Analysis
-
max time kernel
146s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 14:43
Static task
static1
Behavioral task
behavioral1
Sample
c90752993e78a4acb9dcfde776b4cb4a.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c90752993e78a4acb9dcfde776b4cb4a.html
Resource
win10v2004-20231215-en
General
-
Target
c90752993e78a4acb9dcfde776b4cb4a.html
-
Size
1KB
-
MD5
c90752993e78a4acb9dcfde776b4cb4a
-
SHA1
adfa043cc64a231d3e084f0fcb5907e4500af5dc
-
SHA256
3f1b430f0ff78d1897b541a6c486beb4a7c926a8196cc790d0fc21b828daaa6c
-
SHA512
13a5577404046a10f5e0eee82b50b5e2fefd7cc430259b5a67cf83f9431325c2aae41f498c788fbd031be0c7b2c86b1d3cdb27b1be01b8fcc09e5d35e8ed4a0e
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{488A2A61-A0F8-11EE-9BD1-F2B23B8A8DD7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409431741" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e9178664000000000200000000001066000000010000200000008cc911232e4b57b9f0634e90bfc7372a3a047e41b15f6715604ecb8414904d28000000000e8000000002000020000000172481521d32e96d81dd037e3d3b0d5669b2796e585c67765ea0d6fbcbf41d5d20000000e867442597dbf2a227b5173f1fcfad1bd97caca7f9d6ad2def5388ae261e894f400000000dd338cd77adec0bdb771e048ecde201b3ceb06c20935907bdfdfe5d820bafd4640a115667578572e71db48b4bbbaf092928d72ec0ae1293484019a2e65e4ae5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0bdbb0c0535da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2776 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2776 iexplore.exe 2776 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2744 2776 iexplore.exe 28 PID 2776 wrote to memory of 2744 2776 iexplore.exe 28 PID 2776 wrote to memory of 2744 2776 iexplore.exe 28 PID 2776 wrote to memory of 2744 2776 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c90752993e78a4acb9dcfde776b4cb4a.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2776 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52aca775ebf1a2cad10dd976959bac507
SHA19591313c76a2b73829059e92554704f82c055a27
SHA2564ae6819a8bfe4fd5abc72f0a43ecd7aedf1a9c64a21cf5aa5c08b38d4fe28e2a
SHA5125798f3e56d000bb4017212fb4b1aeacd667bd7e5eed694ce7541a7286d784fc3fda4d3d7dca7d3d8e82f5a6b7c763a8a8c44e541177e61c3ccb05ee90021e7d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc71a1cd141c9175e297b402641de873
SHA17831dbaade132b1489098091bb556991852addcf
SHA2568539d514c0533d47ad830a1774dc4c3781b45f891da4d9608c53e5bfc2107ca4
SHA512686dbc45ab9c9cbbd459edd76612edfa90fc73c7966894304ef4813f331b0d30673a11a8013af69a551ab5ca232d44e791279876d156083c8114684ad56ed0a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559d70c60ea6e839483a63091738b62a8
SHA1c75797f0cbf885f74bf73314ac5d20e748702055
SHA256115ebd1625e0ae4cf7f8ecf152101459f398600169eedc3dcd5f32f34d179672
SHA512e37816f7dd0b1f0c15c863a03440f282e9258c51967fe2fa68ef9eb3d2f06dbed0950804c7d28fe60ecbc9887d4d8998337369e6d7d794a0b61910789de3b7c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e68b73c07979d26f7508df45b45b1cd
SHA1c1b697c8b4988cd782a4879173ca73e682091f20
SHA256713ae56d7b7bc805469609944e58067fd2cb8e4ac4d0f824300d43a981c6e267
SHA512d61c1e8797af52665a36ab2ff29cc186de49f0618ce61d9dcc11ab95e63352550fe9c818515837902452046a0f4100c69d3d6a1557fbe193b2a05931b56130ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55dceefeb271276b9efed7a38f14b25d0
SHA1c2b0bfdbe3fbb502fdf764c699a07420f882ae93
SHA256431b0a2daec8a145e94151a0c98885176a8ece389c61b68ba36c91ae2f45afa4
SHA512e622990e59a2742da4bbdddc181d1b8763cc062e853dbcf54159297ae153f8b62fd8f27a40bcff822e2ea7f961e0973d23311a90a2d7da1e8c89359e497ba2f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f18a9c732b0e2de430fe3153e37f553
SHA16884761014e280308f6b3806b5cee7a4812bf79d
SHA25636020b19aeeab6cead79b8802de0b942dcf4d3d90fca31ad40e96fb257dbefe2
SHA51263ccddebc07b27b8b677ac5f159837e8e914b5ad7c84e1e9addddf8445c9df71a4cefa09da41e374641fb0cf5960f467862be559d56efbba0526ee36c04fc6f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e65e73abb924a9619f4641a74dffc5f
SHA16c5c01a59df96b3e2f80e2e049f0cd7df09b1131
SHA256a17d7c92e550ea8934f93f80c54f299787db78574ff91b8b074098850bf37935
SHA5125d1d68a2bb18ccbb05e1399488a675851747b81d74fdd7c4b8fc6f65138a25d481791f2c6c505b90c80a870efb130f7132513879607d9cd666ddb148a0f881c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552ba31f13f628889d0c11e9802d820ca
SHA1b5e2c92c38f16ec41e67c64f973203e474e7f6f3
SHA2569113b3ccdd17bfd9654fc5224c99be375c597c761f7052c8825ea00483ffae38
SHA512a26e86360ddea831c661ddfaf33c6e5c131034ee5ef3d78570989e7365d791e74ea35a84a3de664c86c46af38198bd87cf67e808d74d8f7a96c3fb6a08842509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a5e264cac2de0e9c8fdaa390595cac4
SHA16cf1e4c3cf465e10905fde26ba4a86d94e2caf2e
SHA256f73101e27e57e069458498604644594538f674e5d8b5a2bd4dfcdcfcdb8a5f2e
SHA512c1dae2f835ed202329f05ab3fa8ce72f4ada1cb5e9abc283361cedb31734e02a7405e43f4d70bf761077ba54da41d2ff121a19a192c5e314e45b10e4de6f48b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d69acba0d13f7daa31545db616c2e98
SHA1fc994348a006eff260b25cabe066115d66c45759
SHA2569d8e09caf0147993742f191bc7ee428da9847e00ec41981d05b4f9cad5e0f16e
SHA512066e087873a9cb89c010934d5cc3117e1a8ab6a6514b6e1b2423173fd023d255dce9089a6f8f8a513299fc5414d8de42505bb5fad7ff42d264d9a3439167d241
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e56ee42d8631104b82fd2a2b28c86e0
SHA1d3d79de5e1c41fdfdf31e9447f1393a1e26bb105
SHA256bf73e0dade61aad041cbde77516acb4e761109e3490ba8ddead031f47ec95a60
SHA512ebea18602dec6b4fe4b7e4f9b9ccd68523e8b4cafd51efb35b4d8fd26ce3f1656b029eafb1d2d1fdd6297b719745c43e3ae55ad9fca471d380c3dd9a8ff17905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7c497b8aa2c3b93651b3cb4199ea8c2
SHA1dd729081cb5f6f7777a52a0cbd8851df438f442b
SHA25641aa1ff6d1932b6549eabbc465c7102a7bce8c6e53d54bb5a8a3b25e88ea5681
SHA512f46ba3879f1abe47d74a527972106a45b746f64e6ce9c38bc75a4e278a5bfc968b6b82fafafb04b90c589137bc15219d81ecfceccc907041ebe02f17f61b49f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba985696b866cbf6d873607e4ca2fdc3
SHA1d52bf6ba89c58fa23d2959278775d60a91e2f9f8
SHA256acc5dbe48281738a0db07447f63e9341a1aae8ad336e1257bf27fbf07631e01b
SHA5128eda4519df6e60fbf8a135f883522ab8e635cac1e06e37b9ea46a57890b972bcc507c1ebfcb563e452afc9bf117e1bc668e0deaadf2276429f01bcc4baac9639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5086ffcbb1a906cf48dfde8407dcc00e3
SHA17fec694018c4165039104b5033f24afd600ba0f0
SHA256b484030a0ab8e7d764d7174a3c980f76e20d94d87e42ac4a947a67c3ea9a6bcf
SHA512b6ddd591a21f0517ad4ef9f8c0d16bafc4184ebc7717c5417f736b112b8c992cdd0037d6b44dd32437c95ae55c677c92ef77d78b1112cbbb29cad187edbe1ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57419ec181c59c410d0828b980c8823f4
SHA123a2077735a1ad848e0c62dc4a70d568e5d6ca9a
SHA256289d1cedea3fbf406e0d26955b6238bfeb716beb4feb6f46ad8600106c1e305d
SHA512e392dac0ead524324ea15c8e43cf4c7eaa4a16b8839a2444630bce3ed94d8a1d81719682410aac3b15663c50429481445b67403f14b9cf000050c298352333b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a259efba66240bdd7d63b079e9225c1c
SHA1cb14f7827f820d5878a9ae02d45ee8e646b0181b
SHA25617c9b3f403b9038c1b4bd13c207b82d562e9a4e2efa89e5e6e5edf40dcbb3f28
SHA512f2a3d8aa96a9f5c4b06f8b55a30dcdde0c7c6d5480ba073814843148723576054254da2b994d108a7d01f8cd1648f8369953853b21fbd20d00b64297a0de7a4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fad2a4d94337c539e69c1b48029735a
SHA1e2dddf70ebb7c7cf25f18c6f346c5221fee05be7
SHA256c5d6ea40eb521dac824b4e2e5a5e5e5ccceed5849bc7b6975e8fbe07585b750a
SHA512955efc3eb41597a7d4e853b7a3de9915aaf34e605f458453975f16661f9e022b5577f6c05034da4cb6734ed9b933fa3e4a229ea4f179a914791c30358af15a1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0551944fd4ff9b2be284e06ed70eb9e
SHA17d4a9d8aad916613bc674274b053ba141f1d307d
SHA256e20dd7c673bc469992b9715fce6e08b78c1dd988c0feaf9619140d54494f5275
SHA5128075e550c98f88fdb6e8df11c5f340cafd5be9ae0300095886e7950c8b9af2ce621059966879a34d64cc1596f0c32c4b0f77f0670e4749363114acd13840624d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f01cde3612fe659d949bd532dc3f9d5
SHA1425838423ba9543313a5ae8652d9b862ad0ae352
SHA256faf87beaa7dead49998de6687bccd64a35979848f367eec16f10b77ba15f79f1
SHA51233962ad3d5684253c33fab182dea80674d98ae1b5c45949a11112f3459bdf82189824ea85dcfbc892b729dee6944c7bf25d1d74bcf6f9b3f869a4eab168d21e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5386b528ae943ea2a8a903cab75b12577
SHA150934af5a56395b5eb5c621d0e1057868145a4e5
SHA25604acb7e095674c87f7da265d856bd70c51bbfda41eb35d1ee06f190ccdda85a8
SHA512a33f296644b8f1c74fac6c4f23918083dad1442db86f70ddc6ffe9b209d3c4c14993d1985f34f680fa56e1beb4f80dc6252d02988bea821befc8932ece060784
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06