Analysis
-
max time kernel
146s -
max time network
175s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 10:20
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20231215-en
General
-
Target
sample.html
-
Size
21KB
-
MD5
18cf27ae67b7f36cdeebb29158d13cb4
-
SHA1
60e20bf334c2fc6824629c0a30a0e188dee982b8
-
SHA256
39cd657700b23ab2818e70629cd2a8cc3d692a15324d95670618aebd9e1ef701
-
SHA512
f33ded176ae282d1814d491170031db398f103042de7f7143923aa65ea9fbd7892a57b1890de68cf0ec95630336bd8934a00bb4aa5e5650677d4526ffc8f32a3
-
SSDEEP
384:9SFpvs5u1cCtpqtpqSQcfz3nsBfl/1RFJvMotdvu3hl:9o98OtpqtpqSQcfz3nsBflM+dvahl
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D9AD121-A385-11EE-B36A-F6BE0C79E4FA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa0000000002000000000010660000000100002000000009abf5495d488292f08649ca02569959261438e585349faeec05c5838acf6490000000000e80000000020000200000009878520e1d5f72efbc14ced36992b2b561da1eff7a9df4343c0bf5a0a5a0a2e020000000d5c8463b13d11cc1565a0fca4879219c2952ba7403670532965a3be1093bb8eb40000000d45232f5bf6fdfa51c8120a18649a9012e4fd9969068411dd0ee0a52165a66081a9a417471b483ffd2741125f7595c37caf761a468503bf966c64d3d3487a7ce iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90332e5e9237da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409712294" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1632 iexplore.exe 1632 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1632 wrote to memory of 2372 1632 iexplore.exe 28 PID 1632 wrote to memory of 2372 1632 iexplore.exe 28 PID 1632 wrote to memory of 2372 1632 iexplore.exe 28 PID 1632 wrote to memory of 2372 1632 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523dd821b7bf807eaeb2fbc51dfb47a12
SHA16583309fe18c914f50cccab9df2d862735054f8d
SHA256251b9d594f69e0748ecb0eda96cda7e74ddd7576f06f8fa6087f6139d715d03d
SHA5125110d6749c434fbce0b346c8f9cd05eec3ef9c74568f5073ba1a80ae75d285a7542bf68ac4c377fa4118f79b3ea948d16b0bf5af3de1834cbdafcc69a300a747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca4cda2c0dbded3ed35644069e7e9374
SHA19db94d36b6b4a7a8cb59a0f2fdf955cca1a14c36
SHA25601d85be1db09e6a809273f667be0387380bffc5375d08293a36ab97c9f89eb83
SHA512ff419f713a27bfd6dff82ba2fabbdd485eec0f035bf52192a51167e5d714ac891022181ac98a661b491e4bfd19a0364981316c65ead69c8424102c0f2690a26a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4fba4716b5b89f1f61c4f4ee321f4d3
SHA180acd3d3cca7efe792e7af55d38b0879c247d203
SHA25668aef085d6e4d41e79e082ada496b1b4e842dc4c5bee70dcbc13a2f8d2fab64a
SHA512446c7c6cea2cdac6f871a55980ddcbb4172ac20b4f6a10865008165ea3cb6d65bcb628b35477207ec9a3203075b38f9b2a34967cd2116f2f242d16ac111a609a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0822b46d283db92dd3b78ec3fcf8c90
SHA17a3d4e18e6639a1b54e4995cf510ff7b76a6fd82
SHA25600f1ffb74bf4b06f67bfc0d3432edcd58e6bd54fdfbea1d2cd1c2b54bfe6ff27
SHA512959407a5fc2f1ad4620249fbd6b87a157110affe8bc1b6242b41604c0845986e276f0465e252bb2bd6f51de3b583a2854c1913cc62be25990fce5fa066a49065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f7bf86c836ba61d758e1c085dca266f
SHA1046814e283bed0fa9ee2d0aa90df20e1eb47ebdf
SHA256b64438dd91125c81aa159ba774bb5a001ecc9145cd61ff593ef285f862fc6edb
SHA512ae449b2bae31eaba026228204c6abb5d8ddc7ec0c92b140bc9ad4bac8348b0a64e358dc5974b56d28c3859dbc0ca493cebf279c5e5574f8a5fd83fea0d2f1f46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f4ca1b2ea11531c4416e160e5742e8f
SHA17048a91d8638f454c1890bfde14a8d1c30976873
SHA256ae636fa4fa4ac5341ccfb0205c4d9263d8f0ce99f9f72e6e488422f813fe6f9a
SHA5120af76e42220586336cc0d9530f12edff5bf56461304b0594806f19bb6dd528af2f198f7754a797a625720e06195ffdcf848debf89aba59b89ce9ded6ec95140a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1cdd411c83136d4a6ab49ef8fe7bba9
SHA11d11ab848b0b6c7d5592766f556b2db5597c6f7a
SHA2562091c5741888a9ba985b121f7dc0b715ac36146a698af0dc474d33afbb0baa94
SHA512803038d5429903adf65e0bcb1b8d03abd2f502a38d8fc5dc042d278b7690bb36226284ddecc7f5251b2d9fb2cb09c75982eddea23e501869c50b11406659bb3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd494aeb9ec5dda0ba330eb1c6c5c560
SHA1679b1dc79c0921aafa9c3fe8681c0e5b8a060442
SHA25661d9039aa0a760fe02066727e6496922b0697339604a10a2b2ec40ef6a57e3e7
SHA5126d1dd6d7cef8543ff03ded0cbbff06715874ea9e00b52a645ddd769cc5635fa8bdd74c39fcb6499a54e6bda9c29ce2e6aaa237b018f3e2851da88530f1679a2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505a0f7554f3a5d477711727f4e57fecd
SHA1ab511dc972b7c49138eac0cb038711402627d97d
SHA256980ccf28523da2e2950caad69c182dde830a61aecaf955299631d75b92dbc872
SHA512aa7e8f04a3bfe43bc6164cbd4db80559b99b88ff610cb25a24c30400eb6eecea8e4c7acfe7fa127409400ca57aef4c3cbe505b4136123372c4311153899ddf42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507b97d9d289a253fd74f362805fdcf74
SHA1beb08d3f500db5084eddd9569c72bbe107b4016a
SHA256b31b8fc6d88cdb816cac91acfdea98cd07880d82e701d3250c1a025f78c93130
SHA512369f03a6301547c9e64ad28a008e55d62e2fbde1532a957bf5a3a9345eef3906b8952b47243e1c7949254c5810a55d9e810397c2f8aa7816e0d823b90f1563ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5143995dc785c312ad36401437d885e9e
SHA1414e003631dc1323b9b54ab0ef02fc80e58d64b8
SHA2563328122361a2794f033eb8b402e5bbb31b60d671f7f6076f9a20c6aff8263973
SHA5127bd2c87f33c573e0fca86e56abe0918409b8e6dc68d8f7d1d41b648935c5b9718138efb186b80ca3755b19e2262e5d538d422da83bd82a29599738e2887d7294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a22c9c29b635b124e31c27d048869cff
SHA1a93efd80c73c56f2dc746ff5738d78e6a859ecbb
SHA256b90b309968887f57b27d0e4cb4741f7584169d7227f07ecbd0e791a87bb509b9
SHA51240216f312a468ce24448abdf9795dd273afcc9c3f74b9bcf944a9604e91dc97d0c86b4aa45b03b6de24a3254643f82d9fe1dad6a902a6fc89a16776a02989b48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3b5293f8faee6c888503379f98254dc
SHA1d606ec136a5e1f69603bdd3576b5678489074745
SHA256419d2bf53595e4e0d7f9b5640c5f6511571dd965c4b997bd2c7bab59337cf51d
SHA512ca2d64544d429fc6e9dd71fd146fc93f19f7671d4064c3351eb834369e40136be980a1169df5e4d07b80b3bf6f8d23ac7046a261d49f9b1e705761dd3c72e06c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce369ab719cba571b9e5a15b33163dcf
SHA1c2d7baa84fc02d809576ad8c75707e6ce75ad46c
SHA2563cccfd6308b996f677098f314d07a077e04632235205be8ec446170bbd671649
SHA5127497fc6318d20b09a85eef93190024851ae602537d2c6ef6ad51a667153de3420cd2e439e7f0428b82e83ceaa6f2d2abe1063e89168de3b9f71d6faf13847878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cebd6d0922d13390022f26c0598c3410
SHA1f260b5e379f9397c57f60bdd5dcb6e02af72fcc7
SHA256dd1f91dd9f3cbfde68359069e1010354db31f19d93bf8340a45c11802f3fe319
SHA5129377e751b5a8d6a84b9f0615100e2d31bbba201ef5d31d39ed5b68c7707d1c098dd48a425f144e4c92f4d94d27d5407139a7275e2abf52ee211504b109216142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54509df2efdd7f61a6870239cea6ece21
SHA18e81bbf6d09b5f5c3521a686c2943511d70aff88
SHA256b77b37e557d3487fb72d26d73afeaef907520387cae3251b913d292b75dd8297
SHA512ab36a8afd1afe4dbb9f937669183c593c1a2604e0ec395aba23414e6d2b01f4f30fa4369900e711e10f7d9b46195090c83becd7b2f0aef74a30b90519b7f8674
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6WEH2YLI\QVVNAG5O.htm
Filesize114KB
MD51fc33214a308d78bace104d3bb3873d0
SHA1e458a02f7746553c4fb51ecf077bdfa5052221e3
SHA2568313f95fae1ab43cdf5dd271f400f632692c1159c07feba5a7cd9e48acfb758d
SHA512c55719857433fdb2a75a535b04f11647c6ee5a8b2cf451858e01f7e321b4c8944b6f28e27506432ea2ce74cc2696fc19c53aa442db59d99af2774e0a272b812e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\E25VF8N4\Asian-Girl-Getting-Her-Pussy-Fingered-Fucked-Stimulated-With-Vibraotrs-On-The-Couch[1].htm
Filesize5B
MD5fda44910deb1a460be4ac5d56d61d837
SHA1f6d0c643351580307b2eaa6a7560e76965496bc7
SHA256933b971c6388d594a23fa1559825db5bec8ade2db1240aa8fc9d0c684949e8c9
SHA51257dda9aa7c29f960cd7948a4e4567844d3289fa729e9e388e7f4edcbdf16bf6a94536598b4f9ff8942849f1f96bd3c00bc24a75e748a36fbf2a145f63bf904c1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06