Analysis
-
max time kernel
122s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 12:26
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20231215-en
General
-
Target
sample.html
-
Size
20KB
-
MD5
057e9b0cd2d2e79cbbc376dcf934dc51
-
SHA1
6c4c7596eed1fc4d0b9c0e6f0b38e9c13229567d
-
SHA256
7dfbc0507a21ebe4a10af7b74f2721062a50b7a4b2cbccdf14dbde7be07d862e
-
SHA512
b72945c3ce0c351eb1f5e80960d337ee8e96174866c3723a7d8f84e6f2e57b3d5f0dbb88705f11cdd83d7ad3381759aa5615354bf4ba36f5eadac71fb26e65a6
-
SSDEEP
384:FSFpvsAuXACyHPukiiV8ZLhx/1RF3vMotdvu3hl:Fo9lOyHPukiiV8VhfM+dvahl
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0df7f755c39da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409909030" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e91786640000000002000000000010660000000100002000000092a1f75256c051f28ff86ceafddf5eda11b1dff4e8a314cb4ae979464c3875df000000000e8000000002000020000000c02f2dfd6e0c65c43ee49e40ece81c4837b37505da1ec26817b7b03e16f798f5200000007c034e2f1ae15bf705310d3727d46dd7956db066f8238547ad357a7c6eedc70840000000bf2a2eeede4ffa5db85afc064012424b7cf94b23dabdb1a743fedaed98965465f9beed0b38aef50ce87be3634fb8a4894e2c539bf5203d7bae862ca742c3fe42 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8E6D5791-A54F-11EE-B377-EEC5CD00071E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2960 iexplore.exe 2960 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2176 2960 iexplore.exe 28 PID 2960 wrote to memory of 2176 2960 iexplore.exe 28 PID 2960 wrote to memory of 2176 2960 iexplore.exe 28 PID 2960 wrote to memory of 2176 2960 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2960 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac1b3c5568bf93bdd075fe851d412bac
SHA1dcfa8086fadbff8dbb04b08de40e766c397394de
SHA2565e90c78f81cb32e72a9f44a48833a5242e5c99be9a964bd84f027c467b4886fc
SHA512d0a87b8c17db0e8c3701c9f077ed79ace92e220b4612bc140a2a9c213e8f4a7f8977f0f920e94e689e51b883a5c862ae4714d65907381804a97395e90bdc57c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd64e8a05b6ab40e870747cbee1f00aa
SHA1ab7dcaa120b79dd6fe47d0f9c32f18fe223465a2
SHA256ac2e20071e5099be2e14214596cb03f03de2c21ab1674eab271a708182fa22ba
SHA512041d15b43a4acf7f62712d86e1c00f7fb20262abdb4b9d00d4ee515293146f134e359ba0893903cb92525affeaa33c33fde49245548d5c941cd8ed3633b6db89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52267d8e17d66b412a96d66d558aedc34
SHA1d766ebd95b28f6c3c5fc730a505051a4288d0cf9
SHA2568f19a21e40bc83c4db55228a15433e16cf79c32e693b27798cd8c86d0f61c9c6
SHA51263bca0348d17c96450a5505531e3969c322d57902a81fb24aff92c0757151050394c8ce79228d5fa44f8e8ba1c976538c55eabea10f12f5b2ee6cd8dceec27cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572ec14385dca0f2c1aff2fd3dc94326c
SHA19e678f415f3abc3546ab8624e9e58ffd26f51481
SHA256a3aee7b9a3fb4f1e4a5b0ae5caa009ef9ab577a73a1353662e338f9e60aaefea
SHA5129d03230ac707d0f33f25ae360618e460c3fd352fee939e8cb6b0cf1869ec28b462031ef70972ffa0bd3507afd825d828222bf4b84aa1baa986accd90af771f30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5099089e2476c66f5340bcc832ad1117b
SHA10b27d74b1393c3685ca4213d1d951088518ae84e
SHA2564227e50e6abb0f81a5e53d6ca976c8c8561464cc8edb74d81d8044a41d0ae024
SHA512784e9806e0821784245e8abaf691726acfd3a13e5a48a2f4e5d06fec0957e95d443bb1e992ffa43a5887f5f6e8d1feaaaddb7c661026267317ddad2fcb6c0aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c8c05769a872bb1713174fc8cfa5e47
SHA16b94c283c62a67ad93198b65d68ce115eecdc820
SHA2560dea52522a64d8d958f7283a2567b9e4e0120f974ecfbd812e20b951bea6df10
SHA5129fbf30ebfadf908f4c8cad54aa98860098bb926569f5742cd64cb552a9981561136f0068ec9cf0015ee8d1738f849f0ce6e5c872b58bcdf701cc685e9aa35b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb30d6edbec82b831a9c6db69e60ea47
SHA17faefbec42ff46d8bec3c968a1c2f83100a94fc7
SHA2564e183bb344556bf8dc05aeafb06d99277f16389a278ae468a6763d068a5ee4c8
SHA51281eb90a4b6c1201baf2b80afa8d9b085f4e6b65f65e42f54396adda5c54f9ff039f33adfe0fcdd1131ef8c2f505cd723553523cad7d911e346434a2df57972fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b83da5efb5d9fea06a39c214a2e8673c
SHA170310a5a78e9061940f2edabbe5c427e0377c3df
SHA256e53b7267edb5fa165201d59afd6a92d39457ad2a7780abea529a4397fc14ed67
SHA512472cef7a67b250e4ff4a0b628a81815d29201ab720d4dd4458c49c7cdf7c02b2a3be9236964fe0382b56d630a9d5bd93d07c6642b5084748d2ae9013763bbfa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e3f8dc0258c119b203e59afda305440
SHA13a0cab6a06ad919c38af95db370df7060d3e0163
SHA25663c8eb520b0c755af2c785a525e007f3bbba57d0cf191752cb8682cd0eb94d61
SHA512045c2f040d3faa117d6cce90fbedc0be87d8ad83143ffe7cacdad614cdecc04daaad334fe984a260a16c5dad3c642dd79ba323a697501fe46c5cae0254d28c21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ab49649a464ed7cfeb9b9210d3be0a4
SHA1aebab917999e101bb1c06b4b08055cd51782748b
SHA2560da1252d001106fe5f5ac9702115abd41134d3abba2572a810b12d395aaf546f
SHA5125661f6889f4e26ba10fd3a3275b49e51ef228b12d142b69185d4e403d09e1d9187552e0208b895c2289796aba5b5f8acdd13b5be484ccee5c1b603cb94ade01d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503c63adc85e99e52fbd3cefed1e81a3c
SHA1d8a6e832fba83720f0e52e796e9e16e1edffdfc8
SHA25628a788e6cd51b80a397482064221ed09702518c6979b9f44c40309a38fa53c64
SHA512805b9a37f953eb71b527c275660e768eea5fcf1baf492a039ede354cb0b223c6fcf83a2e54177b16d3707a8438e8bd3c813f65fe47912e5350c41d485432a4b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562f2d3df3f222e29d3754e17602ce3ff
SHA18fde01e70c354d7865c2378c40e54cfce2e83047
SHA256d99e430308a76391c5b3aff2445a0cb357fa8620e06aa9bbac113f190321eefc
SHA5126b9589ca7ccfb9c1163580dfc6e3e004336f0db4fd29ba5ca179fe7b3a2d3b114744829fb1a762085def1caa8de9ba551f99876ff03ae7fb7e951f088cc16a03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ffc7ab38bff997ceb5f570398ac5426
SHA18a950e1b0676f809899c7e3083a748e184ac78fd
SHA256f35ec795f73b2bafd518e0047f12c3a15e641c06bbb3f892b866505f96da828c
SHA5126fa5e3039eaaf1e9cc0b9f4910513774b79d26ee8c9345a2975a0ac5f9d10dac00a5f5db9edb821a7794674be3ed88eb5f13b46646f75e8a039e31c8fc33f8a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e543c9b2e900f1d5a77264c640f5f62b
SHA1013eac3c5d5afde391b3b53c46181081bc212d64
SHA256a757a89c81959955bad81d8c4d42744d8d9e0cff38a573335399ccffcde3cab3
SHA5127e9084e8dd560b7b98d3129c48784b57aaba812cc53221ce35b86f8632f7d543a6bbe5af568056127a820baec81bbb6a4ac1f2062f95c32ac685ae0fbc6c1141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b86c731aee704321665cfac40f7a5ffd
SHA1722a45ade2c70f292082100477a597b49dd26609
SHA256645465f541433e4e01eed2c14cbc8d511d0fd80752d65d64b13082956924dfb7
SHA5123f55ae8df37ca4d1ab3dc7716c9c90967f7cb157ba6704b5c53805ae9002054eec4f242a00367331d99b3ed5cc0a3b0ffacfb37a8d3006f0561662f6f624cee3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53126dad1581f973557690c040355d2c8
SHA16ff945893a98c835ab365914d9c91ae04c4df85d
SHA256156c8f9720f10247876e35b820e8ad87d0ef0e4699a81ad3868b890d442ec295
SHA512772555fbfeee5b419459f2a21754a1b266e0418e1ff25ed7aec9c25b3d41960c21be80c1130f3a0a380caef5cd3a15dd9ee6c769cad9099a7189646d012d66ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5703f5aac541f2c37d400eb0dbd7d3cbf
SHA156cb51751884745604b6876877d5e6d2f258ba95
SHA256fbc463a4e1808074ff56a4eb884e1e33a62a8a2118f427dbef4a6a4f194e84be
SHA5129db0301b78faa32e94b8f3f8dc8c8d43a91a1e4057b616bf841447dce72f763b7e2aa18242a012b925a1601a0d98f7b48b76677e142c613d0ed8af16de8e777f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\E1CCB52I\QR9GK7Q4.htm
Filesize114KB
MD51fc33214a308d78bace104d3bb3873d0
SHA1e458a02f7746553c4fb51ecf077bdfa5052221e3
SHA2568313f95fae1ab43cdf5dd271f400f632692c1159c07feba5a7cd9e48acfb758d
SHA512c55719857433fdb2a75a535b04f11647c6ee5a8b2cf451858e01f7e321b4c8944b6f28e27506432ea2ce74cc2696fc19c53aa442db59d99af2774e0a272b812e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YV6H14B0\Vaginal-threesome[1].htm
Filesize5B
MD5fda44910deb1a460be4ac5d56d61d837
SHA1f6d0c643351580307b2eaa6a7560e76965496bc7
SHA256933b971c6388d594a23fa1559825db5bec8ade2db1240aa8fc9d0c684949e8c9
SHA51257dda9aa7c29f960cd7948a4e4567844d3289fa729e9e388e7f4edcbdf16bf6a94536598b4f9ff8942849f1f96bd3c00bc24a75e748a36fbf2a145f63bf904c1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06