Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 16:10
Static task
static1
Behavioral task
behavioral1
Sample
ea45bd11f20f76515f741fcc71e0c8e0.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ea45bd11f20f76515f741fcc71e0c8e0.html
Resource
win10v2004-20231215-en
General
-
Target
ea45bd11f20f76515f741fcc71e0c8e0.html
-
Size
1KB
-
MD5
ea45bd11f20f76515f741fcc71e0c8e0
-
SHA1
c6b5214f8ed2e8d2de6d332ee2689b1f902602b9
-
SHA256
a3ddb25e2037640c474845fac57c3d85503d36db6c10fb81436c9ef37b8ac7a6
-
SHA512
b53e6572ebd137f3e1b6d1230539ca43dd0fa0ec09fd8a5f788f62904bc4d0cc9992223ff160c13b80af10d47c2403944cff1730a1ab517c947779afee044099
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b099db902d36da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B7469F01-A220-11EE-B0EB-D691EE3F3902} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409559056" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f12000000000020000000000106600000001000020000000a47a8eb2afb233b8d21b10fb4672c80567ccd627740e7f271fb519a5cd0bc6c3000000000e8000000002000020000000ba7e193f214d3a6adaef1cd0b361c0645f1518af6ca55c74ca5b27f1f533224620000000e3ec7ba37b233a71604b5b697b7f7a2e725cdec14364e02bf53cfc364d86af494000000042b89d6106b85de49834737b3dc691739ef3c20d7898d2fd80f8e7084a2d2b7238796605278d0a32995f7d45dcaa1616f42c51db2959ecf311fc947868d33758 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 3048 2992 iexplore.exe 16 PID 2992 wrote to memory of 3048 2992 iexplore.exe 16 PID 2992 wrote to memory of 3048 2992 iexplore.exe 16 PID 2992 wrote to memory of 3048 2992 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea45bd11f20f76515f741fcc71e0c8e0.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD54e59ccca710f71044841fa922e6e524e
SHA17607d4baa0f51444dec96f5a55135f0168369c6d
SHA25651d2f3ba578624703ad5a461bf0c202a781cd933bf33959bcbc43d20627c43bb
SHA51236cf7ddc68afa4e2931947c3b31b12371d8ae621e7061b1ab666e183d5bce5338f1c2083e4e67d9f84757b5248ed788ce28462b10b7a2a5e4e8ee0ac9e6a346d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f61d67ea880de291073483785c5699fc
SHA184ca51d8781feff60621a242c0b8137bd37256bb
SHA256aa5a9103859ce8308d9c006cea2e37b3bc780d7efc103da79044638da70c90a9
SHA512eaa6a922619d4faf4b413d267acc74f6af7ca6e0366e8949b5de3e9150b2c681d6a847f3789008da37fb2d23bf664304d472ce6d7a4b0d66488aba69d445b753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be5ed865f0acb5863962d7a74506ee57
SHA17d17d7fc7581403fba676dfcb5e9b2cf3b03fe53
SHA256e4e4d16929838b5888c8025dd9b933459b8d99e1c0843946565506df9c5a18d2
SHA512a17ccf647897adcfa908a662a2e600f4f920fd538c7eef46aaae1d6fe117378323e1c5e17fd5e12553a452786219116e0ff3dd989e7b029f6d4fa6e374f0d4f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566452999d2a1dd14910e02093c4cb398
SHA17418fc2ad21a550446b442dbc8a64114966979ac
SHA2563a80f947fe818fa657e0f8416e4a041deb2b0f909dfdda0ec327d9a6e118cde5
SHA512d3958dcb819aef79daf4d13a27a802a9d4ee3274fae6a763e7adce31afe747583e1d091d6a96269ecc975a0627fd1fea8a5709a94df6dbdbac9dc8497fb41965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc50e496efe67c1bdbc52951fff65779
SHA1308579b74841c9945e2ee310c3fdbba7329065be
SHA25650533fd1cc00b437ba9fa9f9dfeb48a32075f42da2851870f8e2b9ce4260c5bd
SHA512542aa1d1dde64a69b917f3449eff5291d1b891d662ff34aab24937231d7e5eeefc67aaec91659eab2b3147dad809ffc4749c29c22b2b35e4200de1164a173e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52000fefc2e0df312029d2449f3033fe3
SHA10f8e83592deace201312ca57c4667cbe00cb8ac9
SHA2562798933b4e68f49763bddfede2d9c5fbfd2cc1a88826a32546bc4c100910e1f4
SHA51290304db2e197f03448a33e7bf9e6d6fbeaeee5c886ba93f09f238f2004486ed25316d42109f509416ffc490f6b6c21e92b19fb76958dc80742e5f059d72de6c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584f4658430401c1b57caaaa5859f1696
SHA10128fdb0bf7b5ea7a3fea28f50d6895a1dd15750
SHA256ba4fbba048d3f43cde23eb7ec7c7b2ec545722140bbb83f757a03ff468636898
SHA512533130adda06ff2722316bed48fa4dd8bbd6e830653d59c098e0cea30eef2f3c43c8a5d9623c5712ebcbfe4b4342d8b9ec601a46921d932bb4f84bf97ab288f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50624ca3c42742de407829006c7918ef5
SHA159c541e571ae4288557cdc9e8ce9b5d00874d711
SHA256a9f253160d2872455d3649cb26902b35c2b247c0cda8bf6f8d83cc705fcd8059
SHA512fb31e9d777ba006af0861d10cdc38ee718f688b392bbd685520eed7db570fba47cc4b1c2b96d4eedb2b1ba832b3bdd7016afe69209ff3324b97da1c3e8a1df45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5116717242a93c133a285063185f99a63
SHA17c894986652cf6d23da319f2fb2bf833292f4b70
SHA256bcef5012ac680eb2c9807c5ed3f583dbedcafb0b1dd55c85d3cf20a3e46955b9
SHA5125b1fe41e9c6f4f53d23db4e84b1cb300212780b80a1e1150115e7c608b538532b536757a93881de1a771679ca5d5d21e8971fe1f0ce3a9706c3a54798fc46cc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b7de83382a387fa792a7efb2fd221e5
SHA14b2ae23206f1db725d54f3d96c30731582d63627
SHA25652360a13b2a528cbbdbae67fdae8606d6050e03af339b4519fcbeaaf03bc4742
SHA512a7984298f32f75af36b74cf8266d1fbf4fe43dc3f0eb6fe7022758e2f92ca7f77c65b5a17b4f1c9a7d1808f0e401f0756f7b84920ec78817b984d9aacd991c16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad3fec8360178c84a4401d41442598ad
SHA113fb106f87da328ef832d60dd8e91f0562b5d99d
SHA2564e221d116cd3e305097a2175d5553643a373b713ded1703ee03e86f5a52429a4
SHA512bdb74b3fb5df5dc2e6343f93421f8044792e9bb0119fb3f8efe78906837250cdd30ba20e931771bbf6069751c449d8ed16b9b2bb1dcdfe790d6bb6b4ec601a64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0e2a74443fe0ca0cf8e60fefb33350e
SHA1050d03258ebcfc4efc537667414e1410fdd1aef7
SHA256bf9d5b40931c931f66d1293d13c277daf5fd34618bb3b825d0ef8c4fbbbf0f54
SHA512c786eae0c8cb1d99988bbe8ca2966d13e5c0e7e2168df529c0da1b092e9dff4bce0f9dae2ab06f73c971a3e8dedde300656cd401fbe211f566f7615599e57183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df19eb88395a846b65d456b0cc6bdb5c
SHA1ab944ac9e807b6e0d29165f56418f5c9ab4f6f1d
SHA256c311b42917d8ebaf95dacecc4828b90ac818ab6253a902fb5dc524e087f34257
SHA51252aa74ba1d3fe86c2adcfa46f1aafdba49874a70bdd6693e44cb055ec6b051c527b21378801513f2438721ec8a652053a45de577760d5d2e2db06de3fb66a809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54711f687d22df9d37763d1e9e32161f3
SHA12b2154960677c77956ce1f5ea6e60e89336b450c
SHA2562baf75ea32d4d0fd1e127f90198b2e3eaa12ea09aa23923e3fc9e0c9c1a09116
SHA51208d48999bfe07d30885ab32065aac8b9d31d3519a7579cf9c26b06d1a2804f7a8903b8b2a78c524f93fb2d6feda4468f93d8cd375478f097a08b899e8594d703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5e7ac56b3d7fbd6eb3375232307d142b6
SHA1428c072dd950bcd14dbc16bf51551179b43e7695
SHA256f3ff861e50e340886e865dee582d932d16b032c902c2c226f9853bf314a18b90
SHA5120cac4a8eb0b953491b36068a27b85342cacaeaf7dd5f2807700f72e42483af05420304741e3d79a3f3b3f479e0989f9e84d25eddb724f30308bdeeeed55af51c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5def4be98dcd441ca502017323907e155
SHA1a8112002504d7a0cc8c29144fa37fd6351a7c663
SHA256d3dc5789f63e497a81baf56a3ee9750fa8783939176469ad563dcbf4324428ba
SHA5128e030e5df980bb12ac047b93d1d0b8500c52fa11bc77994d40fad559fc43253b96d3e63e59c56642f86af222e77812e0ca1ac884b80fbb5ad962d45e0b596989
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06