Analysis
-
max time kernel
118s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 13:23
Static task
static1
Behavioral task
behavioral1
Sample
a0ee9edf51461268c2139a2d019c273b.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a0ee9edf51461268c2139a2d019c273b.html
Resource
win10v2004-20231215-en
General
-
Target
a0ee9edf51461268c2139a2d019c273b.html
-
Size
601B
-
MD5
a0ee9edf51461268c2139a2d019c273b
-
SHA1
a8ae50dbf9344337d3c14dac396c503596ce3508
-
SHA256
400dc74771054ed1fbfe21f4991274bb6bd2be4b5483fa8450abab8979e51647
-
SHA512
43883ac6f801da614b0653cfb5693c6a331dad56519ba7888809f4c8ed91842bb591fe31da9023f88988abe001d5625ae8851e194b66306156959c57a8328cfd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409418085" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7CE40351-A0D8-11EE-ACBB-46FAA8558A22} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000b7c292b147f8d027e0cf9587c21764926076b0626c1ca54f2494469189c6275f000000000e80000000020000200000000a65f2083bbb0dc95a01506654a0c6ce0a7619a4e9f5faa613f712ed5f5bf0f8200000004acdbd38252054590a91ead4a5d49bd0b42d139a4f7c46b5935a497912d021d04000000058092772568e03203efb34e23f996e28140362d473122790ca635118be15b7241192b5464c2113f7e055c16f70d7f17130e6f2853dc7bf5e4f3ae6959b45f397 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0430e41e534da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2020 iexplore.exe 2020 iexplore.exe 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2240 2020 iexplore.exe 28 PID 2020 wrote to memory of 2240 2020 iexplore.exe 28 PID 2020 wrote to memory of 2240 2020 iexplore.exe 28 PID 2020 wrote to memory of 2240 2020 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a0ee9edf51461268c2139a2d019c273b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f713855364f0f89fb99ed27d8fa24166
SHA1e0df49765375b2b2eb46d2b7c7b1b70654d28232
SHA256bd2530638f72c57ccbca64f1d430cb917313d299b12526f9fbbe7ada867cc3dc
SHA51281495a34ac7af4981980d162d36bb24b6595c485fa83e0b1dcd278efd7385480270ffb1fbdb79d0f2c59dd2ae1fda974927f82c979a900dc9d0c78abe356c84a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a747989e9fdeb3e081e8acbded07d14d
SHA1f0aef517f77bfdeb81880f262d586d4823f37feb
SHA2568703cb405d5ac323a8c3c8e0bff69ea7e08ae8702d80a8585e6920db8d36f156
SHA512355cda1adcfe764db934fff3f4a1e65509b066efa5c82de2c9ce62a456231a4b95dc39e5ae78e0dee2fa8b8d16739a567b1efbac31e283d0ea157764e9151db2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5672fd107e1749cc8e33367ec87e632a5
SHA16bbede88a7da80eaf2fa94a00f89af16df269fa1
SHA256de48a81703776e8f0da84ee1505b57604f600bb5c115ce2d8f9e0b92db65ffc2
SHA51219f9c0f894920d427a91a83349b44a5d6c60afdb4fafc2d9e80ccd020fd0e412c7997e5f4271b118e56521b02d731ba52b306d35b746746a6606a8864a679e18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579ed2e56453ed0fde290984779b46e39
SHA18f30a431f4eac49c85ede3624ff631284099a392
SHA256e2fafea4406ae7727cb483b3193258f402eb17098af43f70bac0d58ddf6bddd2
SHA51221721c17400c6ed8f1a6179671c15639a66bb1d05f3732c64fd3627a7c75351531b2eae01d19a9a6a921a5bc0ab66357a43bf12761c4194e60185fcc26d2977f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d8fc16dc84f66eab2c767aa2164b028
SHA1a8bf395b831a0172f305c4d21b56936ad95c3820
SHA25613ba4a69cf52925336984a26bc54a506879ca6ab484633bff962989f0faf183f
SHA512e5d765614e5d3e625c55b59aeae3b5103efb97de6e81f1dd05cbe73bd5f329040f805f00b129ea2ff225bf398ce7dfd898579bd67cf2ded18c7f56e3df9f7e0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa424bb693a58b6df61fdbdee4a16bc1
SHA1dac10fb20e2247b15e42b55c113ec1d44ed36660
SHA25697c248a295257d5be18e679003614fd820dec06283516ebbbf56382f270e19b7
SHA5127093fec3f5f02798560ad5ab1d5e51fa0b8eea7e97379451e1b3768697f7da49ed1c2cdc28931d16068b1506dbfe4c5a09702556f55ef702555b2457704562d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5301baeda16ae9b9d2fdf4c7e9b44a8d7
SHA1d53b1f68ec556a01e882013a9416a6de85720c21
SHA2562a2b44c2efa2020c4541bf797896153fa7f8fc8f7f1be5418bedf4fc4c707335
SHA51239488a25a4108aecf5da65816e683030f3343bcf3aa29bd195d7965a2a8818ae6e14bb63a5b1a36539dafdd30f34f82f03a0465bbe6155b8e1238ac05a6807cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5de4e1225a1bdc5a67da533d6cc6981
SHA1d25607630a4413bd7793e056825236fb3ae1ce73
SHA2568bbf671ca0202c4d2631c28a977bdfa90c859a3085820dc3fd7a44a5683e3533
SHA512a5f4dfbb05677df8a87d16cba61a2911dbc37ea62f06afb73dd031b9ceb6cd5cd0f6ba9835eac98f06bcb0caa11c0f8045c8aea2ac78e4bdbec9619f726ba290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55652dcf30132884d759df8ca1a001a54
SHA17f715c0a078736d4b6b6f240dc82fc030f36173a
SHA256f6454d29ebb8b5165aa09d900657d31e7e8ee7bf88428ca29f89b137c4396b09
SHA512718bd9f651e5ec9b84aa7ab488b79cff110a4807820d12453c93549217e3246729bb7363f442ae6e042f6ce8f592d431bfcf6a6dc02dda63f9a86deb0df013b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5885e8338e36ae186274355a26da94a53
SHA1c2468587398c3fa90e02caa7455a9c7e264fd290
SHA2561034cecdec96075276ccbce534632ee7edb7613c984852e8850452b667f745d1
SHA512d43e1a6ec462f8418eb85c4db259deb2789061fc0a48fb9effdc7c022f4a69310563bd79099c64fde50f62210e1108a76b99dcb354495ade3853ce7f0ce2c165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4bee3a0c115fa4984b8a0798c5a9b84
SHA19fbeb23832275b0bec9673fc2678a8d1ab46aa13
SHA256c90f1a2b4d5bfcaff18beee81ddb819e09e08f58c737097097088cc959d5cd99
SHA51211822845f9e0d2fbd2dcd74862c706761d168371d0cac4e160f3c6669113c15547c4a652e675a2cf04bf24d4d5bc5d487a83aa5990ffab3600d0a7924ed0281a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a289641c5a6b1d239d885a2eb44e09e
SHA16e5d4f47608a454e28c89cccffaca7cd7f89b02d
SHA256eaf0a22c13268352039d7599cec6ef656cc82f32d148519df4b1e075aed4fd94
SHA5120bb57965177f4ec786fd3a1bca380d23d6946e74f9c5454265f78c7c34e68fabe5aaa2fbabff8221e359cac9cac63fed68f224b6a0057fe3b920ab5736cb3e7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52be92cc621d3224b1df0ec3d29675fad
SHA12cbf6dac3c75eef4f755f242322d1d210461c1e4
SHA25669d48d593005cdf282f5b440f8d5a4461459ea68d5bbf27d4b2a6a6cf57e366e
SHA512c31a1014864b20d3dd73c5a7de5eca09e3c77bbb39708d5d14414265afbcda18467f78c0eb549906499865866ec1c8c15bf2d2a6c9b362c0e41d746a41a96a91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a7feaf9d87f9791e6e586f473331e9e
SHA1d23e73995b68cb42907843495688b3a0c1364995
SHA256a9cacdaf06aa9bf2efee9ba28b25bb364ed3900cd8fc2d67c5ca0fd4c891c380
SHA512b06976b2552cf0b8d7a9124cf3ba5bf8b0cc240698db95db106374210fbf024fd2c1900a076fb7641de370562f6b4acf4999cb96da979cd87d858386193d4a17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591a74a7f77994d45ade0db4a688b3156
SHA196e55e479ca250ecd4fd566ba4f0ab09d7f7a105
SHA256d325735b6701533309f2aa1765c7d276f3233c81f1e7ec15f664fb6b1806e533
SHA512c1ac2c2d7ce890a769d25241982c65dce0d8c73eaf19e3f6d6b4183d08950f0cf539618eba2b0f75c4e460c6f3ca625c979fab4437648dc8cf0d7867426ff3b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4d88a0bf68b6ecdbee2b97f77210bbd
SHA18e2fe2bf224961a0b6eed667f4efa82815ba3b59
SHA2561e5ec795f9c004349fd51b19e5ddab437a6bfa45fbc67a3b058cfdd1c040fa52
SHA512945fc33a2cf5da70545e131e7ef24696444abc55eaa9e5afb77702bbb39ff6c872b85178265223adc6ea9766835fcf47344ce8bab26f65b2e2cfbeae553c485c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6dfe4bfc810166a1dd1773c3044da6c
SHA118f80667d1854067c01702aa42964ad1f505e1af
SHA2569e791400c8eb3229726f5daf972f717eff3d87789cd5082bedd4cefc2a0b6027
SHA5122fbce0d36f46cbbfc4d728d7598004c1e53b1e1fb393bc1d33dfd57d781d8c19ee32d4df501740e39aad40721f4f56cda0ae3255f2e07c0837d984bf307d1c6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5039dced4445b9b1c2009f872082a86db
SHA196f5ec638ed2f91db0ac99db876b6f08a6eebd68
SHA25688e101cca0633686cb0d3a6023a84f0ccf148dd479855d4c8963ebca27eabf34
SHA512a1ff5bedd98bf6b3dc1642e185138635b9a77bf050474dc380f620c3b8ff15bf2c82ca7f706815451aa8a908f8bc79f16f16445a34557b441acdd53b608ad46a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b044bd27b476ace82ff0046aa7b163be
SHA1e74b769351cab72fa25e80823ff5228f24461888
SHA256fd7a704e3eae60ed60336fbd3c56a48917d6b1cb62ac93bba23840fecf8a575f
SHA512e937c8cf3c88c23f0b6fe894af6f218c1c91b95479a9c94703b4468d4526ebb7d2ebf76056fd0c5352ba46e45f5bebd8a6aa07aecc063bc96c2384b4abbf344f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b21de27c6615c8e5abd4a1a7f85d82b
SHA19ce64ffd3d5badfa0cc055cf0cf95409aafc66ef
SHA25677c827ce14deadea221e5725194e270c8360c04d5578e3f47819f2fde7cad2c9
SHA5126d85429ba5f479810f7b05c3d5153445c77f1593f5824c2d01da465290ba97f6e5e8d37c66dcf633eee5f79157059ba6963d3ec109114c0adef2c9eb0f324f52
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06