Analysis
-
max time kernel
122s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 08:05
Static task
static1
Behavioral task
behavioral1
Sample
7bb773ff507eaafab40847e63caf528e.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7bb773ff507eaafab40847e63caf528e.html
Resource
win10v2004-20231215-en
General
-
Target
7bb773ff507eaafab40847e63caf528e.html
-
Size
1KB
-
MD5
7bb773ff507eaafab40847e63caf528e
-
SHA1
e38a6c5b13e53c78379f3bb32b0aaaae6fa7835f
-
SHA256
4596dc302d427872bce9aca3207ce446464e88dff4ce095268c6b7284e97bb2c
-
SHA512
3cf5b8288c295fb9215d612473651ac2bf645a3cda312d9ee77d762cc1e25fe7442926ad9e3a26e0955ff23c3e5197ea6a157c3a463da0d5ea7f317baad03271
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c00000000020000000000106600000001000020000000b62d2f54ed572dac6ae516a5707bb2476f272b0b633ef0cf7d2f91f149f3b53a000000000e80000000020000200000009402fa033683e019bc75fb048cf6c303e5982c69adc67a77f71a5d8eebac173c200000007132767bca2318926b364f65d64b7886f528355fe4c698792dfa086de184393d400000007ff83ea8986b66ded5ec12abf8f1b85a86b6bd56429464ebe2c2e3b2050d6b54e210a68d19c1d1ba1059b59e6a4f310d6a6006eb8724932e9e3f3222bfe9afb3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409401806" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{968167B1-A0B2-11EE-86D4-76D8C56D161B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 301ca75abf34da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1648 iexplore.exe 1648 iexplore.exe 1896 IEXPLORE.EXE 1896 IEXPLORE.EXE 1896 IEXPLORE.EXE 1896 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1648 wrote to memory of 1896 1648 iexplore.exe 28 PID 1648 wrote to memory of 1896 1648 iexplore.exe 28 PID 1648 wrote to memory of 1896 1648 iexplore.exe 28 PID 1648 wrote to memory of 1896 1648 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7bb773ff507eaafab40847e63caf528e.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1648 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f529fbd6d423af368b3b9733d8d6c8f
SHA1e812d3197d7872e4c5530b3eb47bab63e4d4e714
SHA25660c7cb9c7cf9caf490abbf4daab0fd1e0284b90e5b2a5c8211ba6423052e8287
SHA512cd7f697b450e168ae043cc784c167e5d5a0447bbae9256e3c2d0441382a668e9f0ebf0e7e5daf998b12c0e9f350c54bcf2897733e0522e57b1685a9d265f2d64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575286aee040e82a58c7050aecc2b4f2e
SHA1b8cc652d30f7c454cafd3b6e3233f29a957be1fa
SHA25671ba970b0f5e5311f2a94507f133a992173fab3cfcfcab29705eb46b465628af
SHA5128f583d6262a8bf8af85e942f5abce03bb437540c9a590f03cf198cbd4770fd9dfadb9a96f25bd4757b08f3c18505c430b58ba1eb48a75e557bbb5bacc292d48f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52feb90e8ea7f88bc0777475d80aa5685
SHA1b2c0418b86302d31d9663e2d7e60410336352042
SHA256a9e59c52b52b97ab74d2d22a13adbb32c404b3f34b62737239f8fcffc94749e5
SHA5128bea1373db7284a1ed87bbdd0fadd8b3e4a6804fdaf7aa400f9aa64aad2a5a35fad702199ff0b704fc498c184b817ec80d76a170b984f33615e848ed7707fd16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ab20c8d66eebb792bfaa374c171a8f0
SHA146406f2b915606891502913c5a93b13c94ea5fba
SHA256bf1c15a8de13c6f94b69d93dcc15fc06a321684f624e9c95a44e2ed1b1d6ff3e
SHA5128a23a0de5fa8ea13f0e9ce00e76fa9b148b8260fb5be0e23afa7bc25803784832c1817e8bcae84452d442115c6d92fbab15a9d8b6695a8f190ea4ee6bdcaf04c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d322e9fbba9f7939bd9b2fb3b8c29c7
SHA16e70d7a849f6081d641924be8f0fd9af9035d752
SHA256bf2f028d359a2a2a6477f36a8ea22a22f515edbcd0a2dd5fd56a1aecc84fd6dd
SHA512ee8b09f60d38739cd1174fa076e8d085e1102b88e25c55c0d3b7a3f5c3b300398cb4aab0caa56b9924e246e95f95930b9f20a11b20cc0e4108a92d2fae62bcc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a2910bd4e0efd3cdf8e9707c6a6dd50
SHA1ac7e6b69517f1b2de0de6a13f5e7813120324185
SHA256f19e732f5f1122b2c551176c5fe68b476400c532f6d1a3fed32e95dbf39c4cbc
SHA5122fb066bab99cbc5b2ac20125ec46552700ee702f6694858d4a2fbec72e539c227cded4095cf0df66ad8d5fead923f5aaedad05f20f5395cd601e3cc88b453882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514c845cdab84d28160fb0781bdeba80a
SHA10d6d0782fc8bf66de4bc4b6d965072d1d0fbd2dd
SHA25600e7a3e55e9137d45cbe84834d77572f58a0b95953eb974a763801efdf716b4e
SHA512447cf485b2edd438b13e58914d22a2e913b40085c71204859aaa78fd724587dca464aa0b4eebc9f1bcd278ce4c7190bd3c980b5a5bcbc0833e6e64b3db5afc3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f759fe046970885b480d9e3748ad5fac
SHA1daac784f4747cec25a4f26a49eacdc5782ba8699
SHA256af545d7731051fc4af5c521e7ab21a4bb2c64cf84d914dda1f5e54bfe4979ad6
SHA512712576f80d1201f6a610372cdc4d9007098d908ab19d74fb603f9828310e314e491a8948d99b5868efb68ab90e20fe5dc6ddbc5a8e54858c57ca889b92c4b793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552117d14791dc3fbb4ef990b26433544
SHA1d4084b7f05620d24612a048a812d2164886dfea4
SHA2568427bc26ba3368421bfd5ab7112f090dd19d0c98adac063524132dc75bf1864e
SHA51264d55c210fe9674b2d9f7ba47fee4a18a3be0a5ed38c6d98342be90bf4404e9872cd7c4810c1f4b7019d79bcb82a562448d40640eda0a36413a197da1b45d6ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589a1d011fad00474d873225ee8b4addf
SHA10a0d65fe610bb55e2975e702059473aff020e115
SHA25661c9a0eb9d23c07129b7cc5e4df7bcbef26c41246cecc0ad45b76932dcc4275c
SHA512857f071e1d67f9331eb98a2d0fba36863763fbf16c89db328ba951978d4f82ab07f48bfcdea0dd84dccfd5c4f41f5362a6fac4786d963531a317533e581997b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d7d17c15530db8b0e21d7a46b38d61b
SHA1fd20954714c48ac7bf34b92c13aa7069d8bc69fc
SHA2560ae4b15548d2d39a7a1b888160a74e0c06151bb28eb54953d43cc3fbd208e105
SHA512a3725cb11dd345c32c84f9aea64cd53f483b7e9ddae5e9a51e8c4e7a587dd94f3183477b54f061c346c072bc95f21550d72b4ce5da3ad6684c9b952eb0fe9213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5930bec64cb24be17a502504a130e5f95
SHA19a2d9e96158d75762bfd86bdb35e0dc810924f3a
SHA2563f4f22e564f5816206bd43295bcfbe512dc82c0d3eb6945aa9b034dd90ba0532
SHA51261b4a136fe48f0ad0b0adfabc22ce433f5039fd77dd60619339fb535dac7f70c47c0bb53950c389794ef1747929cf22c125cba50f1ce5c58b9455fc88384ec86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b9d1c279c0a340de3dea4e39d8ef962
SHA1817a95e96579892929e5a2bb3650c2cf9bae5b16
SHA256d5fcec3aaa32b4a16784ee8805c2dffec4637f6af0bf6f6f4733841e1745771c
SHA512eed79cf8aba1f74c7b8290eeb7b7474d6afd75f496f30a4f1d5f10fd8f2cd16cbb4a2d2e2d66dff28c31467770e93c4a1d989825164c0234f4779f4a26cc8a5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510447eb3beef2cf6f98bd72d62f66b04
SHA1132414a3f46d764033600b13037f1cf9a050779e
SHA2560e2d091df31bc5a98e042d5f8369b71aa78429c10b25228d9002fc4fc9259e89
SHA512b8a72d4f16e1f7634f599eca4af1e151f46bd8942fdb8241d73cc96009a13dd1d87aacda97e7b1b85f3da1002683f3b38bc9579a4ba8ddbe9164c8e0fc949e7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aeee16862439767cda52e4c95a6e5422
SHA1ded6f8fb1a4967055796590c980f3dabfcc098eb
SHA256de65280142c66a624149c96aad5ff986cd15fe8ef06e1bef88f5045c4321dd88
SHA512b5c44967a42ba0335381f28eff60ac2fc4841806af9d81abeea328e5380832498b963c7d941510917d1393022fd62a7a3069733828fd9f9dbb9e84e6a673e836
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a5e4516728a34181515e9dd73d0b46b
SHA1fa8aa73baea56345c5885a2cccb62d811d129e7e
SHA256e4281193ed59a3700225ed8a1c377b8096c7a298ad7fa04817706cd02fc901ed
SHA512ca96c2530118cfa308225e320c490a0929271864f858923ccbf0fe6c6693d1912f48ed2f7c526e19723e2bfe1dd2ad6ad5c18a7d851ad9972cfb30492976fd60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556bfcdf5a265e04637f1ccf57ca29fcb
SHA167c4c18dbef9c364e18c54e299a9debba1d70888
SHA2567a2f9941677154891204118fcc6593bc6d4cf5787f295f4911d45365ec501a6d
SHA512a38e55936bb7bdfccd37c9c715a71018d20fba31faa408572753b0d2904d759a147beb3e9a5acbabbcff819bb84c9aaaf58ddbc20148927bd108f21e6d886d2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f17f060c8b8016e2cfcf8d4e82ed0b79
SHA1fe7b0ccf23f7c300725588c1fcae2a893ccc3b2c
SHA2566ad26af99c70723c114f82cbf6d37425f97c152b402d98335c66d30b25d161e0
SHA512be7436e99539991c63577ba9a49490c1470895e7034e9f438bcc82351e545ce0a385348a105e45fc2b4f5cd3e0aa7bd5df4b13ec02c92fc97fa3a753bdce81e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533e80cdd3e1f8de1b88d30896df80a1b
SHA13eea8d5917f1ae2321a788b70413b6b447037599
SHA256277c7f3f814364bc2a14e4fed534d4264f7506b6096f7641d6f98fbde6f38c7f
SHA512f2043eeb5b90c922cf040547a96f69c05ffc93fc76a4e124ebef755d1d57a8f59be54369d4ab0515f75d0d24b8bcc5d1208eddf9ebf719e2c1c5420cdb2371c4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06