Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 11:51
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20231215-en
General
-
Target
sample.html
-
Size
20KB
-
MD5
c9cd4d2e8ffb73798bf18fa6a495a64e
-
SHA1
e4ba4d5d94245e1351110a373a7f6aca8d623265
-
SHA256
b05ab6c238794b6894ecb9c5513d0cd9c54c91b39e4ccb2c6a93c47e5aab626c
-
SHA512
7f688e045960f160f391dd7cf8b5c5beab002f4576f81043e5cc2ff908d01e233d9641ed8d0c6e46d520ea12faed9e86461dacddc0732648e24b7c15c4976ef7
-
SSDEEP
384:pSFpvsIusmCVj+2Tg2aoCs4pQM7HKckF/1RFHvMotdvu3hl:po9zHVj+4gtocQM7HKckrM+dvahl
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c00000000020000000000106600000001000020000000e2b703a0ed03211637d0ec86ec5eace0cb553a626e2ae650e107336038c41638000000000e8000000002000020000000de7fb8adef8b0b0ae58c406bbcf4aaea21155eb7a7eb037708c791c6d2fd189720000000352ceb5b548bc03920b8994d867c3cc53c2d5fd19c70a01e5bbce4d9aae888e940000000b61254bf4785619430da8e4695eea645298332b7b649f90d81e17da294c1bfe7cec0340b19b92929ef2a26855e4b1fb5f27b7bf4ebd5d84e7d4b90b1356b02c7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 907384520639da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6730D6D1-A4F9-11EE-B58D-6A1079A24C90} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409872030" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2184 iexplore.exe 2184 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2148 2184 iexplore.exe 18 PID 2184 wrote to memory of 2148 2184 iexplore.exe 18 PID 2184 wrote to memory of 2148 2184 iexplore.exe 18 PID 2184 wrote to memory of 2148 2184 iexplore.exe 18
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bca60a2ef0e1d9128e46759429ee42b2
SHA1fbaf9de7d570b913146f0436df4c6182bb3a676f
SHA25681880fd1dfc9b59705f83e54dba8d36d8ac142bf6ac1568d538d0ef6237be591
SHA5122e4e368537a64e2ec26ed87bf24426c5b822eae261ec80640c960584c2916442efb36db4dcd80b7ceac50610151653b1cfcbf28ef99a4e21368f602017697f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c2bbb062ed57d614fce1b1b4efab53b
SHA1a3ed976c376f4bb3a9fdbc9dcabef2870d2dc695
SHA2563abcb3d474d3a9d5a9dccc6dbbabefe7615264c3e96a7f15492faa1883f384d8
SHA512902b2cd86eb12c890d3bb8a148a4eb719a8b0bb4fc3462d07ffbdead56c6475bc84e3aaddd5c44c0d658164bc814db81f7b0289edb435bfdc30e17fd9e3ceb30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b92cb17a112b15f129b716afc0d0c571
SHA112a59f5c9565b3c7af13cc482288339b652993fe
SHA2564393728dd0a8b4c188230a3bf706c59e370b05786e8931a5c7e1d727997688c8
SHA5123ff6d06d28d5e359bd1a159276e9f7d4138bd0a46eebf60a52b23a8257004d9f4d5772ac08e5d80b53fd63917c4926fa14451f8d04425106aeb56618d89d6533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530957dc1b08271cf5086190bf4f6e413
SHA144d3232cfc9d24a1b61a0eeb39ef76abf0d2e329
SHA256dd5e316a2206a8faf9769ab53e5f0abb0d88ec752875b7e33e395c1f80924c52
SHA512b4a569c1c5a0d6ad931cd7173cb73e79701475e17fb9c06b1485ab4b239269ec8fd555b7dcf9bdbe324be10eb8d304b4a184691724a531fd87239ee07b09ce31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0107fbacaee97759b2e5affd640ae5e
SHA1b07ba192ad42583870cee70bb7fe86f41e682a2d
SHA2562207a52ee20e438a303381a8019e0ee5d61dfdf7a327b5c429daaf03f10dd827
SHA512c8a25cb20144414d81bce597a4dc201cec3159bd5d0f56e8c8ceafa9e9478e9d91648594690ad158aed17a8b0fe43ab73b1aeccb2db384603b033c29508593c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1029b688d81528924df8e6d930983df
SHA1bb1949ed3575874821c21fa7d9b6e2c5e67e0b69
SHA256aaa64ad5ddae00d740b07305bc8cf82cd7fa357dadb6f1da97085ddc1fcdb025
SHA512bd557d5c32a736976b60e8316f75d841fa3ecda48c217b8b7cd605b9fb220bca684cd6a623de26181882206339a98999295272c8c3253a98aeb85edf207d304e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5259181f2bba78a4ec17e2f41cff3d8ba
SHA1ed265a4f107e4538c45ca08f3d3e573ae280682f
SHA256280c6b14b57ee608d3594cff5a7b5b2dec62178b3481492ee1846d023b4c7229
SHA5129a2ec74afe55f97c1d5826d2dee038059b887f1d541413b0ffce933086d31b7266afd4b6222d7719cd102f5b839069c3adb1d881b2c8512bb93804d17f5d4372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a826b65b24cc8036d8a83b1cce82c80
SHA18d0221dee48df09e27c4e15cf6d3ee38c9ce7cd8
SHA2567d1981b9b58e7c189ae0fa3a079544f51127d2c08e655548adf4f15f22c39d90
SHA5122290d097ebfdef4968924ff1981e425a8dcabce5e50e2c3d01c8a9fa172ff4d58c0033ce9eda2902273ddf7b1df8ec5dba701d142f9be3534cdba79c6b71f583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52404f48429dd7b430e4c84f1e68c7ac2
SHA15fab592d608be89f535c02d1977080b11fbb3231
SHA2562964d7a20bf9298909ee80bf20b6cfe75c9705cd4d631ee1259a7f9460ba373d
SHA5123b45d6aee31c4499cca24666dc48c8d205d6ea42ef9e3a9d77ecc39dcaf39c8455ba88c51f8a275868c64c19b94957f561f1f8f281bd5515116734a51eb6ef8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c585f7128698a5f05cd1e92f7a9932f5
SHA19c377942f719a2c9952f81c9f4fe963bd7d10812
SHA2561f61e595290e06b5a986c47b23a5061fc9019fc59891da0e280d073c988bd3b3
SHA5127209a7c8a88d9785478688de3de1178090a977c4d95db8819fbe0af003ad4d43b01baa8b97358ddbdfb1a2cb4295936388a9597b6755a63aef3c9dd384018ce5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3561bc13cd3f65993f2fdabde888b66
SHA18fb13c2ee60d91aa81de48b40d8215d65a2085e9
SHA2561b68e6fdcaab3ec21b1f6a00c9866eccc1432ca1ae62f3b4d939e8fcab2e0e24
SHA512b8d79f28916d9c8642648b1ddfb1e2afd9689f283c1455fad84c546739b905cefa7847c70aa007e49e5b9715d023f91dcf7fb823c73cd4506876c39eb7cd4af1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ff4b76a94fceb3b7fde461193782b43
SHA169898aea15768430e63fae84b3ad0846f5774a2b
SHA2561089825cc6e26bbedd7ef90e44a5c314acee2bc1251f211a83f1cbba75b6ad30
SHA5124c279ba3a6230613777c03f50cf8575f11d0bd8e19acb382425dbb48f64182fc7481a1d47b32528080be693f9941481b3d11d989c2b0f8e7cd2a5c2ad2bea7e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d54750cbda765e7fd2ae0c9a999f4bf
SHA1cdeef57361ffea99cab54d66545fa06aa472618e
SHA25616a13853274b4622a5e23053eba4e2fdda6444422758ea53458b755444101dd0
SHA512d11dc55e783d1eff8b95d4e6357b01dc5978f6d39eefaadd2209743c7db2023dfb8bb371e0646d3544d530e961093f112000a76de7568f307133e2a9bcc7da93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e4c836e29844780db59eb2efe3863c2
SHA1d5e313a60bce4c01226f4f93875e5bd342befe97
SHA25641b2610635850224119cba67ee443bc876f9c34f5e75a6d8030d26f35d67fd1f
SHA5122fe1ea74444fab844bd564ef7e4da12329b7e12cc8568acb8d4cb0d0304a4f713f9ecb89e7a2b181f71ae3f07f65584d3a2b710806dd8e48e26e0ed0bd275478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3ee9949774af8014ee663cfdd87b2fa
SHA1ff99b55dee9874c25a9c1a56e40f9005304036b9
SHA25651249672913f1b0cc2b177f2af57cc8ea63b00d1e68f4ca653eecb653c083c0e
SHA5124ad94b3bc0bdd02df36fa1a1382d175a20d0ef0ab66620a776ff2f9f9a386d8b5fafaf7002b937147a7d0196946e0334f25f1d906b71c1fc129ee3a1f181515e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514e2ffdc353cd17f8388b3d1ded25669
SHA170d78fc3ee93e6992078f13657304ce259151cc9
SHA256dda7c5debf8dcda5118c0f9d766819926c289364d95ac4f91e18031b423b7777
SHA512cc74b3388f2db0c20aed54a5924e3c5d835084a416f84ea22ee61388f15538dcdf18866757f500ec19f9fb871d590006f676a4c3aeb8a4a380565b62bb219e84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e341797c8b7c2c0552e23b864ffaa8b4
SHA1f5c6eb628634d75ee3e10447b7b77e4df9396d60
SHA256369d954820d5f48eba984ba6bf3117f34321da178a723819531cd2db97704d58
SHA512736323bbb464ee16fc05a1a74a4e1332bb207125e8d2cfc9e2c15704e6c570bc2e29ea2a62695905bd7f8ffe6f91c9dbf651faa804965ed31c23f56e598c27c7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LSNXCBKV\Freak-family-step-mom-and-daughter[1].htm
Filesize5B
MD5fda44910deb1a460be4ac5d56d61d837
SHA1f6d0c643351580307b2eaa6a7560e76965496bc7
SHA256933b971c6388d594a23fa1559825db5bec8ade2db1240aa8fc9d0c684949e8c9
SHA51257dda9aa7c29f960cd7948a4e4567844d3289fa729e9e388e7f4edcbdf16bf6a94536598b4f9ff8942849f1f96bd3c00bc24a75e748a36fbf2a145f63bf904c1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UOO61SKS\FILTIE12.htm
Filesize114KB
MD51fc33214a308d78bace104d3bb3873d0
SHA1e458a02f7746553c4fb51ecf077bdfa5052221e3
SHA2568313f95fae1ab43cdf5dd271f400f632692c1159c07feba5a7cd9e48acfb758d
SHA512c55719857433fdb2a75a535b04f11647c6ee5a8b2cf451858e01f7e321b4c8944b6f28e27506432ea2ce74cc2696fc19c53aa442db59d99af2774e0a272b812e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06