Analysis
-
max time kernel
135s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
24-11-2023 07:18
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20231023-en
General
-
Target
.html
-
Size
612B
-
MD5
e3eb0a1df437f3f97a64aca5952c8ea0
-
SHA1
7dd71afcfb14e105e80b0c0d7fce370a28a41f0a
-
SHA256
38ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521
-
SHA512
43573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 400d0b7aa61eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d79072038c960342ab421b8facb933e900000000020000000000106600000001000020000000ee9ff2bb31f93f7567f65417ffe13c0e6b771f9094654b87611248dca4c96a6a000000000e8000000002000020000000f4b85497d0ebec0df5653f85080f8411ea661b55dc9154b233dec966411f64c820000000fcc05be39503d27b6cf2377cfcae5e97b835be3e4ea575d2d6dc3a9f83c5b3d94000000065004846f5af2e4a0bf62dedb9f7f931cb656be94be65666f88d199a353d66bf85bf9f403eedee4ba588a80008c294ffadba26451cd21bc838edcae566f621d8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A526E8A1-8A99-11EE-AFEF-5E0D397D2A60} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "406972168" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2984 iexplore.exe 2984 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2112 2984 iexplore.exe 28 PID 2984 wrote to memory of 2112 2984 iexplore.exe 28 PID 2984 wrote to memory of 2112 2984 iexplore.exe 28 PID 2984 wrote to memory of 2112 2984 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2984 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9a7178fa8fa77f7de5644669d3df02b
SHA1a340e221d337e912908bcca76bd56316fc2153af
SHA256cf5358d7c30375386fce4346c3f06dfc25d9384634e4ec99f6d8734014b27fc9
SHA512cbb9dc77ad1bafe321cd68b6dc8e13038077b0a804fa04ac9f96e8ceac00ca1520f1caf72f0d768e8a652d19b7c7b6377ec66b5540bf03eaa9e78d25f393d449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5853666754d0624fc485d9df403a5b41a
SHA1a44e20eced5b98044659c0f73b977943ef4e9142
SHA256c3223deb044e78c0f9a8f62b001123d6d3d92fff78ff5b2a15b49932462005c7
SHA512e28694c65f5c004d76a4c3f5e811795e4494e4c131e5298ed6945fcee8b4e0ac02cfefcc0505db4ce7ccdb911ef85b03c7072713c940ea50c94b0f51001ca4d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52eda57e052690dfd4c67faf983b88e3a
SHA1f9976051de437ed9bbc6e7b74cd6a7cc5976702a
SHA2560445f0d94503b6994697e6059a924dded055cfdf1b4281c46b7680ceea3a5072
SHA512e7921eb37a43dda7a13119fd40a7084a34f6b6635a4b25b379d5ac519e38bab298dfb19deb31fa4797dad8e5aec1659af847fc96fc4e670682ae77b8bf4a5048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bac4315cdf9cdb3c9a5e46a530312109
SHA1c28030900862ed45467cf7f30a8b988c78a5e3df
SHA25623166e8f371315688eed08dee81be72cfcaeb9cbd3599904940e6e9ac0e3dab4
SHA5127ab23cb690ea8a2a29e76d71f0d9cd8731a36d3c8b3c6555fc37a250ca894a2d7b9f6026411d889af2de981640710d0d087c43f40b63aa46898bf3dfd0eca78f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abafa27ece48fd3b50ccb68bd3db6be6
SHA1411e11fc422f4eda0c53b25c8c99074fcf62d38e
SHA256d48cc355af820203d8bce924a131f9e5bc56fdc56f717bc7dba246ad248acb0a
SHA512f1af3ed36ed9c290b7a99b7b0722fad028b66d5300a24278b4bbdf06335df138f7f956486dc9525915349448e3d4fb9b835d0f53cf1893971476d62819bdc343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558f4a6dcf887e3546be10d2d39425ec3
SHA17108dbdcd07ddc8d71772aaccc838c4956322bad
SHA25682d7a83ec74b4d5cfc6510aa5b206e164d0f3e25fa9a7599b0965096dc15a405
SHA512f33ae36c62790f80d8e78e18a7f02aa77174fb5e9d202e987cf2f8c997d5fd8e95f0dce4c45eb123da4ded080f873440405d0891767db20a13708b581ff05ebb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e7f66ea556507f8eaea21ec375719ea
SHA1f10ebfa7b5ef5dc6fcee9fd9c097418191edb48b
SHA25658e6a9e032176153ad0bdd7092a60c77d994af7c09fed39baf2c7f82f424dcde
SHA512915b236051602bfbf8225eea7617492cfde4cdc186c66a9972c516542d1d248b7cb0dabec462ad5c1fbca14717b8862cdec23e43b3b0dbe7513d254a6584f768
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534a97b8cd5776f7dcad8d3c9de246481
SHA1fc61d235243ba53f534429d2bead317b864fe8a0
SHA256ffcbe0f79c246fc9cb49b231eaeda39a9236959ffc4648c113da9748b83c3f30
SHA512fb467daf2f260eda2e146fd0f32a5c81f2b76d6e4934c885fe8b147aa15170db161de1402e0f8abdb195c09f7245a5973fb92816c8e39873878b70c8627ea9e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54edf9554daabaf15f6f655c54921301e
SHA1e50a6b06a498e90e58a67a94a6f1ffcf67f76fb7
SHA2569961ab5fd6d8d4b7bd237261f8a8cf5b133a97f0be696a94b71e216abc8aace6
SHA512a7ad171c07049e8d2ba78fff04e19845d899929b0aa2af0eaec0a87893fe61d27b8602c152b33535709d084183c41b850fa426775496102aab6ee125eb0dcfb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51acf69420d5b8adf1efa67fff609ca77
SHA17fd5fe35a20d331a3013f60c58cf492b8f1f11f0
SHA256116cb6624ba52faf120ba9d6a363212d57f1636a8e130f737117c392c0454796
SHA5129edb3d32a9fdb673cbc0c0a436894ef2a02c8424f871c575d3a1fa6d5a0e4ff318d283b917bc86c7d8fa19b3b7b8966f2fa47430bcbd9470666b628c60dac50f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d68aa629274a274e1bb9e3703ef06ffb
SHA13dc864c97cba5e741dbc0ce21cdec3452aa34ee2
SHA256eb5b533df06193f66bf197ec6ab9bea96ae0ca52b147a919bb28ee8992016a60
SHA51207185908c72e46b6a87201c832ee10dc108ff3b8ce7743c71e1cc14d892105d33be9f719928b791c402f563226ab19af05517865d79a0a9b46862ccb96eda1e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cbc2a82c3bee5ee937f82765cf5e870
SHA1e5b96768e1a43c882751b9ab5fbd898f9024d218
SHA25643debb6450be0f855f2fd26d12762a3e243b1aeb956698472c5d1226b0b94271
SHA512e190ce042722a5687b1c2bf891242aa7ac91ecdf5fe3877d4852719328b6cbddf9be1854db4fc0c20e17f071482751ea70404ed06b50ff317b9843bf385f206e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b982881f8f3ad5214c05f4241161babf
SHA11f29b270fe4f2f3efcc7f8a8bd0910cfe986dbe9
SHA2567f072d50efff8860357e9c6e3efafc950cfb541a0694dca1e383788460499051
SHA5128a721a59f9a220e3c6d16b2285a954cdb80573b3af86de26592304798730cc5b28c76ed14618db9c2a571bd675a76ec0f04e18a51d54cda27b743bce07fabd98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5943251149f1b77ba8db72be87b08ed93
SHA14ce9b21a8f6304132d8b1cc023f3c3cd376a5af3
SHA2562d5ca7a4cf7d8635df102ba2a1dacf6fb770946c960eee301a0737c547102e03
SHA512d4b6f3b78c21b4987b2ff162394bddd19582c8bb92f60e5e07d5054483f5a6cb26d5aaf623d8ec416be993651378ae9ca5f43c3116ba62645f6fbe882098de33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d993026eb17adf39710f740f155628f9
SHA1d9dc9043024c8b65bc98340d8082348055e0448b
SHA2568c3247f5c2bf0886fe68e52d5e823ee9b3c2368ed6675e32d652b4a825b92c27
SHA51296becd228df1acde43b61eebe51a608a4d9e08299d0a473fa4c7264ddd214f847253cad504da376e4363ae0b8be106311e49c401a5e76911171d508636fcf3f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4c497b5cbec6965c5a3d711bc135bdf
SHA1d230463f55c410cce861dd384767b3279248e6a3
SHA2567e5171f164b37fa9cfbd5367f893b4e9faee7d9cb42118e9434d18befb5cb0d3
SHA51240ec883c25393e080b12c509551a6ca7dce26bd5a4a113a50bae30104913d588002d8a84ca01d473d9b5504fce80f8c67263b6d0c6b3334f2f2d05e15495c54a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb6cf0ac961aeebd278b0041cc52bb0f
SHA1679e64ae58bd7cb10ff657e907e7511c49774429
SHA2563710fd80cb06debfa23f12b5ac12a9067be1429ebed341a8d3fbfd0f3318a1b5
SHA5128962958126cd0a24273d0e59aac5ce09d553bf259943fe144c2bd8bec8e20398811a3ab5f9f0eb8cdae1240cbb46465c9b2f2cf80c74ab569afcd92b36a027ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52810a6ab84a189cc0971fe7dc1093f85
SHA1b9dd1735be455a217b54ae8ccda2e9900fd43b4a
SHA256f50380c272d9620cad65ce715ee67b9faeee9f063241fcedc884a677a3f9c163
SHA5121ebede7070e7b59fdeada61be34a22f2983a8bc943e50b10ea4e29c93d9f9a2bf7d77eccdc076c8c5d409bf2007e80ba78e13c49741079f161fbdecf57139464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a43d5ac48b12222b68c40852d07943e7
SHA1a71b14d69ee891ac9a4fa30e16a22814f469752e
SHA25697ddae604b525f6345c4e8a5cb4f71ac7dc716267cef688d83104f8b1781c351
SHA512715d48562c80d31d6e334debd538f43189666baa60ce6f199d7e400c14933e2b9106e9c42c7c2a52e8fbedf2756bbc2035d15adf931467515960db38887dde23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5d39f45ac15fc6b505405bb8d069c1c
SHA1fb6ccae3c4e817efe5848e6c0ad653338eb66275
SHA25652af9ca41c060b8b82c1bf49ce5088f2950017ef51aa693db4f932a3c9ce6c5d
SHA512904b084d7b9507201bda6a0bd96669f129446368c2d44d58ba1ded7418b24a303f14ce116c1a48ed9ef48195a58fbb53561df409130734ddb94921a5874cadbe
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf