Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 09:33
Static task
static1
Behavioral task
behavioral1
Sample
81a84035eb36fa69dd2c33e2eb6934cf.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
81a84035eb36fa69dd2c33e2eb6934cf.html
Resource
win10v2004-20231215-en
General
-
Target
81a84035eb36fa69dd2c33e2eb6934cf.html
-
Size
2KB
-
MD5
81a84035eb36fa69dd2c33e2eb6934cf
-
SHA1
9991d4154c2108a627798e5ce9dfaec51b3c3fd9
-
SHA256
8b7c7113f24bb3eb686881bc41218961ad8dd24ba2be0796941a478201d6c4eb
-
SHA512
4e7c4a75b082c615d66262fb3c5c4e19604f4029246b32bd0da89148a16b9bf1c0c06888838f3e739c2c82324536ef6ff09b213d81b5a9287bb07da5aa7a837c
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409403578" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0e6418bc334da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B65F7001-A0B6-11EE-AD08-DED0D00124D2} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000000630aa430a649ded9ab6bd8038528f6baa06d9895b2183013a3fa2fed5e45010000000000e800000000200002000000016c26200aaae6977189477338e66aebd1c924790d6db6a276147dba90d23bcf7200000003bfb29404e4f34fb02d9431fe7d1df27286a260bd66010ffd0268f73bad2c48b40000000070f126adc1a88e4bdef77df2db8c47512178091cb4162e26740c98c3359b778d10138fb8e25ae6456f7810be392078ac1ca7ca66f1c3e91f0140c2adecc8c71 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2448 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2448 iexplore.exe 2448 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2708 2448 iexplore.exe 28 PID 2448 wrote to memory of 2708 2448 iexplore.exe 28 PID 2448 wrote to memory of 2708 2448 iexplore.exe 28 PID 2448 wrote to memory of 2708 2448 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81a84035eb36fa69dd2c33e2eb6934cf.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2448 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ffefe1404969a733947dd3f0d99e46b
SHA10ccf0f3641abb3d78785e0621253982e3f642a29
SHA2562f7bcfe9b74dd3f1d57120caf28acea31798c58f638319a5b2d2d1cd43c7363a
SHA512831f4ca8ffbfb1342d2a1e9b81246c721a63b8c186784fc257102b6372c80ccfec5f03a0b707a0eb83a70703d2c909b8609e68f3f740dedf7c9fde4ef597add1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd070b9fb131918ee00f25fdb7f6ea87
SHA1f66d4b6f44d93148cda1b9e9ae6ff89af8b8cbd8
SHA256fb49d0ab965c9c9b968c5f9743222b0a0a9d7fc1cb12e26f374db1377184b4e0
SHA51240f2a72a0e3c6abe0a69ca57c3ec1ce7ae35a42803382fee54a49c5a6a47869ac8b04eb62db6b5d7a6f9aca01457480831497ba9cd1b8130549ad7620be535ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eabefcbed0ee43a2bcb696b9cf4297aa
SHA153365a027cbac683d435a81772268225fb194cdc
SHA256952210e2888efd3fec8d6b4563cc9ad48bd8729ec46840c956e3e689a0dae235
SHA5121b526b245fe70c4494b5fc8a6fbcc6e9cba5a45840c8ac3f0c66a95ce95fbca1edfa700664bc9b5a782d2e2fb840bcbed2c00481426c027ed57c0335f596ab2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef66f7eaed33ba14a9e19ec4986c38d6
SHA1a42ff8029d46b992aaed8690780b61adc5ae036f
SHA256d9305ab0828781a9122a47513948a9b9cd95339f23fc458f98f5ac2bebabb2ea
SHA51246fd40641293014218a820ea830963e968afc93d789006794fa73061f7fdfe127674d11f39b2f56daa216a2aaec181264d679a1c88555e3c318eef7b1cd1a83a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554117d4a27fc8508d9a306de840f9686
SHA178239c891748b9511ffb623e47e178a82b4f0476
SHA256344258ce13999d231f82811c172fb9520a210b0b3482d4fd478c63ea6b536202
SHA512b9b42ac284784c81b98bfca4d5af361aafcd11f2c8ed352beec463f6caa775730b9752987aaf9d0290b0a0a06b35eb5bcde31ec06931daf7170c48bcecf27895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f12f3bdad467fa60ee87046d707d5538
SHA193d03ca4ee7e5b72898aa53932a106dadf0d6916
SHA256e8bb8cae6cd488f1a433d75fd2c61069c8ca545c3bdc543e4a00f63a3125f2d5
SHA512ff81ba9f2d2c08d5c4776bb97c8699c3bc469b12104fe45f466a4082b74ae4615244bfdcb98d3d8d804266fbf37269218457a8ec729e8fb11ba710b40454e2f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f88dd56dd70e63a3bb58ae6117074a94
SHA1028f7bfcd8fff972c453a8cd5da3235b66c3d27e
SHA25632ca7f793acc49654e9b818662f26a2052afa427cd700e47bb38ac6fcbb74958
SHA5124659a34137f90382058734d51d74955de93dfbe6c49b55974b30f3eaa333916b0af9fd28f40cb2057f04f8751c03add22fc09a0f32dd7bd06afdf83291f4771e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5068b730a040c0738e9cffb6f686ee726
SHA143d756e41b6b74a1facc65f897b7fe414cc98600
SHA256ad041f670a8d014bbe54c5dab2a08a12203bf19a43eae82d95746ad05565ed09
SHA512c90e2e397c74308d1956c07606178393b69d57d230695f1015a40348d4501508c69784d297f32173a12674b08ecebb79dcd202c80413542fc47b182046783b6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7b3f9a1be2ed462a59b703bb2677b19
SHA1b77aee3ce8293ef3f2a40b95983a8c2cbd9ff11e
SHA2566834dee0e0bba787c02243589036d790f9489923f44f68406637fc5cb76dd29e
SHA5125f1266cc6fabd853e979a65339a20002d4049d3bcf0e9e4596ad99708247c1adafce258eaee54a72c8191adc61dedb8905bfc21a7661abf3eb29f0f1f183230b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e33e68715f238466b3dfc59ba36711e
SHA136c2df15984860933c87a335a76c41ee40138f41
SHA256fea81d5dca3e6fa0adbfc2d5c6faf3c53b7a42ae7db2997a81dfb8478e740218
SHA5129e1a7399eaee04c39092ff166165fd332f40b13b8d7d2a8f440ffed5f510e17f8c28b1eea1759441852076af557462cff5d14ed8172b1d68a8f261e9f8106676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aae509737ef58c6a25fac03847787be9
SHA1704f8fbc54e0f360856b92377fe1f7409c575871
SHA256c9fd904a53919696b4b94f408bf52dc02ae6e9583fb416dc978e7ae930472e7d
SHA51295c54e17a2962cef5e814344bc949a18f7cf48cf735f39d3fdcb3c09c19d734e629a8da0b1c9994187932311bf1b7d62b860cacb4de71c7adaf77fe30cb77996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac718e06723442b19bd201205457ed05
SHA1228432582eb55e7abc024d4338ad07ff66f0fc4c
SHA25675e534b24da720061c5aec9f1401b3ee88f6344e1eef9ce0ae485deaeea9984d
SHA51268c63fbf8c8e7e1a6ea6976e3843dbc61c66bff3c0688bc2b2052aab2222e2081e93f2e9a71db165dd44aed272017ce41986c26a941f2482554c41453e338b43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f41c2de30f7a1e2bb33d04b79338bf61
SHA197302be37ffedfc81894039e4f5f1af7e6737ca9
SHA256c9dc40a03e95f4c89f2e31d75b7bb5605d88205cf25eee15b779dabbaca6ecef
SHA5128799f26dddf5593e14b477be62cf0bb68a2af7226525b0ccc5fa3a93148e67e3da967c07968e105132b8c4c000e44211e1639cb691f7a131beedc43e6f576b15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50791ec2aa14ca600b0aa3b2d573870f3
SHA1308ddf1eb849271bb9a20b07595216a48fd77b8d
SHA256929759c66913e9c886ed882616e2920cff7835269846d5a272cd6156bbe8e283
SHA512cb0293fb8bd08e17f1dbb31bb283f458e64de6ce8dc1a97eab8b5716897e180116a625f17b02693b7a32d45071566ffc0f53d8678a2727f52981eb3a400c8259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545275013b76a47de96134fab80a9b505
SHA1b6a89c322b7fbd0aab955aba7bc8d697608e8e74
SHA256a7e2404bebc0852d8a05a06bfdcd4bf8e814fa5e80bcc44e13a5964e82eb162f
SHA51254934b8237db240b6d0825fa83a1b7b8a54cbcdcea571bfa24a3e00c0c503d2fc51aada5ceab9a1662166edfacd502b4a7079a51b56b419537ef75f95401bffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521784cdf75016186f727c23ca14463a7
SHA15145fc6bf43c2050b95475ff606aef6b983322f8
SHA256543f2b443d8e06d4da333f8b62c3ac48bed7d28eceb1a5388763033c307abe47
SHA512bcd35a71e3c418f018a98810a851225746009352970a0a53bce0f2206d8342e4b7ffc0ba1a2d2677e73facb9af1a76ff2bbf5e8a02d174948f8c54e5a3ec2d1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2128aeae8ab767221bd89359129495d
SHA15965e1a24ef84f277a44bd342d9f3abffc95e742
SHA2561241990c1ced1167ce096c9f07d66e39c8c3cd619803c38781b90061646c62c0
SHA512f255eeafd3a8cc4df9b4d54923a2a075daa65a87228840b4cbc471e86ec57b7dbac02dc400bfa4d8496ead7d1867bd82f03304384d536cc045d73bf94c250508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bedaa6a538f8925baefc89505b94ca1e
SHA141ec7cc52a912d2125e1259cc2a0aaa6a2e97f93
SHA256ebc4456317622679e72742967c4ba61bc7f28eb45214e7080baad423bd2022af
SHA5120d2a4c0c159e430572696ae49de2d25ff20197a47611bd4f87dca0ff50cf14f059ecc146dab7296f68aa0b555cbfedb27f755fdda74f728bb2920dfa387949a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d5ca0651e56ee1c8eb28ac628c24147
SHA1bc463328e77ff368068284107538b8873a5e7365
SHA256e06e8e474be2fe283f39eefc70e8431dc333fe5ad642deb1d28137f5d840c93f
SHA512d5d314b6a464b127dc5bc1be84c0a87d64522cfcd4001312501fd07f74ce7ad0a89d1a2a43e9de549918fba60d45b5605926c1b097dc75289d9480fbab0ca1d3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06