Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 14:47
Static task
static1
Behavioral task
behavioral1
Sample
caefeea50603f03bd403f3e21b675920.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
caefeea50603f03bd403f3e21b675920.html
Resource
win10v2004-20231215-en
General
-
Target
caefeea50603f03bd403f3e21b675920.html
-
Size
1KB
-
MD5
caefeea50603f03bd403f3e21b675920
-
SHA1
204e38ef8ef20d025df749590401440c616fcb58
-
SHA256
d3f50ded18bf8607c7d6da1ea05084b5f2edb113916120423d24bb51092daa09
-
SHA512
60b0df92211fab9155b52c493ff14d16b2a8502bf2ace349c1bf54e26c261aa71d481744568af213056cd7d3165baabb1456a09235cdff92eb9e634c2c1b2d60
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d6000000000200000000001066000000010000200000002f7cb44441fa4ef8d7fc73f451177aa76d21aff629bad90861fc14a9c0173788000000000e80000000020000200000009a125f4c452ccbdd0b6a73c4967c09b130e4075c2494c12ddcfa4a372df5963c200000005871cd40a5a2c69bda6a70f0c23d95012140ab542b973299280733210d4c503940000000d18d194cde858826c2750086ead06c02c5bd2e3dc7090831dd6e99da7ca706eab4a3e8da1c36ee9b9fe632829b1eeb7a6c95976e572fa81fc4fbb884454312a0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7DCD5E81-A0F9-11EE-9F2E-4A7F2EE8F0A9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409432259" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e01bb1540635da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2104 2232 iexplore.exe 28 PID 2232 wrote to memory of 2104 2232 iexplore.exe 28 PID 2232 wrote to memory of 2104 2232 iexplore.exe 28 PID 2232 wrote to memory of 2104 2232 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\caefeea50603f03bd403f3e21b675920.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5807d377f43f368ecba9d3754040cefbc
SHA1715ecc481bf7576faed06ac81df9bfe8c0f9dec7
SHA2569ef864ed3f65bcb99b4ae1360fe8d14bbf49ff3eefdba3091c9df694838d7ea7
SHA512a9dda2bbd9ba758f53e1fd346923d00267c0807483a34311e825b67516357990ae5b0455326624de969443416dc357b0b50e59ef2961f1feac968a52d682406e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c02836003ef5ad4e948e9cd699fb88c
SHA1bc6e1ae2f5dc54df02756da8b3818777266962fd
SHA2567489cbd604a2e502360a43cfefd92a592611a8c164ff60ffd07fb0263ac32060
SHA512d6982331a820f496eaf349fa7a9e09fade889d3ecbf97e08d446543f690a66a6a88cab97ef3983fe6dddea7adc7a063586158a3b28eb60bc79e8941a44407f92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5419cb1988178d318ab46624e5f924589
SHA1c96728cd226ea6ad5bebe17560419a42129d3bb2
SHA25619bf840153e2a67af11f038990ce51f1f7fd04da6bcbf9496d67710fb1a2922f
SHA512fbc1f7fa1b69a979bdd5c54e25ee37410082a8106981c03bcf169b17ec3c88b2248b5299ad53fac8079a1c3fd321cb2d13773cd85a88d190242a6ce84617cdfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b64f98c1ad137ddac1ae25275238306
SHA1a0a1be06045f42078a0f45a32ebbd5dc1b0397f8
SHA2560e5b97c71fd7c6cdfc0221c5220d563451437b0af5c7bf39fa8069cbffc6cb57
SHA512783f2127eba44c72ad7e0fd8ece801628228d534d95180bac177ef7706c31c0ae18f8a875314a90d0767a50398e79921afdcd8fff858a1f7c76c64ee4d3c0cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504e508e41cb0c81a83d895e9aedd44b7
SHA176885ccf5ccbbdabc36e38c52135073f2be3af3d
SHA256156f5b2d157e7ff9701055df53654aed8f3cd05e1ab2fbb62d9e8f074cdee66a
SHA5125f03b64b4ca70270dcd59680f8c73dd87af8c7033c0bc1348c931d4b9b4ff47cb9b75cf13513a913e347e1bde24be052aa600c96212477679a706974f3313870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d70435f5c986218e58547a250a8c7e4
SHA1a0edcfc1a4d16ddd5ca7957f3aa0dbc404385398
SHA256bc13b813a1094837ee88c81790d60e396bc1779013706b6690a2f6824023ba0f
SHA5123252e5b61551e676730893d2d1bb5d2ea4283f4c1c4ccaa7d5e2906fd31ac86b30d80e26db174629cd49b8102d44a14c3bf4ac1a257221577d2e57a81b8751de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b2efe4fc692ea561951cc9babd4b437
SHA10a2df8e3fd84edda2e72375f59643675011f491b
SHA25606ca9ac107934123b6090729d689293a73b0957319431947217c28c42e964f8d
SHA512cc856a2c0dfe28f07f80024124d79fd9f6c037f281714f00deef492f619bff2970476b2ee192fec3c3f3967ff315628ad0a7f6705312a6e7548181967442892f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fefd6da3d626f257d56fcef00b2e576
SHA1f35cc03c96871977c5eac0b04a86003bff630b0b
SHA2567b6ab7c7469c69f3a3c63513d045d83424e8bbb7a69d0a1f98bf192588dc1e6e
SHA512e6ff7ca82e5b0040da871129de545afa4c1aad630a84a588df49ac6638c331c0bf231df89bcdf8f3cbf030d21a67ee21aa5706b78c7c0f61c85ec6e9f6a99a2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554b1ddde6b0188db30314fe99c94c50c
SHA1c80bba19e766ca5b76ed108149ff43fb36db712e
SHA25608d77f8c9e3a9c381b651e9acdaa25b58eee69a06fb7a4e5d2b40937f0e19b7e
SHA512cffed1897c0bb3a49cc508aaca1af7a3c28583ae47c23e05a63b1a3ad5c01dd3cb0a3c59d1bb366e42d1c34fe5a1e93f49ef588c328920552ef6faf580447686
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e32553927f9ee7e91e65e0337bc0a00a
SHA1a528df0f781a56fc0439688038817e02ef76f81d
SHA256b48dbd1d803a55d226a3ab633911f584827d5e44f809ba55097b6b63b401025f
SHA512034618495636555f0ef66feb8e3dd1418f451ca8df808475209e935cb49993728b6bd292609f301de9981a8ec97a21b9cf883c02adb636b7a6455115a63ad3eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7a6f40ef2a0d22ff8d6fd9b9f55f78b
SHA1c4e918e5837b508f8e85f7f80f451c762e94060e
SHA25658472120af1d7b4750719b4c4ad1dcbecff2aee92f46b9416157abb51d1b50aa
SHA512263133f1429e6100c6c0bb15e2d9509f54555e1d175ef3aad3c2715c23350e573a48e974a7fbfa86b6a59e348f66c46ae6c8a8354b51dbcf01a58bef09a1996f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eba495736b6802df894a7982fc3770b6
SHA1c80d3947cf538002898f3f1454f9746acaa312df
SHA256626d9605e00873c1e6273fe296dba5e09849b84044e50dcd15c6b89b985b22aa
SHA512616f5f2633a2fac0306bcce6ac3462e9910f72a8000c0e99bb1082b98e315040f492e3a43bcc78fc4b9cb272cb82ed63b79a9f13effd37e5d9566acca1bedc89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9f9b8745752e827afee845919f8b0bd
SHA1e0d72e5f03cebbc22587bff028289e43b6414866
SHA256c6ceceec3143008912db34e6083b9435b29709684f3c5b6a3927e1c636fe5664
SHA5127d4f9564afaecfc6f910d517d5c9028a99986b842109338a4aebfa797ac26952a2f81a329676abb109a4a3d2463563ca2ede953047924f50920eb373a2ca8234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5510327fe867bd6a40dac072de52e1719
SHA152b444f8d0af5d49e8b2410cf9ae1828724916c3
SHA256bf943783e2b87a27285a745c7ca2f2c52de60e2648eb50089848e116af73bd63
SHA5127fd6ddddda5d4d04c3ad26f88381e99bf0cedd2a45b589d369dcf67ec77ec38b2de3008b0aee0a1880cb0b7b4d0886debff1d921522376a8c131867d1df77555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddf24aa2825c75d8c9919a8f5aa7b483
SHA18fcda6e3928ee016ad2e1eb5d16b265b40cb5613
SHA2561e49d1302f49dd5da2dfea4b1970170cd95bf951e81aaad70f36cffcd025aa62
SHA5121265fa7347117719e0bba88c45d92f370b85ad2bf6a75b11b785efcba244cd8c85aed256367c52b4317f4f76e74784162ba3bd271f1410142aa840e7da5594c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0cba8b8bd13e841811b94e757bda369
SHA1eccc60ff8cfc46793cd84579e892b922ab99608e
SHA256f88de98643862427bcf8efb2d07661ee2b2081357e0fd9c23106c39ae5f94e73
SHA512548dc273ad4619aba4fb0e74566fffb5df5bbdb550566ba32e93609b375cb2e9388cccb12560e4dd27670934311f8f2b0a70fc76d10156d1a9ab046e684208e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d15c12d42ec738db7c4d11122c33fb75
SHA1fc623d265b72903d63c776df74f8f82ce701bc52
SHA25630e491da5643a83503d346192316d9289d09d84417cca29f5d38f40aaedf3a10
SHA512512d3cf5b2e7d996936326e4722b02db8336d73d0f75fd4e2ecb065d710fc0b50ebd4e20a7a765f263b0582e9ea50022232cef1410732225a5db64ec69372193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bda57d8d1123e2f4b88f2d13bcccb33
SHA1d368d56379cc3392aca70a8a92cbb99c47904de9
SHA2567aef25f8ef1e916ef12b26c16942101f00b6e8f06d44490036da2a215fffca03
SHA5128da6493e1522ae449954e93f805d49a0b4151eb2314662ed4b3f3fa46364909d1c5b92e197625a152d1b719fb22d41f31303e81389d660aca53bbfbda38425e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc1cdd8836601a055564633a61a1c596
SHA164c4608c9e487a6a26a8eaeed2ec29e2aeee9f24
SHA25640d641a48afa05fc74da1cfa6f01f765184aa430fb16c73f3fc97e14cc4d1e99
SHA512feb633118e764077e61b7e4759d392a761ad5aa2bbd7df7106f24f95aab5a514fccb5fabeec1374e76739ff2a6a0846da78426d33abea065dbe3c53a7883eade
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06