Analysis
-
max time kernel
139s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 01:16
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20231215-en
General
-
Target
sample.html
-
Size
23KB
-
MD5
57522c8301b831d073ec79126e2d699e
-
SHA1
3446dfa5a61648f63f87fee3db55b08b480b44b6
-
SHA256
a08fbfbf805058aae3dbbe0196dd0fe727e66012da38b4bc9d73085cbd550320
-
SHA512
d369e01d8bdb249bf97bc56cef454f8e2b40bb707a2411505d27c5c520f9a491f43e9822798535bc83c531c55707a7fdef6cb705893d06ca807b45eeb1c231da
-
SSDEEP
384:xSFpvsVhXo2CbZzqioYS2LgUyFsFRJ/1RFavMotdvu3hl:xo9uuvbZzqioYS2LgUyFFM+dvahl
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409806009" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c027b8986c38da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B07AB441-A45F-11EE-B665-FA7D6BB1EAA3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d30000000000200000000001066000000010000200000009ee0c3080dcf215c1459045a9b57569cf7b4846e3435097be60b48800989a822000000000e80000000020000200000001b0a93c36bffaec6f0c60dad0c1162630f8dbd99f0ffbd4af2369fdc4c6c664b2000000090e5972636751fb1a8be14cc15887f3effb9e3b694b5158651335b9a978295fd40000000ed01277b2ee9eee07179541dff5a83ba91560e3df540e94f607409158bfe1b6d2f7d0a7372ffb8cf6754fd1cf540be68218b607cee80a19b6cf5610e9eac1226 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1664 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1664 iexplore.exe 1664 iexplore.exe 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1664 wrote to memory of 2120 1664 iexplore.exe 28 PID 1664 wrote to memory of 2120 1664 iexplore.exe 28 PID 1664 wrote to memory of 2120 1664 iexplore.exe 28 PID 1664 wrote to memory of 2120 1664 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1664 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57acf58d796bd73b532b82304613b0ee0
SHA1a9d92de9d045782338d805dc9d3fc8ef97c56331
SHA2569ae27401118913feec2a1eee3dba16876140bb3fbaea87ea80ae2eb6b8417df7
SHA512705e22d0cd7824d90ae073a5cb08501c575565a356059a5560cd604c2c7d15539e0d04bceccbd9c0713d78e7f4c652bd33fc25f3af5bf54f5e5f322d490edcaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5227078880d73b34eca909fa0b6225195
SHA16a7e045abd8efcc87b4491a5f4983eef55f84af6
SHA2561f89281b9eec8c3289e0d6388a27b3d9bf56693ad05901d1a312f04a83f18d0f
SHA512d6582af64c70bf6c4e97d96d0ac768a6a87467f7cd317b262cb24bebb7c0f8669597be7c05aafe96153f662e72ed1d35a4a496d938f4dd76b4a5f82d9110b530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516cdbf9b55fa8810527851eecfc07c8a
SHA12379062dad09743b961c0b6de1a1928f346d4acd
SHA25619ed82872bc91eb010c728d531429dd82d2024e604d24c2a8bab3a19cc7363ce
SHA512aa8361b0d804c46870714cd7abef2eb466c95f4828033ecc111b41dea348454ba77510c7eb11f9336ee599812aeb4904276b37dd685aaf591c7bf1b946739cd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc8cd70aecbc1222ded78bc29dcdd4f2
SHA1ae842cb7a701d6ee087649e93cdbf737fc4b1016
SHA256f8cc1facace0ccf2ee4ad90a073ae482f328130bb37b6f6fcf3ebac7f6f76d54
SHA512bf1c8990c57a7b0efee1a20cd3baee5c947e3e038a9a8681d0e699629214da3f7488939feb3ac58e3d63d5ce572002bff55b90897086954b9ddc13b49f1b1024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a2b0eb59826a3a60084f3860077d2c3
SHA1bb0a2c67619b882045199dae83782f2245b60c96
SHA2562b4a3a4357d230ab1419c45ebed7f7ce9338becab9b6afa2f1b697e9d652b264
SHA5121c4154f957a0f77badbadb3f19f65dd36e33924099700cf728ea7fa722726b000a9be3744b50f2817d802c6879c70edd1aecc352f71afd61a552f286b1aad9f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5900276571e356c3d18310cba7300b1f6
SHA1e29995993d7c11196ec292193c553b1e10386eed
SHA256b900ea27cee14e64d34c2011647c2b7593cc7af94b0ae592f9bace335cd93443
SHA512f058ca3c5575364b6008ede522c727769a689af32e0fc8c88f6e611a647c712d1ce59a2993f9d3fb1cb822b0a908837817cef1b500da743b2380436ac23336b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5888e1b0760109b02db3f60fffc401004
SHA1850603fecb3f9f5c88e3d2479789dffcab980d4c
SHA25625c3b2f9e5d560da0c8a1c10a347c3b8b721df98f3cd51b812db22e377e7e0b6
SHA51244092f037b6db99d8a2d0161ba91474c14c42c26c7a8dcb7447803df4bbbb044a761bcffbdee2ef85641eb566829708fabe285c5f082940162eddba13ae8af91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecb076e613ffe85b1ac14009a47445e4
SHA1e02be90aa7d2dee4daeefd93ca52bbdd63e3311e
SHA25624946d07d40e371d6af1790a8bb4f5b572c769d22c608f62590adec855db7f98
SHA51247b16e137ab3df828f0e9376eb999c6e3859e802635dcf88b4a2cd18bd0da790fd9c50dd351e478353c5c444fbdea4bc9beee08032fc7b9b7b55642229108867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59288902700790296d1a20a2eddc27e47
SHA186efdf90f984ac19c5c381c61310589eb3fc49dc
SHA2564da3a3ed2191c97a71ba9bd6be35eed8ee3f73a53a30de2795db6d60f7d6526f
SHA512ff06741ab3e23bfcf619800e422a3d9283e3aafa40e18b20f36c79fe70422e62525b737fb96930e8188431c78468ec8de92e76210c3c7420d0d20d41e1abd713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9ae0b7e52f7bddeca2f9c975fdeea53
SHA16f10a25df9888d23ba858af0f5271cafa82b5092
SHA256c9aab2d7c7aba952487b228ff1b3cc789cf47272ab2ee19db78ef048fc8864a5
SHA5128f78d48108873b509e61c54f853416c442dd87e61f8685909ffa1094456ffb2bd58ebe918dcf9ac98d38b99d2926a7a6d7cb2f953652032f204d1a38203d462a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597183e1304f15d4b0f6c6403157fe496
SHA1a3a7e771ee8e7a5503726788f3d247851813046b
SHA2567ce617ba58566ab06aa539bc4ece97efa246035831c560c705d41244ddc6da3a
SHA512c3a58d00d55cccb020cf1403b44b6b33df75566e719332fa11851bdfe9b9d2843c321f147a27ba0c8739bdab7b8fd6cbef3d78d31847bec31099ed678ddb1d3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ebb8d8354dafe1b67cc959232dcb187
SHA1e03ab2006f7e676efcef2e432378778f8d2d93dc
SHA2567b33b68f50ccaa6798ca92c0ecb868bc545de384e6a894573d2808843ec0450d
SHA512a384f84753e74813105b94fdd83d0e2bef192aa390d922895989620435369fac79707cb06bb571121858e64351f69facce58cf7ca95d3d995d22ff131d0d546f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525dd2cfef350e180e55635f1f381d775
SHA1fe4bc09d32d3099036637455cd8cc3e6c97f7470
SHA2562b3c538968ab77c5cdf709162238d6525776daaa8f5eb33c52b94ad3256d6658
SHA51224bfdfa6e501aa917fd4061503e7e6fd022bdac7f430451ab5640e1629dea253fa0135982f5bf22438d5514b59dae03490459da3366c5dd5f41b09505b4b6e45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50316382a5e7231cfa304908341f0396a
SHA1fa07e3cb1192c6ecf663603cfc2109734b07b176
SHA25695b5b1c2cbda0404af2784910f41753f220430f95581318365b7650dce9c2860
SHA5121c0659e73089185e49e4de531e76b3c19a8994114c14c3a3827330b20a5c59fc69f066e1060c363e8ecea7f91d94d4c2fc01d1c245cbc8e8fd054b432e610a1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c568d36390de6c7c2bfe8a1e9d3e3c75
SHA18dbdc2a585e5b66015c039fa53d5e78aa851a35a
SHA2560ae806d074850790fd348433728567ca7b86429a78143fe595f64e69d718f479
SHA512bda347e5f7cd4e3c28468f86e021c2649966ff87bcd86f9c8872c61f25ea7424d0e480fc9a9604255c20d87dfd6b36dd30c809fb34606311a19aa6ce20fe6536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51768c603c78e74d58bed84e8402c07a8
SHA114391e39a66b820b88fd57e61f2984843cccb164
SHA2566c9bb154ef436bfb067e4c882d3e6df0869ab1af1bcb1b45bf893c6feb712eac
SHA512a0f7c01c2c0da440343f528e1cab195f13d22583b801d98a29060ae8b180620addcc4064548d1e7be17e208aa79e9b50a6ef2feb4085711314e00be2a9b4894d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528d3eca00a481223b449084dfcab5f6c
SHA1dec8ed9b5d1581fec4eeaa65a42560db3e0c8f6b
SHA2565fddc2a6068fc1b91e0244db755a2e715e687897ff22749855b156b89fb5a13a
SHA512b4fe071cb7932fee569bba6553274e2475fa96f0cbc92f3fd1edbaa3351bed8e269469f4a4b5a93f7066a116f5bb707731b4eac3f29b5bf5a6a93a90a7bcfe4a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SP6DRJYJ\Hot-Amateur-Milf-Facial[1].htm
Filesize5B
MD5fda44910deb1a460be4ac5d56d61d837
SHA1f6d0c643351580307b2eaa6a7560e76965496bc7
SHA256933b971c6388d594a23fa1559825db5bec8ade2db1240aa8fc9d0c684949e8c9
SHA51257dda9aa7c29f960cd7948a4e4567844d3289fa729e9e388e7f4edcbdf16bf6a94536598b4f9ff8942849f1f96bd3c00bc24a75e748a36fbf2a145f63bf904c1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06