Analysis
-
max time kernel
160s -
max time network
256s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 14:14
Static task
static1
Behavioral task
behavioral1
Sample
bba70940d8a62894237e079ea16b0489.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
bba70940d8a62894237e079ea16b0489.html
Resource
win10v2004-20231215-en
General
-
Target
bba70940d8a62894237e079ea16b0489.html
-
Size
1KB
-
MD5
bba70940d8a62894237e079ea16b0489
-
SHA1
78796a4f34df3ea94ad5ca95bb07efbda9d0a844
-
SHA256
43359e16cbf6ec68f76b65ad91f2c8493b22bf4497353012057e86fa52958f90
-
SHA512
0c138ff9eaad5ec4450672c94a5e6616ec3a2f3c9ab4f46da48a6634b732608ab5eb93ef67ff070abf73f332bd722ae16d6c1d1f3b7b8c14e3c7862fb822b771
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 904fc3e2fa34da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c1930000000000200000000001066000000010000200000003fdf63becc31b0f79ab2717f72ca2983aeed9b95559130c348b4ebc0024a3f64000000000e8000000002000020000000c372d9e817b2f3327dfaae382d7b98165ea8ef64cfd8230f04252535d20c4f0e2000000057ee230787bbcc42f00111249c6dba44858d1b032c534a335699135160bca5054000000018029a30aaf5dd56ab2de73c3908daf923ecf1adb0ee12910cebdd2041508dd9864713d4408bac46081b1256124b1a2b6ca960533d0fb9e3bfd1152d8dc5c44c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409427366" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{146E36E1-A0EE-11EE-A5C8-EE9A2FAC8CC3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2880 3020 iexplore.exe 29 PID 3020 wrote to memory of 2880 3020 iexplore.exe 29 PID 3020 wrote to memory of 2880 3020 iexplore.exe 29 PID 3020 wrote to memory of 2880 3020 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bba70940d8a62894237e079ea16b0489.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d657d239d3ea4556b4a6de105dc930a5
SHA1058999792dcd2df140f0d05593d9d1630676beb0
SHA256ded3ed27655a449dbed4914fa51348e8abdbaa67a967a8be4840d69df9facb70
SHA512e58a40c9e5b9521b0645a2ea072b88c1f3d8b8857665294c378d8f144333684ca16f33c5725e9f449a8278a9c9b7d1a9c3aeb7bdaa7842fc87feedaa63e0f814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e61948028dbcebba7697913abdf279b9
SHA1fc7f521d4bd988d52efbb95f743748a763897786
SHA2568dc5e68dc7aa77d48fdb16b5d4cf1d25a78ddca105d0b10a518120ffee3c5790
SHA51250764fec3305161c9ccb04eb20a0f8269f53e1678e0ae400446d8f6779ea5a29d608dd62ab778b808aa5c7e5c5c039ed20c77509229fca6d8d9ac57d063bf54c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564e40be6d7ea4dcc9d24b8ab7799d747
SHA169dd94f1e0c9cd6fa3410e8736bc8e615dbe3d28
SHA256ce68f087e4d0b3c206b18e9ad5f6c913d585b8457e443c578446d68e501c7ce0
SHA512553b75a2ab23ecabcb956089a964ec2e5030bc6baac6f63bce21082e3edb561d422ca6573221463d993843673d89f2e07c6b037d4168082445a3acbafb110dbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee96c0fae2a367821b608b26361ab90b
SHA1220e4c2be4c9341e25714964517f320f2caca107
SHA2563f5357bcbb47080af2bf328480f73270e5b7646dbd3d08bb88e1380e4203a6d3
SHA51206cda80d174f39650917215ed244f95f1603952b4ab9186fb6cce096ed6c4afc5e4a1df11a123616752ff42af64b1a53a5bfc10922433293ea98168763f2ef9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efc519900fafe4dbe8771ecc8f641331
SHA1a7bd912603043d7260bc52141900cc6bf8e7c149
SHA25677d08aefe4051d647e841d1b07edf372d94e46cee3657435254e20b7699567c0
SHA51246380ef78f7ae15410818914b100c2f0c55f3e7e7813e2c21493c1d1556a31ea73c007d653a377106713f00fd1f1cb66e593a5d16e9ea446a94b8f0527df20b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b86f107302f9b6441603d23b123f6bf
SHA1604fb5303fdbf52ada2620667f5c8f40d70fef22
SHA2564173e8f3cc3f4deff45bd8ed810be5be422a800462b8c9b22538aaa0fe473970
SHA512a015b0de68307bb34481c2259bf4ba8aa6950d16c2acb63dd7cb543cda1f22ba9b5b876d58f6479104f52c406ddc1d0dd7e7747de0ef9203c2cf2b43db1fdd6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573cfefe85e63f9972daecd800e97df6d
SHA1ede1f33aef2a8b2771a32ab8f6ffc2ca911c64f2
SHA256d245c2b54dcfe425d21aa639aae870d97c26f3fdb9589a50c4d980e1dba8a86b
SHA512d2984cef3c1c0ee9180bfafb4f52b9d14170606ecc8b483cb33d91b6fe9a7c07f762cc7928182530fa5a85c0a176c7d8eda711c5b13a0b2d7799b97052b55e57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c28ac1acf5327966f3e2d65eb94b298b
SHA1c7901895bc6be64208c2808988517158e852f20f
SHA2564403e399bf0711d64188bfa45bb0773187c381e02e5a270196715ecf20f86ed5
SHA5127172ce03d4ac1938294be9594f1ebe127b3a6a03fa05b7240c5482be9c7ab313d3ef1c6cb3b662f2bdaa9835cc7fead6642b1c892ba859b6e8a2beb675494b81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d632575482ef3c9b9cadf985886bcde3
SHA12f3dd787e707e919143acce4e0733664216c9826
SHA2568fec4e7f9b3aeb1e54e9dc63ffd51d8a7d4a74fd81be9f9ee0fb9b8beb502d32
SHA512a0831b99bca237c984a746d4a5a3ec6237fe286041592009d9dbb7ec3ae306af8d51e384bc15f2f626512fa5e9375ad2decf771e0cc53707c19f069ec22ec71c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ee92d69825bcd4a37fca65d75e0ac6b
SHA18363560c997804e94508ab3256ef67d2eb326c06
SHA256fd98e0af04f06c918c34366fc083d1020bf4f87e75c069ca3fdb997123cbbb0b
SHA512543303cc66ab73ddfbda80a9df8d05f237e383df5b2fce0c2443d0e27b408b7fbbc4ea15b500294e79822f5d7aa0a0007e08f9db2021f9130b7f00281fd5a51f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be91d93bc5eaf1e54a8a34729452ef0a
SHA14a272e5a45a196cc9167fb02bbde3088f2ab2fdf
SHA256f8cbb7bf456649a2284137963b4529ae6721a09afe9ed2b157911c909d27f747
SHA512e292d1f7690ff601689e202ae2a106e4928c5ef439de3c6a3cd4ccfb31614f952781f61263ff22ede1250ef75f4212a0c4e7a52ae16c3a15eed657aa488f8e1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564496f667565ec8b3fe08f54f0b2420f
SHA1c0d9ff73c30154147071c97956cec42fb77406a5
SHA2565a16f8ab1259cbc10af7bf3a85c53e8fdc7aaef3a0bdf25ed11bd5ebdcd2200d
SHA51231c217d1fd5bd7d7b1876c93e2394fdfe697ab83414e8a468ad05b52d454fe112786c79c49ea6e42c2cb72a23b66a514ca346072eb6851f797d93e210c052a70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59112095dce24a6886ff5c93aa26b69ad
SHA1436fa577e89651d35e55359cf4ab1511e40e2e11
SHA25699f6238ec2ee4c00055b671328f40587a508055de3a72eec1eb7e852765fb467
SHA5121699a3c4652e81838acbeff95730205c5227cdf999212d480d0a42b83e50645992fab033e7323b3decca4c7015d80437415924605bc4ef5fbfb4304520ae4492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5303925155a5e8c480e5d8c4f0fa578ea
SHA160106c59eea77cf5df6cac2c06eb198cce1de03b
SHA2566b06d720f9e5bc8bf1bd41ee9e5be93a954d4b05ded8f51e53cceddc28ff71a2
SHA512eaf8f2ca9824aad28b18bee44987a39954145309c93ae1317aa63d60ccb1d4a5fb6a1a0e59697e3754d19cc4f93390ce105bf9b16beaeedd51b2230f6176901b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1e5f24a26a558bc313314ffa930c67b
SHA1c370e8f6939d5b9e601de62f6e700217be9e9611
SHA256b6c9a3dafcf545d4d4c8fe39a87960be6003408b3a49402a35606736de944079
SHA512566f0fb657c11d4af0adc2b27fd8efaa83629ba1aa8df7ec4d3367e337e80a83f68c87df37da80cc2683b9e40aa7397e37a22ec85f0a3ac2189f5b942ffb6f5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdf1487a87efe0c0443f358dca2c593c
SHA1b62df5b449ddd6d300c81a1aa9c75a0bd5080e50
SHA2569a0dc8a247d4dd2ceb3d6f712f91276abe8730e3111f955173f3bf63e7fbb16c
SHA512659e52fc122d339f4883c28627161aad898e307cdd499877533132a1656bb6a110daca4dce694b98837d9f9e32a551dab5b095b001a57a5bee0855a6b96beea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51396905a43f75d83d94411d5e53832f2
SHA15dd6944611d3f031d2dfc5192e1b4708754b6fcf
SHA256d425ffcbb02e319fd549cb679ff7df55d4675eb222b636c87754bdfa0c17384b
SHA512b3a2eeba3a688a17d097946655c59ff0ac8ca7ffe5c19fa8dadbca12eb7b75dac7a8fbe02a787a5ced7500c8dca1a77c3e0896b833ea834c6f3b0d8725265af0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8d18ad0d7d765d38b680eef805f93b4
SHA16b99908630b177310ecab82c66051b32a79bab50
SHA256770b60dc697d3c923cb3e5c71fb7ebecde2c3f6923f3a8840634b66ba8944a56
SHA512a1bab79eb80fa296475d1f8cfc1205f496350efa84caa56d1e47d9482771915cfedfd701d11210eda3e98f5407bd27f0dde96a3959602e4aacb8cc2db5ff61da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b647456195dc5510b218ff4d5490886d
SHA150eff130e79b4661e90a0c0bb3926ee2edc68d29
SHA256ab2dab1794edb193cdd38528c818f9b1c6b9b7b6f97ac5597744a8443830418a
SHA5123af73362e51d00d6e1967198b485ad0f0194c1de0a3ea21aba0aab0bd96d211913a1c0bb7919867b1b40f56f281201e542edae64fb3f7d280d615206818e74cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0d136f5fee42c0956de216ebc9e69af
SHA1495df18bb9f622691606ed923006c304b51811f2
SHA256435247e7ae357947f40f954cc75bfe67f58ccafb78c3d956ebfaa8936f839468
SHA512ec23668e9d0fd09948b362909ec3d8d0bd02ba1f4ab06d8dff9d7ddc24fc2b5eaee224615e47120f7d44e820593bbb71842f39768b003df22bd150f2e9f4f45a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06