Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 16:07
Static task
static1
Behavioral task
behavioral1
Sample
7b74099189026901a9b8daa529a6d982.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7b74099189026901a9b8daa529a6d982.html
Resource
win10v2004-20231215-en
General
-
Target
7b74099189026901a9b8daa529a6d982.html
-
Size
53KB
-
MD5
7b74099189026901a9b8daa529a6d982
-
SHA1
093c57b92a0fcf39c5c98f1893c6f86074456446
-
SHA256
dcdd802feb36253d660f0826762967b189510cf44cae9597606180dc6ef5c33b
-
SHA512
e3a9381d11f825f5531d34fd6b35f21947c64ef18a9cf11cdd943098a9225e9ed2028f5bb5f8c9d6dcff1b87d004781fd964f4da6e4deac1cb0c915d0da16c68
-
SSDEEP
1536:CkgUiIakTqGivi+PyUxrunlY+63Nj+q5VyvR0w2AzTICbbqob/t9M/dNwIUTDmD1:CkgUiIakTqGivi+PyUxrunlY+63Nj+q9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D3F79891-A539-11EE-9C0C-D6882E0F4692} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30f90bc94639da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "409899697" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000a700bd0fd04b103d2d07a0d3f9c04bbd53419dadbcb6371cdcbf6ea9c4931278000000000e800000000200002000000065853dfac31e6459018854dddf4ab47697be2bbc1b51afdc15192351b8bd1bbb20000000d5b938c34df48362754ca5cef5097fcd4b26727522f54995bb8c0a6f4134fbb3400000008c8b8dc0c141cf5648b927fe63d6264de5c5bac650edf21aa5e7229985e5aa7bbb06dbf8f900d3b236b6351d513d42cc14c39ff1befc51185febcbdeb316a350 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2496 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2496 iexplore.exe 2496 iexplore.exe 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2516 2496 iexplore.exe 15 PID 2496 wrote to memory of 2516 2496 iexplore.exe 15 PID 2496 wrote to memory of 2516 2496 iexplore.exe 15 PID 2496 wrote to memory of 2516 2496 iexplore.exe 15
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7b74099189026901a9b8daa529a6d982.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5090142aed0c6b76b988351ffcf853492
SHA1c66439f17653855c27e8f5002a51f8ed712f3abc
SHA25602f02386d637f2f3ff4beb3f2173f2d6042db9a5135d01aec13a4d65f31cf773
SHA5129399743046b52795e7a0efd01e82f0e1950bcf9b471ed26b4150820f1e31f56da02811094adf22c850c5eecd1a4d4c694d6d67a5dbdbbd2c8a4bfc063180eb16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be8b0828ffd51c7937a5e8f7a37b09ef
SHA15342f825174be07ceb5a6b40252029b923775c35
SHA256f997dbe5bbfe6bea70c548ca695783dd719f1579ebcbe41fb7bb8334cad4135b
SHA512697090bd82588040c2ff37e256d5e256f230a5739c65fe8474a738ed5df7abece65ac7735132458f62e5dc8230a1b2f03b5765673ad5ec88e2e034eb3b381e1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef31c2de214f0bc60dca5482cb590fc9
SHA1faa7125f66e084026a32eab4d4d1a3999e7b1731
SHA256fb11498507c4afa1c2eb1720f040f69b8d9eeb2c94669f8ef21dbd8519226338
SHA51299bc914a728fda4b94d51cc0c26372c99d4bc512bcd2a00e6ceb3ac86b33b3967feff74f6bf6366a6774792e3208c7be4ce3eaf6a994167f19b23be49f62f9ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fecc4778e3e9c874255c03eb36d7bb8d
SHA19ef442587cdad966587f07b2c7e3b6943a9fed00
SHA256d4de6a7cd73ef1b2d20e156108adaeec62c19ad0f03527556860fba6226f9aeb
SHA512b5ce57a052bd30eb29e6e8d75d7ddb3db4ff43b346b2b1728d4ee514224fca7869ac282f82c71f1af0ab1be2eb8c135bc9c502c7024a27dc7d8249a3558ecf9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5844f4e56a627cd5d0dc1f52c63317d6e
SHA146462865acff121dba16b32ebc8d540a34508384
SHA256dd713ac129f5fb9b03de23e3885be4a1b2c9b9a72ce3631d29fde940254be4b7
SHA51248bbdd2f9811108361717c13f7bf3190d57446c1b181ac66e35beabe4493f2973487425ebb03afec2739b4c24e05287f9f10b1c7b98b6d0bf7330058c0d973cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd4dd4b599aef9f21a9fe73975d9184e
SHA1294a848c5a3897f202f2c09de9672977d59e100b
SHA2562c2606d413622f1c82895b0ec1fb4b8dded833898ae2ea24909862deb513a0dd
SHA51248153cc9ee5d618424c989a2d91978010f537d0f4441d6f80ed6c306df6afb683d9b9bdffeeee43d3d70072a3ec56925bdc2fb50f64de2980fa20aa30a99c595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e144f0d6deaed81d2e43ece34364b08a
SHA1103e6a9ec4b1bb549d7532a5ddbcac9e74e05162
SHA256a6c35bf347963d702ed8be3deb29f543b792ac752abd15208251329bf4515db4
SHA5122eef982dd40cfe988edc95b97e2ed46c1e5ac5a2b911ad0046e352085b1b98fda040c7e33270074641bef8ef8bab3f3d536540612fdb0d235794f3805b1762c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac52af22866f8c1e7679b6f7d41eee57
SHA155a3b5dd648c1586a47235785896a360e1123d6b
SHA25698a4366ca0d06dff0c67eb07e6dd30b88d21c94905bc251f5151601bf18da807
SHA512031fb782fcd87219950ea70bbf791331b19ea66d4e1c3f2b8b29a6c2cc89fbce7c0274cbd321923fbc0c053c1a21eec521956e9a978fa83d6992707b4ced3ce5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdc4c66800e3bb497761cab1ece20d59
SHA18693ae553c587e4f25040c2d5a050d98a61e2c75
SHA2560c4c035dc01a6aa7da02bba5dd16bd22ce881c4947133755cd7b7807eebe913b
SHA512a50e2198a39fd91395c269b8df3c8b6056f535c2cb7f1e6fccf18b84685230ca04ca831f92b9a201049400f062a2dcc21bd694b712d7d9499360def0eb63cacb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa788f6cd41b14d02091cab74cd28fd3
SHA11b624c68eea39fe1c9d4704f0133123c93a4162a
SHA2563bf01c21c89ec58c04073416921fc1f78268246ad54c85b0f9dab9be60d7f8ab
SHA512d9defd43cef9284104e33be3e7c90d036c6f43c9ca9bec117ee20d48b88855427e264dcd497ce236ae95b110f7f3b21daf1606bb6163e36468d1c1f56b1759c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0fd3c42979bce3d5fb2afd9c94dedab
SHA1ba59dbc6d8d4bbb6446da50652103a4b6b41c4d7
SHA256846dd820a7d039fe891a57ef689507c18d146efd0e55e0a1f4bc1bdae176ae25
SHA51202d40341092c11ad1a3f81372dea188ad7de2b94113e7476389dc508eada3b485c864eab546d8a71ac355ad3cf6b22435c2a9740cc267f35d9437e2b2e8b70fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526646225408ae1b67796f56baadf7adb
SHA10da6aa310ad0288ed2c7f45df03b628b95827f96
SHA2566677f8085337a7a9efdcc5f35f002a12268bdacef489d256eb56dafb5c56424f
SHA512f67c6ca16711870a4668231bf998622089080aecefa0103ed6d4a55f275fb277a5930443f1a6da5af2b1bbf46c3d358828490b0ad8594e62217379295a424c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3b95734a6a7869a7a9254be811595ac
SHA15cd0b537593fab8455f11ce1835e818f8035be52
SHA25601a49b1e5f32ad8beb7db4af00b9500d9129cadf6db6d3379e37f22463b75430
SHA51203e02a297e428352c647254090c1d13412c1f96d054671c555448593640a4eb4bb6c8390a30db2f7b9f243e3fec2b4d458ae95a010447d922871fdb60fe7a4f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578d5e1687e2cf910c77a0b8a035e3df6
SHA17830792d49dd33364bdf312ce052d4122aeaaef9
SHA256e2f96210e4c13b98dfa61ebe4e1b88a450c60b182deda42dbe17187447ddd49c
SHA5121ba75f01049f059fc1f9b94642cbe481f133a61d2f717fa5375a708ed546a038d6d59aa1242b21db16246a16c05aa30469c6ff4e81e7249dc96014a23bdc11db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a75bd5550b9554e23d513f4344395ad3
SHA18686c9d739a058231bfc644da20cb00d3f50ac76
SHA25682ab3ed5598d87f273534182e8ae37da391a6972ab52561116314632b6d690b5
SHA5120d6653f5c2b569f2e6e7e07f58bbda6960c6061b83641cba60be891001ec19419b725c9baa5886cba30d843c95fa94c3c04911c94e5648571d6909cf3b335f53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3a7f578717480ae8c2a81418857dbd6
SHA1e272982caa02d9e6e7aad63b61e9894f203fcd71
SHA256dc5223d54ed5fff13bdcd4f1bb11056f4ac5e7b409e7ec01983d437113fcb39a
SHA512418da3bf75cc101dfda6cd00bbeb043bd4d0f996356aa530ba79020aabd3c4dcacf23af5027931dedf30147f63eda94ff0520d2beef92d1db767ccf735ed96bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54de0462e9e74fdea04af59f6ba252533
SHA14444de3314cc77d827e241bff1f39d1cc31fc8ad
SHA256a33b35f0166929ae1beb217655237898b51e12bdf5a13b1e22da6d71e93c5595
SHA5125899a9ca73cd8b5c86f61afaee1b1afb81783f3bec0f46f89d3b9e234f6c912e9785b46bbdab075b49d1d194106452c8b425090baffa0c8b3620bf3f04d0f767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9c74b5137d1564abc43efb4a55c9124
SHA1da21c02874abf9ce9dcf6f8a487d360232c0cf9b
SHA256f504a4450f1d29f297790d0378a6326e1b815307cfbafe5be28b2b2b7fd363f6
SHA512ba561c4d160f9ac9affa1946e3c234d466babbd0687785ce83d7402586f2c0310ec1e4f51f1f6eda366ada128c22535758a569500d1fc4bac49175b04ca9f6a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d88e372aa125ffb65e679ddb1f19028f
SHA1ff0e5423931e8b48fbd5f850f13740e2ea201702
SHA25605aadeaf62d510c92145bced875a38067aca5263d5c01db44b91340efbd8b6fd
SHA5125cde0818791c4ead366d977b17273006da1ef08f4c8254230853a04985bdb0c18a2d3e0e0b9165ffb03c9ef6f2caafe0866598d79b81459001df351e494529a0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LFTKP12M\star[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06