Analysis
-
max time kernel
131s -
max time network
168s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 12:59
Static task
static1
Behavioral task
behavioral1
Sample
2061f63354bc47d17ed44cffca53cf6f.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2061f63354bc47d17ed44cffca53cf6f.html
Resource
win10v2004-20231222-en
General
-
Target
2061f63354bc47d17ed44cffca53cf6f.html
-
Size
895B
-
MD5
2061f63354bc47d17ed44cffca53cf6f
-
SHA1
e1bd5f00a44e607ae3e6a8458a43559e502bcb21
-
SHA256
a92014e3206b0b78fe001a450de631ecdbd6cf902f7a39e7b1b78e8bcfcbca0c
-
SHA512
a7b72435cd7aa3fb32b3e0b5ac556550a8084eb1dea4a76ad0e5f9a3acf49f31982c43131cd07a0f5d176f3b3f4789be5383c694fb4c9b9f8c45c5c6d1b14d3c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409916910" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd76917334189000000000200000000001066000000010000200000002842f9c6917bf09def12b540c67ee5963164633ff3cffbf4fa63fa43c9b18784000000000e8000000002000020000000b144708f533e8b239b562b598bfded20e2acd835c8e502e51b09b364d11b235b2000000092b99d73759fa6b8ebf021912f1df8a593e3bdf6f791159cc02284df710ba8c240000000fa9056c90291b6fc8b5a194bd05376b2a04f7fceb3ae5fb322af96bb98fee73a2e24d61d2f5569be9992462dc33082b07132ce6557866814fce58833f293d977 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0c8faa66e39da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DFCF17B1-A561-11EE-A623-CE9B5D0C5DE4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1516 iexplore.exe 1516 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1516 wrote to memory of 2720 1516 iexplore.exe 28 PID 1516 wrote to memory of 2720 1516 iexplore.exe 28 PID 1516 wrote to memory of 2720 1516 iexplore.exe 28 PID 1516 wrote to memory of 2720 1516 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2061f63354bc47d17ed44cffca53cf6f.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1516 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be1c9c78306d6f093b1f561de7e9e8cf
SHA15b75e2dee0c2109ef2846558e98ecc7fb467ddfc
SHA2568ca0b7ab42e323d324768c0af17cffcc438a8d6ad76d07e71c345a9391b4334d
SHA51254cc30e81587767fe07fa2343974c1dc534bd3875da88b389bad4475133683ccdc783698273c2aa64609cabe28918f48aede4e07f7324d41fc6794adc8f8fd95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d178e0075746f6a06caa5a5f4708797
SHA1c3d256954ac489cf9697c654def34798ab8e3729
SHA256041567d701c3bd24b0a1e81d30ea063c3dbac5d53f965df32aa3d3249d4e7cf7
SHA51232bf8b5352e8cec62988df027351918cf72cea8514391bb135f92e0058a8ef1494f9f430d25ccd7ba327ce449de423ad64d3d0fa622bdd1ad62342fae47be79f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576802a5e0964bf96a2cf550e1e4260cc
SHA121e3923dd691bb3ea87bddda7e7ecd71d91ec274
SHA25644f4bec218965d1a77c4d23b30160aa650a38970440b62f6c2d8af0d38b21c22
SHA512242128b4eef49773486716e36e2897acc18867b854122353053c2128acead1f076b7b3de6fbc1f1d30e472e620e3780a1c7d4535379984a9c1b744ddb83d8144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d87072c7ff3e0f8d2c19a550d11baf1d
SHA1e386de5ff0cf27a14cbfb5ddbfaafd802e97ac6f
SHA25622c2fdebeba5bf8c45bfcf8c5cacb55f0107ac703dbf50a0851224e05f247190
SHA51254df7a0e68be93102ee2f264b6d12d7440db2b7ffbf782685fd4d569749eeb38bf24a75a6f839116400f45a3ae4497c1f18592c9dcc8b7f0615aeb534eace952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536cc99c150f5bb6214677cfab505c133
SHA15ee89d9e9726570e8001e5aedc1a4587c393685a
SHA25679238e71c5316ca1168e35f7d4bf0125e0d938fb190ce4f8c0fc5621ca1bbaf2
SHA51244ba280e35fc5465e027b5b07b889cf8549c88451364bc9a801cb6d27dc890021ae5390b3471aace48b765231c126b7bd9ce101c879604c3954029c3b1869cd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec543f4c852b15ddea2ba75f4f1a4412
SHA134063e58cf8dcfd98a14b2d54d9da2ada13a51f5
SHA256fac84f5ee36545da8d67afd1dde05c6532e1b2ddae2f12df4eee5a577f7cc687
SHA5129ee5d2b785c2ed0a9efddc1295348ee6ad87eabdaaf13c2b3f840c794b1c786f562ee031e633ea93aacc2b6db628c39f5492cfc71764e9208cb4469a87cf8079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9d7b421395e42dcb67594bf8cf9275c
SHA12ac388eadaf2a54d19e8ac9c6fd86b5a11fc200c
SHA2564d554839a1e517526eeac45acc5ed620296a893cefda1f6c9c8842813a0c1c1e
SHA51291b1bcab027f758f25f818b11fce9059b9df46139665a6fad1aa727a170e310b5ad4ea49d10d71f685ddec9943e3c294b2619a6eee7a280c559c5272c3a42c6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c31a42cf4ffa41e13a965d9e8f2e4a9e
SHA1d1d99b7657902dcea76973792625b28d115f6cd9
SHA256fb929f8ef9a6e39bb5ba52e54eb3c6b82a20c0fbb20f6764548d2ec29074c5df
SHA512f8edb1aeb26181a5c8c65ba0cef5035bf0b54fd98fc62ff5b5ecfb601cbe9e80b573bdc79cbeebd2d3084ef3a74ec1717225c8e9963d12118f5aef1c2f72d85c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f11901dbbb458455e75a5a1735863a31
SHA1d339f6a123e4c57d7731685052112f20c53b2efc
SHA256ba684dd34ed9557f03f784792c82805eb6910cedd6da9ea1d0d81fdb65ed282e
SHA512ddf65a93906ec7c3b2d4e9d2214bfe76d1420c1b4b5dd442ada87326c0e79e2c3eee8081fd66e27d155766df70c105b219f9c138f92d2272e096aca4f4f51d95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5072562fcd30aae698116af7e6c905ad9
SHA1b4f4ff181af6ae3fba4cbc5e4309c03fea0518ee
SHA256490158ec626c2ce4553ce8dc89883923502b7035a1cb7fd4bc84749914c72651
SHA512bb26e590f6c27e84a5cf2ec1eef0732044064b98ac572788717099963ad97096d70be999d81bf9d3cb1ae29d62e400c4111f403e4b9f4ef1d3a7324856bd023b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9ed405ffcbe30349f4c9a81ba4c947a
SHA149d79aa29e03807acb08a894fb422948912ead5e
SHA2561064938d58fdfa1773bfd7c5f80c73c3d940ec2024082e96b3e514f5700fcc5c
SHA512e9c1e3642b5622f7f096b26d8e3276331e2e17f8e3180e6032d317af685211f515ea4540f2d05cce873674023c896b77a922bd3dcad83ed6e0f868b753cecc18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53395f0ab189aa04eb64d36ec419c3e67
SHA1df2f38470c989cf060da97762cefcf00841b2d18
SHA256914bcd3f66aab3aa5ea940a4b10c5e209cac9e26fb28055073c6c0fb78227d26
SHA5120fc2b13a09deddf7d453eba2c625c740c6dbfc6bc11038ba326f72fb9b845172a500e478b132055489ca5d6e038d640e840a059fef627d173d3c09018e2660da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5418827d8b2a592e980f506cfb61d760a
SHA19087b8f9919dff29de259d2cb75b9a94ae9912c6
SHA256166deae655f53ab4768a3be742e276fd99bf29f5b45d27047ade7868106eb4b3
SHA512d79fe596819ff2ad252ab8e5195afac9c07c1692fbc13d6afa8ad497e0444299f1af364a13c1ba5d3cbf654d5adbbfb8a187f911507d99c9e83e4e5573c8ecce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560b99dd8c12638d5e7ede7804363570e
SHA19fec1adc17e2f57a326649264f0c75bfb9398c92
SHA256c77fb2dc67dc8777bfcf902cbabd7713309c5bdff66f1ebc1d270b1424830562
SHA512c2a243049b69fc6e7c0002fbb54c49920db3a34cee5eaedb1982fd55ffd8d2cbdfd4e30d5319c9ec2b490f4f737f16c7d3decfb534c06baaeaae64aae91ac9c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b3c3005d0b09991bc97254ee7b20acb
SHA1d48bf7ae615ca74851ed3b7d0b9fa051dd9490e7
SHA25685f0127b19c2cfc3a4586e0191fdb54b84067bf060fdfae3f5b708a4c2181587
SHA5120ddb52d106e55c044357cd02d89f08f50404803706589e4b2390d12b8cf90fcedb52b60350f94c5db61daa9fb3af83bc6495928a61871144f5622e80814cdb52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5622b982bcfd5b670307f01c256cb6eb5
SHA1f32d2edca1704529c97d2dd40cf329a5b60c56a0
SHA256546c79bf8f81a86ec5dd35e697d70aaa34e855974a468226b0eecbd72d603d9d
SHA512db8d0fd19209439938d49ea3b39d7e606864d38d17ca1f37770c3cc0317d9c37cfe0cf6b6d0535dcd51d298cc2c4a8bfa70003979e282cb876e89bc057cb1cb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51350ce6097cae4b24ad967c7bb6ad40d
SHA1fe8b4c7c7d6035e8574eeee5855a529f2e04e306
SHA2568f8d46ad9219e0c6d05d5371f0d5df78eab8f35ca80c0db18b82507b10301755
SHA512fdf18793c1e2c72729b3b0033ee823652bde5652ab7a2eb1bff22518a31c064a89368b132d6d5e4a3cb8856eb0b8f6bd1bc86bbf513e5432c5d79ad10efca67f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b44974dec2e79931d68a65d09ed27922
SHA1f13c081d05ff2b7c0ee265beec6f1fdaa2b3327a
SHA256d23d827237d12b41dd34d6cd26b67a993f9c939da3ecec6a437f9e76ae9d9845
SHA512160a2d309773ca0f5ce9e41b3296fd28385aa7221ed6bbb6dcc864fbf4cada3c90b782bdd52ec48d274b296d90850f44d87003ff713a5fcb3d2e4af22adb1451
-
Filesize
1KB
MD54f69e26a60ecf40b098ae8873339d861
SHA1862764a739840a7bae3877fce4918df4ad1957c5
SHA25639ade9c216ad9f856197a4a00945ae716dae47644d3f88906aef8db5ac928949
SHA512cfa34b19cba4a0991eebc0872b8c7b2ecff6205f8bb7a4c75848c0f57edcdb4357bd04e2bdb9d7bfec0a8d42774e83d017ca9034fc2cc9e42a545614babdd073
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U9VC31Q9\favicon[1].ico
Filesize1KB
MD591abe01116ab422c598e9c8af72cf4da
SHA10f2815fe8e067d48537ad168225ab4674271fa27
SHA256b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc
SHA512a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06