Analysis
-
max time kernel
150s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
16/11/2023, 22:18
Static task
static1
Behavioral task
behavioral1
Sample
FileTypeMagic.html
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
FileTypeMagic.html
Resource
win10v2004-20231020-en
General
-
Target
FileTypeMagic.html
-
Size
22KB
-
MD5
b3f267db5a9ff9fe5f241bf467e2887e
-
SHA1
c7ffecdf2dc58f3228eeb1e7bbb30bfc8c235b02
-
SHA256
d43053878825314bd66c6ec8501fb849fa2eae04c930a7b5913e8117ce2cb579
-
SHA512
069d47484dd13b58b445be4bfd4d38cce7c6859ea9aa30f2c9603d5227a0a60cb4bffcbdb2e57c937bb233c2d17d010308fdbc94279e0d62fc31eb2acdef9bfc
-
SSDEEP
384:MaFvxfr3udKbiMY1YavAZImF41u+sr4dA4xGCVUnEIsZ5Tk:MaFhPoar4dA0VFZ5w
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60528c0cde18da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "406336305" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{29352C71-84D1-11EE-A91A-7277A2B39E8A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009159649b912a9140bf53d83809c5b2ac000000000200000000001066000000010000200000002432410893c58e7ec0923933b5be8c7bf49e49fd4cdacc6c82ad5154d67c4514000000000e80000000020000200000005397ccfccd9b73892105ff996b9b91a6e8af2dd334033f2d687b01e5fec0269720000000334f65163e8292a0d4e1ff2fc9b824319c3342689d94336c9ebcddd127e55bf740000000c56fe8d1bd89686799fe02f0b8d4761bdd41e53be13a5447b7c671ac229d18707345e55aa3d3d7d374c51828e25ecff3efd28cc512332970eeeebf3ae567bb7e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2092 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2092 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2092 iexplore.exe 2092 iexplore.exe 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2032 2092 iexplore.exe 28 PID 2092 wrote to memory of 2032 2092 iexplore.exe 28 PID 2092 wrote to memory of 2032 2092 iexplore.exe 28 PID 2092 wrote to memory of 2032 2092 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\FileTypeMagic.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db0e0aaa5b01cb5169a6606f10de7558
SHA12e5470c0f62627afd63f85054e02eaec9b317c11
SHA25647b289fc91c8dc447efa9d3a3b067a87083aebc81ec12da32b66842cb6e3d811
SHA512f9bf0e0049220c5627fdc2d22a59cc8e7f448e3cad5e120fda6d32916356f7e1488b66029f7ff56b80d92dd5017253bba6aad6d4a07c2cd57bdabc30eaf118c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500bff04a09415b7a62443c1958c36971
SHA1f37a36071c472b0b64638499dcc411fd369c7adf
SHA25690d46510dcc0df269abaf553859b928352d87e01885d5c2ca1ea78f163ed119a
SHA512ab4990be87402d2c205a28b87cf44190158c1435fd908fe4317c690365afbc63c92efb3d1dd902e5f903f96a50c70cc41ecdd5b2084a5dcb3360574890a5e853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541a58bbc8c516bbdc4644ac3f4d9e637
SHA1110ea6f3f9e99226a146b093bce01541af31dca8
SHA256e1843e6a462e53ca17c116596f1f49db84c0426e9a74538f3b304e738a6d94b9
SHA512bd31e990cde60cbed992dbf4c819504e38e889c0d6adcc2e0c3934f3ba828dceef26982e0bbae21afd3fcbd70df8f7f4b1213e3f943295b31580175fcd4bf62b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7c87c9ba3d59a4159ca1dbb4a96cfb0
SHA160ef851acefa41c413270c48db276d78bebbffc6
SHA2566c223d3cddcc16f3fb1c9a090869114487f6e22ea8c53d4c8ba3474804d3b8b2
SHA512446727d419bb4984bed84841d70cd0efb1410bef175a875cbee2e8c4a0b53ba5de314f267ed049cf1bdc914860de842861e20d436de4146d4ee551000147a3e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e37980f70a49fe2fbc66c01ac000470c
SHA1d314d11878ce07f8371b23be33c9e2f967085df5
SHA256d5b1c832d7fe8ef42eb8604a3b115538cb75731c8519d946a5043d7f5fe4a858
SHA512a4d45564cab2ca53a6e176ab08e0c405c145cca9f906c2ff5cf71a391dd34a2399bdc76c52fb218b461f60fb56152af734edbfa6708ad182e8dce4826788378d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555c1dd2d88020887fca4eb2da4303151
SHA1a2563bb91a949407f21672a826200d9414d681c3
SHA25621c2ab0d9812c5ba8fd3e28878cdd8a6a63d7a11fbc090e2a00c7a5f4cc271d3
SHA512ce6b851de2692e6575ad025aba49f4060c4bfd5e6c2655b6ba7790b4d9ba65a33667198ba751c88627084af4fba776f81d3a3636a0a424501c5af74f77e99161
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d09feba218a8491a6a4710d58b2da5e
SHA1cf2445e8e0204d1f931c464559921c2576957428
SHA256a4af312f2d02759118de6987212e8af77b0b484d8f13734990f0ec7b6d299d3b
SHA512b80b5227be418094e8357da5688ca21ece01cd60cdd6264e3d705efd2654aa6fb71e50d90af0794cd5a78a17830c0cc59211e6b22d60b31879d0c97a706cb682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56112004a7fdea4a86bf00a424715de56
SHA1748e2dfe8e20e3fef207d2a021b835cc13b98f46
SHA25695a11d84b851e0cc884c07c2a6fdfeee403dd8cde74e6a25408a1be284b7c3b4
SHA5123de630450eb26a5f0452dd6de64862f2d34484d2f8b97fbd64e3a45a6f681b4f99b309ec09239f32d76eeeb4c34f9c9b11faadc852340f883645c008bbe985f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb5d9d967ee9a1ddf73285cbc1ad621d
SHA15863458106e1461b74b45a46d1ba5064bc6059c0
SHA25694440853d67ad4f149310b78fb395d3a5c06fb1aac9889debb5b8ff91b33a371
SHA512e1a8dcd43c76dbc0747109d0d724ebbcc889d1bfe6bf6b588f1d7a19bf0aa554ead3e09e63f5cf8191431c504d475e45e02ea6a252ef5c7d9c8c087b8c3ad9a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dc1eb12465b76446f73dbe04645131f
SHA1f8db9a63866768626ee42aa1262205688851ba6f
SHA2560c27232e185bc7be3a492d61ec7da5f304ffc7a9a03f0aa76442ff9bdcf19740
SHA51207f7524ea7b849db755e2f8c66e836e2ae54ad0f7df75563763724c7155a9832048841bd1f816bb8598de3b968b61f07114bc5a457bacdd4ddd550ff42f0574e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566be2e07f63dac55da0c4e71c431e6a7
SHA16bd6a23f1fd0ece5f90457c301477b06bed204c0
SHA25634fc4b030367b318cf482018d3e3471be57035c6ab4b650a6e2e0021d77b8ccc
SHA512e8c815023840a3f26ffc15212a626fd2eea87b622b11fe9f5d333dd021e045dbe43f350892cd7bbb22f8288ce3a01290701a1234aa8749bf051647facc5a2e8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efa12ca9662855947590a0e44a7a57b3
SHA137f84b7b58e2be4f616d3c0c563b12869303d0cd
SHA256bd7de3d3f33b45cf19c501fb95254b1bf17f7d629beff1f577cc8785e2d2bc0c
SHA512bd208bfb059c78bf19001f6332d2a2af98f6759c6e7db221ed05419d78f652d61e9b4778ed87ee348c8b65eef856de5234e0b39886c0390e752aa4b0c7ed05ff
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf