Analysis
-
max time kernel
118s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 14:42
Static task
static1
Behavioral task
behavioral1
Sample
c8890e07cd36ae444a78de1975007b9c.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c8890e07cd36ae444a78de1975007b9c.html
Resource
win10v2004-20231215-en
General
-
Target
c8890e07cd36ae444a78de1975007b9c.html
-
Size
1KB
-
MD5
c8890e07cd36ae444a78de1975007b9c
-
SHA1
e773a6b86961b40b61ff7d96f48573209d51bb95
-
SHA256
26ca109257fe502e2873a5c74794631919d05cc143704321b07af657a47f62b5
-
SHA512
3f1aa3dd1fe6c8ce2b9f78abf9659a51641e989ffc384fbcb8e0d0be89cfa6c063c8059488315064fda3d68a14e3cfc5c4c7207777175c5cca31289b33e41487
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8738E3C1-A1F5-11EE-834F-6AA5205CD920} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f12000000000020000000000106600000001000020000000b391936b8a5f4ef1512028c8b99d72873a4814af90ae44cf08983afb6dac44c0000000000e8000000002000020000000de7b2202e297428c0599f82884ee4aa4156bf24e65aeedd7a5db2c4f9483d6572000000027d8610c301bd8fbd7aeeae87590e7a34dc23c6be3b446fe97796860cede74c240000000e3f6ed7c0d591176a15d35cd9d54a1476c92c477817da627628b5473f96493c7b9dd09b1305516bf5f1fb21b47ff5f058909b25c0ed3f41bad75963f417c07f4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70c7c34a0236da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409540523" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2916 iexplore.exe 2916 iexplore.exe 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2996 2916 iexplore.exe 28 PID 2916 wrote to memory of 2996 2916 iexplore.exe 28 PID 2916 wrote to memory of 2996 2916 iexplore.exe 28 PID 2916 wrote to memory of 2996 2916 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c8890e07cd36ae444a78de1975007b9c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5ef7c3761e320f8ac5d751a15d39d7e47
SHA12f0aaccfec23f59e153f13eb4b0d70e8d90d1244
SHA256e28d2c4f913f0724ebd8432b5928f7d3737af9b8c242c6fa33482c4cc743d682
SHA5122c167e96c95699081b9adeef308c2491743d77638865bd7cbc7b307116b1161b5eb8e7c1c5caf1387abdbc1b0eff85bd2b22777661990f4b1eb8d3e4ada79bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7a50770351d8d6a3cd8598910fa2647
SHA156fdaaeb26b38686c9dae99cdd6454ec5e79a8c5
SHA256298dc3ad308f15b3a116a12f20726c009382eeab92fee2ca269bab3bb9aebd49
SHA512d6ca720746680f34ac2e967ed96fa277f1d77840735b0bffd672689d274bdef0fa0c46fc86d86b05f9f9690cef5a8eb6cb2f65b690c479c10a3e4e59d5aa79d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec8d2373f1aa4f798fe73ff2f6027607
SHA15ab12d2cc920692c51f4a3c3675484921ac93ec3
SHA256d7a14dc64eaed98ad7f95323ceda9df944411ce2d1bfb5c5b95eed755f94cfa3
SHA51224063ca5f12e2c2b6f5836630f60e444658413015645e1eb276b11362ed71dccc60040b055f03657e42263f65e501fea4fc457948b4d24e61cf4b626cd8315d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fa2c830d268f0a225abf6bee12c1370
SHA1d299c80ffd30a6696960a7cfba99e6a05db36c5a
SHA2564f04c52bf0226de5424d7a1c3dd723b60d44e72e8f46bb0d7d50ef20b5f86d87
SHA512e29229e43fa86523ed4f7de9b81b85e1453e58bf8eeea039ed381503c61ebd9cf69d83a3b08d882448b8acad30db823dfd880cfcfc214567bed4e5d08ca73289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55912f606082f5ee6fa05dfae93af1ecd
SHA1e537d6c670ecffb1c8e61d5a8a0f246c2d6608f5
SHA25656cc899dc2b7c37d854bd1fd2f9e284bef3ebf79ab9b5d3d4f65ee4e86e69d3c
SHA512344cb8e8a024b9e19a794b3e7d0bc7754f17394bb702567e756c6aced6a01fe4d58df56b85f8ee63ec154b9b57585798f70b5eb59849667072a081c428ec0e2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585f2294167f0b77062ca403d7aac5e88
SHA1f5ddbdf5b0ff5c20896d2ab4f0007bf3d61d1e7d
SHA2564dfadeb14fc9f85d1af0d7590e92975680de6b65dadf18bd5a2a05b7ae3faf50
SHA51201f25fa3df9b2c591a10767bc54df39bd1e71f462c478054aa72fb55b06b5fe83fdd724319e5a3f343b1631251e059cb5ce062805d18402b081a0e6eef47c0e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549f53d79345e4cd350ea62c778aa4fda
SHA137e3eaa5ec51e0c4e007657a82787265e27f94b3
SHA256a5345baaef5114f6f309b19bf2ab83f99f958d0fcca54fc8a093a8a62464078e
SHA51261e1200dd8a684a94582d2608722cb046700b920f4e6868ed3382ad9ddfe7339a00fc4b182a1fec1f8e62b10297a28c3d1a56c80f0ffa3fbf3eeb63f0cd30bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fd8b36631f0e0655d29250fca685d13
SHA16c4a5a526a459f410655edb80fef89e0bf39a72d
SHA2568de76c834b014df65e6689237ad513474a3b959f063e8cc2408213c356484e7e
SHA512408a4a0eda898498ff68e0109399c6ba18af223383b35ada400f792358b644fa379901f544194aa9a3d4e0554f4c812d8bfc1db38351dfa78ad7d1811039053c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51061e8c5ecb8caa120e156ed25ed960c
SHA1923997ec3c124688fba0cb68978383a728d261be
SHA256af24cbce7aba0c34261cbfc4208865430ff64293b21efce845e53ab5aefd067b
SHA5128292c96e043f4469ef41bd2ca5caae530baea4e39fcb85a650d82bfb0f4d5dc3ffcdf1001d5ba5f675d1fe22ba4dbf8fabdb790af6ce11f7e857e5903b0e87df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576872c152c3c3b27e9d699ea07f35ad2
SHA1978534e00853e8f9e2fe895bc9628d8446e7b9a4
SHA2562540baccbe0713263fa6ab1cba568c445731e788d9b0eceebf57dd1b24e12e2d
SHA512477fe97c8428c15198981e5f4053aa92051df5268188da94abe1a008c2f7029b7be2801152129c1e2b78f6f44dfc0242e76f751c4bebfc553eb55416654042c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503ed5d21743f06bbe85bc785cb1fbdc6
SHA1e69912b3312875a955778f49b1ac38030f08f360
SHA2564b8b99c9e0fe5d21e3f9c327b1a9a3a77918c8c7012a6388c18c57a26c6e79e2
SHA512734da91028308dd41739c82b93de5a404357fc5b0e440b4cf5ea9b40a10d54acf682ef90fb892b20048cd9cc531d790d2a6979d273b55b73b31a7d2d3234a7e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc5e219d2c5cb5005cae7e7a2c68ba39
SHA1b1a498cd0bb63d505530a68f30015d4ed7e4bc3e
SHA256ecb8de8f709c841a3c0b3e274205a54d8efdac09d2d917500ac5fb31b12fdbea
SHA512305ef44279b2afa6f9db9e3e400d6f46ac182b5569823843c1eb378f2c3ad8dd780ce5d3c8e66aae4fadf16393f8260bb85c2867748c05ec1db10e6935885cea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db2fe20d6e724cc4538d57177f165897
SHA1efaf8a4d3a27946984bb6935da2b93a33cb87950
SHA25681d3d2faf6f6445fa1d95f14fadca55a68601b12efa22b644e2f4fcd8e9da286
SHA512b7d7f94c53a0aeb62a39036f8b2de118faa63c6ae42b1e3b554156219d8f54d197f5d4934bfcd33b0154fbcd03c3b3d975de67395d8c9de63a853507e907685a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf06bbae3a1762c41dd448fda38ec880
SHA1bd499b3e8d1387a849c29cd15f82a4cbddeb1689
SHA25651a8569f3dde27e9dab7bd7f44c8b32ad7d07ebdcb843f9a40077107e4945b7c
SHA5123c67403e3ac3f04c2d8d452d4df9834c6b8d6cab680f8030f54b973fa15b2287312832dfc2e296ff172bf2d945fc30696af271ccc6318324c6653136efb77329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d5b784f7034174fbbd86cef77e8c6c45
SHA14352e23e5cf00ddb4a1f64a2fdf14d557285d8ca
SHA2563511dae25119a41cdded9ae9ade02418e003f5765f8c71157f31d45d1e4f3b92
SHA512727f0850ad05ab577e1335603edbc280b4b164630741d0b71406666b68dc5818b695f0178d673ef24b52ccc9774ce85d47fdc6bf37dcc5d5f4f54f88e5fad085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5155a6aa44a743d0cd70412b625f0ccf2
SHA128567605d567a596fec67257a481d814c23f6289
SHA256ca2d443585747720366ab28098bc82518cf96b662ca24a00f1bba39db995792f
SHA512e06c211443be76b885ad829fef1919a92ba199a26d2a8118fe17aaffbcaeb36325863fda08a1b6c938a1205b819cbd73d13119ea32dbdf89ca21e77a6e5f396f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06