Analysis
-
max time kernel
181s -
max time network
216s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 21:06
Static task
static1
Behavioral task
behavioral1
Sample
3cb7ec6209b4c529a37e40d413105b2b.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3cb7ec6209b4c529a37e40d413105b2b.html
Resource
win10v2004-20231215-en
General
-
Target
3cb7ec6209b4c529a37e40d413105b2b.html
-
Size
81KB
-
MD5
3cb7ec6209b4c529a37e40d413105b2b
-
SHA1
e23a760522f13cbde3f6aa68670480e109cdc0c4
-
SHA256
dc4631e8307a89d3381511864d1587e8615727b028b62fa1d1e2c6410e1d2453
-
SHA512
b1b1925edb356da7392c57344b22409887cc6e56fc17b335a239b3c231ed393db8a38c735cdfe83b9fd4fb562650ccfe1e6417d7e6e117859ff7487c5568bc31
-
SSDEEP
1536:faOrV46BuaVbqWjOeW4rlLPccaw6E6ukJ+lHQLQBkrJgo6KaOPMTD19DfbAkHXJr:QFTeW4RpI45Us5IHDdGvs+t
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2830E281-A42D-11EE-B311-F6BE0C79E4FA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c19300000000002000000000010660000000100002000000045406c3aead3cf64f2f9ef949fc105354f79705871ec0ac75e01225e3dce98d4000000000e8000000002000020000000fd7bc8f454ad09efd4366c5fd169d6773305bee7edfb1a714872d149e3c1a0af200000009047850d3bfd117a937e3b18cca3a7bbb0d167a59e29420d6d7f6e3f1936e03c400000001642f8ecb6a44fa6b807783d1567654e210437c463b26c50f0269a2ecf571f2c4a5cbc86e95958a0a0041aee3b42f5ba5a634fe9bbc743ce3638e00360b506e0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0dc63293a38da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409784313" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2636 iexplore.exe 2636 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2852 2636 iexplore.exe 30 PID 2636 wrote to memory of 2852 2636 iexplore.exe 30 PID 2636 wrote to memory of 2852 2636 iexplore.exe 30 PID 2636 wrote to memory of 2852 2636 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3cb7ec6209b4c529a37e40d413105b2b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0e08afe1a0f61959c719f46c4384ae1
SHA1545c95415809cc4fb7490bd2431fbeea2f5e9186
SHA25673c6e5cb336ab918a8e3b311a09f37a5ca02f313c7da0b7ebec890a7cb6ba948
SHA51272268a02c2b86558634ddeb77c3469adc40ded11d283f40d3e467afb6e526fca8589cf4f4e138d1b39235e312bcfb4de1e48f1b2d26aabcc9ae58f75affc5547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddcfdb960ccaf56fab1d855745e6c9a0
SHA163d0af7e42f88184d712a920be48974961f0b406
SHA25677ca6002cc7bdaabdfea827c367990de8ee5cf207d078baee76c4c34e9a29988
SHA512a432d0d12478ff7e6224a31f7b055050b41c7aa33f1c03fa5d23c39657468b33f2fa865ad82ea4f34e7fc34ca98f97cacaabe792bf4c616470e579b0831a5d18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556eb4ba722bc1305f9e7d9c87fee99c1
SHA1b97c8b4187d8be70ca599df460bfe7c7f9d2f0ea
SHA2567db1123ad09db30fc8f00712bb288c7bed2f8b2f464b52b371ee33d4ce312fff
SHA51210bb45d3c1f05cb34bab89cabff41038072cf354d7305a2238d7df9d2a96f4a10d63d584b7730e229080490ff4afaf9702ad287e7eefe18dfaaebc58dd157328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b2cef676d5af78b8c8d378199519544
SHA1e3440c591e3d0ca46c034880449290b042c9f9ba
SHA256743061452870ffc5fbe78eb402c019d380981c3407f546e0281f6afcfce5bee1
SHA512c8219569ce19054f090f08bafa0fc0e3a13936ca8afec3ad12a311c9e82516276092e318078c3ca47b74b32686d9b23d037c7bae6684a161773456b1b571d415
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5959cbed3ec7b5bc0dcf84456a5a326c5
SHA120fb995e409479836ca76e8b5dcdc8c8e1acfc04
SHA25652537418bd973434cf0866e23509ee86f1cfe040ea7de13b45860701f9beb709
SHA5129d3a87f7349f0189e1fcc18fc7a13dbe098dcdd2feb1e0369eafa3d1aea20da6f7e40600141da992d42fa91db8eb77a68b98a537090190f8c0f89f8d4dc2df25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f63779873429e492d355848f8200856
SHA1d96e0bce8f7e805e9b65b49d1401e13de70cc377
SHA256ba3fdab16f2722ede55f664be24d74e2986a5d64dd9c7ed09ca3e4a47b7cf814
SHA512fca79c2d5ac3bdd687095b544988ade3ffd34be70789d2ede906a402ecab8956c867ec2b69fe313ef9285c7de8f15447ebfa8a118ad6f9918a884420b85d90be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d782d74aaecde62340f753119d20319
SHA18cf7ce52ae493ecf1f0a415d26d38ee20fc792b5
SHA2563a73bb39ce2da534002a34356948646a11c8dac8efc801d648646fc614bd7167
SHA51240e5474d38d4edafed983f32ece20f737009a50ee3fe226bb2707cc2b575cd8f2c6446ffe1524f21577766f2f30ca74d4e92aaaa70a046d7e50e50a852a0c449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c875e7c3a1324851fe0ba16ad896ed7b
SHA1d2b9af193688dd6ab9ff6ca45d913ae568fb42f9
SHA25699fc69a5d9385e5e1fa2f5201ac803b068d55d44f3398bd404d5af41371cb4e1
SHA5129ef6e0d64fee9e91f7d4ea8e1cb1f81803cda8d2aa2112db417945e8955d11c7f34669d7cc299f81d69ddea81a75f93c672b2704f7bfb21070c5554550c542d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563ab26f98b7f4cd775b0073215678b81
SHA13ee3cb9d57fb558e5ec110baa6a9e84f59159cb5
SHA25628ab38da0a6a704c5727e21bdee31c905d768307f8540e0782755e90d2cf23c2
SHA51269188165861b27166736913cafc061e6f72e4635f63a91ec2cf6a126de4260014376ac938adbfd9a1a239c24c9ea31737f0ebcebbdbc9f9018637b6dcd6f3427
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa9ecb7b28c51f894cc30d99d0072733
SHA118c7a6a64aebbebea693ffd758c795fad91f665f
SHA2564e4d94b3a9ac82cde108a8302cecbd8bab08826e5c2b75ca99d699d4e0b2cbd5
SHA5127c5baae49f387922c329764433aed0dac67d6b721267a48b010648f4c8df67054fe72db720af5a411f1c32113934add79f8e7ec4e60c50fb61fb4ffb1b2ee2d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599010ce7ea2ac52aab5c98ea61321ddd
SHA10fb71b0d9132b1ba514fa559c5554fbf8b543fc3
SHA25612f65a5156fc093cc287e6e5e313fd8651261a530dd623d3f0d62f777f00bd1c
SHA5129c4b006799a081d6974879e2e461dac846619e36f4074c552fa0e3042c895d8bbb5a29b8e0734792b0b25e3bb23b8c96338fa7ed5893463850a4938efcfef8ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5ce5e16714601f58a0b1140df35b4f6
SHA126675ada509e2a397a729dfbd69605be4797377d
SHA256300c17f4dec3f9c21c8828285c086a797a1be947f8c4007c40fc18c7d4279f3f
SHA5122c17c57e33d27ed8ee59b390c6b4194d68d13405158bca678ab097764da94701778fb90b1e7b9d1ca4f8cbb704735b595d0de215a4fb3cf49d2c6a010b52a2ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51042e35aa533295fd4b9cdedf40432c1
SHA19482a43d7afca4cfe6c38003200b1d98ff68949b
SHA2564666c25685e1f06a4bcbf45e81ace1fd04e3eb55097411a05e5ff7cfabf7b3f4
SHA512cb26420ed70204e9fed80143b2abc1f8f600afa25b5e54da788f4d07d6465bc85027a4ada222f7203f1f950975bce9da3864c2a86972482085597b94315cb1be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5953937beb640ec03bf113d6c01b34926
SHA1a252fce964cff412849c277a3ad8cb15aa48a80a
SHA256788802b1e088f588e588ed70a3912f207cceb315e7bf0cc915ccbccbae45dd45
SHA51295927d8ec4a68028b9bd91ba8f6a0f0756ef67539ae6c1418b0b2dab66d45c65e8ac3208cf1f7ca606314cfbd08ccf8ccbee122da30d64e15e800c9bc471d073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa5f007dab5d0733df1971c8b237fe57
SHA160d4434546f7ff85477bbce8e4c649d4d9e06937
SHA256e5d3e2433715781831c125a5770349f73a675c0c1c22146c361c77625cd0abc9
SHA512cc38988b80ea03458b5d4c146750cf2fd6af8ee3a52b3189f1f5ae7e12e8921c8f153be6a5b86b8fbae3c4ca38620abcd06450f2fd1f4b37688d3895108ee53a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572115d791fac81b5b9707c8c5c13c694
SHA146e8b92cbd8bbff772bc6f51e5b56dcce2a3884a
SHA2567a46ff0b11e8cdf58bc9569a80b4c9e405564fa286f921cebd19b4d36e2051d2
SHA512bc5bd2f6154cc598f593338113044a34e44386c8ac3ded40fea1ce506f8b273477d46dec88969c974ad504ed25cbbd47e38ad06873cde673e3692a81ffa6a307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a327fe567d271effd518a0a7796378e
SHA12a900d1a8f0c6df710658fbd2ee91e0fac7ee0c6
SHA256830590d55ad1b618580221978f402c6f9bf01d4292e02d9697bf8c2ac24fcd64
SHA512c5684ad59a2fda27a2f0c1811f5b11646a043df881a49a4ff8e0116dcfee98f48047d5a64db383a489a14e5f4251ca0bacb29a67609bdb0f68cb9a3800196cef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558b555176a4561da1834e3468fc31998
SHA18a5cad9d0753d06614d84da811df0694d0109d1c
SHA256cdccb23f15ba6cd6a8702d20768dc3d405ee260b8b773206bfc569342dfd855c
SHA5126f5662a08f05f2a7e356b398ab30e635df5d23f2370c07fd5607c63530c4a0a551af7325a147debf8fa4767f25df7eda78f24d03d6b4f87866064b6bbfb0467b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5014f62fe70908d4fe2291650c536739c
SHA14243fffd699a999d88f4be29d8cd8b37c434f177
SHA256e8733e1362676c2f358966bbbb6250c28ba140634e1733e29765ab28deb5c5a9
SHA512d728a221d85f87f9655b85574226cc55ce4b5c358586c8466994825a5d0e2923b0bb2b45f562a4090fa157d7be9fd2178ee347ce435c6abd0615f027a2bcdd6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bc0e67008d53951c906423f4c26ab93
SHA15840be9508e1f8eca7d1019116fcd22ab00670b3
SHA25632ed8da43cfd92dff969b0dce20c596811bdd41b82783b74fe4e8a1f404fa484
SHA512e415f08c811729e59440b5ae7c5dfb21f3da84947b8c0b225c3d1ea1c4532c652142f5f2569b6055f633617ff4f44f8969cf7995f896b34f12a9be1627366ced
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06