79d8d8f0ad9f272c14517b9df9fde6b9259a0426ed677daa2a53b960e7266172cd5c6614ce3c3e5b8e04895ad62b3b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A6B5B701-836E-11EE-B7A5-CE48D87E070D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "406184044" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1364 iexplore.exe 1364 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1364 wrote to memory of 2388 1364 iexplore.exe 28 PID 1364 wrote to memory of 2388 1364 iexplore.exe 28 PID 1364 wrote to memory of 2388 1364 iexplore.exe 28 PID 1364 wrote to memory of 2388 1364 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1364 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bf8a436c2893312db7ed56a635e1dc6
SHA15181daec75b9831fccaf89b95f64b5b797babc50
SHA2562dbb14d37885585ee0d8a189a531c75a79ca0ae4c508a2e656f46a56ff898ec0
SHA5122ebd3cc84e70c8d54e7a9e8829079e75825cfb945419696b9ecb114c6da450512f35a5403952419f03f2fb59901b75c81e254d1b976f051ffca3a0cc4e11e88e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdcc2a6f6fe3b66322bfa16d283a955b
SHA16871faefb1b005983aae9af86eaf78821216668c
SHA256b623293016a7d6f9f2e814b5ab6e0b285eacbc40e3bd7ecde30f4e3012a7e3e6
SHA5127a0c4c8657d25a1a6087e25883e01bb09e1ff0def9ae68cc3230e318c9892de03e62be356eb11be99ed39e00c8a32e05407e43244733aadcaab41eb7bb052f30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1601034d2b2681b4e28c35f0cda31ca
SHA18e881e013dbf1bc7af440ad0ed3f80e9046f91f8
SHA2569420dc70e87826d1df2069e8e4b7dd7198d1140810f685e7962ac886809d9077
SHA51269b3b1685ea0ded56d9a1d99f53b77899bba24d99209c05b6790bc6bc0ef5644137168f09307b8cfe87f254e0bd53d85dfcd3328c8e50fdfaaa7a67dea9db743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d743fd191e8348c7008d4f331018a4c
SHA11138e981bc02639ae0288df74926636ad84657fa
SHA256eefafe871c032b6fcd58a3c6f0bd49e11c726e7fcb2f334b49cdc37fb073a3bb
SHA5125d3e88888b60a077dff1db287f1bb9e75c1c77eded8717c6432fbab13cf87ccd1ce6d653dab1ddb86f38400a0d262ecd88a73c5b330d0cb8cdd7252ca8729693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e52778110000f21c5923cfc23f1a249
SHA11822c7446a0a0ed6d0544a4bef915398eacd5992
SHA256086cf646334269263b5649cffaca0e395cb4506888e4e67a4d42bd644ec6d1e7
SHA51268697c05b726f016bd3e27ec6b7f84404eb9fcca853fdc535735356fa8fc8025f91298c0361f94a62434dc1f4bf03ac466a171214fdf0061867ed497320f8a29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b6f5a61aff9e42f6a55f89a3a900aab
SHA19832cd4e5058f673b89e22af281c20342e6b5ec1
SHA2566135723d75b16c1f4574c954eee7e097773d58bcaa9ac8a2fd44b1647d5f5cef
SHA51286c4b03cd94aaa4cd8b6880dbc931557e123127aef9622c38833cdd6ee933ff0f24cdd51b55f3754649d120ffa1ab5697f85cdc5897594d69ffb7bc1d7fba4b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad17464026642e344031ad75f21e07b0
SHA10e445fa35b199ce5f0e6a229a6c20a34f8bbf2ef
SHA2565d23a501e8742f01d4743c913ff7631522e818358c9ca2d4fb9edfddd38413e1
SHA512e0702471b648a31adcb151221e77e0152caa58657f77f7ed5f496c9c0bd9f61417ff6f98bbb767659dbfd5cbf6ba3e86c73c8e2ea3396f7bcd8aec745a819746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531e12da2053a8814cb7697e1be278940
SHA141c33d166d023f7e69561cdf9ed9596ce55a2037
SHA256a4edbf9c874b7e1ad8f5f5d7ce5bf4d34ba0692231f1d9eb1020540ad620a04f
SHA5124f6336f0167514ad1710611e35562a9ebf585ef979ebebad2781a5c6729722bf2a3c9d83bb20786e392be2ee914307aefb9435a9a976436f9c66292d1c477842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa9d84b1cf61623ec4c818391b4579b0
SHA156039489786e4fccc0ce105fb530a364b4b4c99e
SHA256b6bc9183213947e9be1df4520dc0486d718641e3bcd8311d55dbd1bf45d74283
SHA512d7820934b431348535e64e6c5bbe673e6c6dee48f81d98a3e0aa91efa5f7dbad64695023a05bc33cb9df63f08b3ee3f553c87937d6fbe8f1ead448c4909adb04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5131a6546de5adbc0b0f0b0eb798fcb
SHA1e154698e8a402eb96f66433f9d978cded2ceddcb
SHA256f401d264d7378ae42e890e62c4c2f72a64c2f50477436d7d219b4cf084025287
SHA512c62f1eb81f4b53874e36e05499f0ab7a37b6fea8c4aec718da1827376724565e92fa118006c18260486f0111a4004b2a7d105dc90e90ed2d701ce67f8a28d585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a063561a3626735160a037d174ee74f
SHA14116a7b8346b12ce72695174141c53538b6e8fa9
SHA256326377016956ad6dc5824d0fd83ff1c761c9a217f5fdf5c153adad574561bcfc
SHA51205886174e2be6d516a5d936590bdb35902f0c01ce711356625e7d9a992d059488e42928db642f3561aead0556761b531696891109b5b47ee72bfb8852a715ab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f968280304cb44a4d637261b1bc1768f
SHA14233ca72620d0b8386a736e7b2d4bb0aba98f789
SHA256efba94d7a2decf3eabb7fc640fb15e5c2e94e77b7d801538369767e4a3278167
SHA512bb9d3e9e5c62e2545d7a595fac05b43a0c9d59b7b0c220c52d7a30e48a7046eb56a560630621a47155ec84a58b56aa9a45cc53e374cf28121c431beafaa5ca5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4a089e06c7321571f8a8fb788fa72b0
SHA1e587440267d18d91812624e6bce3807f38af09ed
SHA25680737e314936327c25b522542f369360ef1536ae6c199eb89b42f0ab57170f24
SHA5122e86f37a9c8c791a9fb4e6c35c2f1d3016012c0be121db79e62190ed125fe9151f7273a107ad7aff87aae7f67b19819b620fe00fdd25658b5567c26fb1c32bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d8ae075aded1e832b2466ea34ebe2f0
SHA1ac9d14f24d7cbb6cca2fd729aec4e4844ab0526c
SHA256d5140b65c68e5add9fccf63c7483be256ff1d026d09b64817ac76caa61efdcbb
SHA512dc59aecd085d047d516b94acd9093bd895c1b50ed059bb60877252c1e6d29448e062d025273798198b47f825dadf1b3fc62f24ab55320f3b5f1efd93ead53927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5281a992fc820425a46dd0b2bc22903
SHA166026e49ed54466461537e3ca3b72ee8e869b001
SHA2565235949e9b52fd51fe5d45bcbdaaff7623dd4c725acbe7fba1df96a66f5ee542
SHA51251e55c08300f7c90d5f130d7b2fa5421067f5d96ee61828661cb1637401e32d0c0d110e6197c62df49b56a43d2bdcc9ce1e4523a53631f1121616c65db2a4be0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d12d80cfbe911b969cc5cb3ade8aef68
SHA1fc8ec5a52662b728835a02c90579e8e219d80b8d
SHA25632fbe4a81abf6e5d2233ab436a2a1d0789c5d06b154d93cbcf77c6cb34f907f7
SHA512b8a49ab57fb5f1684de844c26bf82fc51563019cc1272d7b0e8f86f03fbf109ed2cf4dfb8543756e908ead2bb02b934c9c544986ef3afaef9216f0461d82e2d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f382039e7887086a286a20c45ba1aec
SHA13f048559a77f89fd87e22caaf13ef1ea8015c883
SHA256514b91315833fcee2badf44a50c21792e169491eede6f2b00f66c19ed6203a87
SHA51239ee023f773c4e6e0f8c23c3e2e13748b6dfeeea948743c495a9826279dba341534136c368d44d8277f21b42b9f7b643dabe411c9c100490afdabf9ef840f7cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576c13ba80ae55db58550dda74965cb8f
SHA1141956fd90fb029d20458be76ed1a398580503f4
SHA256926727ac971f9184aaa128c183b811b5c08b0ed283a2bfcea294b1ed003f59b7
SHA512dac57cfa663e7d1a49ae6c24b0488c3877859592262b3d05df628a4551765bb822d7cd2e06f6020b8b65a57134fc989ee1c54d4efde73f3aa8d7cd9793e3a4d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d8cfb2e31e23e333644d6c9059ea6fb
SHA1bc36527c3ff53790157b1a9b0d0c8513dc0f44d0
SHA256953d4d3cc81028a1b0974a296d51fb208f25db1e0a244171e36c2137cb8fd6e5
SHA5123651e5334b41170bac9bb5fc862c67ecc477d737ac9c0ae00675d1542c15841149355dde31d46db2e7d3350b6720dcb82afcdd84f405d5499e6dd62750d781e2
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf