Analysis
-
max time kernel
138s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 20:24
Static task
static1
Behavioral task
behavioral1
Sample
03039a157016d41f15aa7ff2b5f17b2d.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
03039a157016d41f15aa7ff2b5f17b2d.html
Resource
win10v2004-20231222-en
General
-
Target
03039a157016d41f15aa7ff2b5f17b2d.html
-
Size
420B
-
MD5
03039a157016d41f15aa7ff2b5f17b2d
-
SHA1
836f328be81bd96f30ad909bfae38509d78f27d2
-
SHA256
5f666d1ed9314df74950d64c6b1a3d0e359565124464015f17a777b2c92af267
-
SHA512
cb814a5558206a2856096c0b3116017cb3fe1ac3e9041a0103f6a04f32c7c6e232bfc29052ef2313cdf56dcf740195f17c15e0e1220cb526bc01f655a474b2db
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410058081" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{966923A1-A6AA-11EE-A68A-46FC6C3D459E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e00ef16ab73ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d7800000000020000000000106600000001000020000000501fbcfee553d47199670c102f5e34f484741c5f033c04514a89cf6ddfc64592000000000e8000000002000020000000e2deb7dcf3db825b0bebd25895d11c03215309bb41b5518f56a4b611bcb1264020000000ce25b669671617978e2425cbc04aa08f0c9cad5da98a86f9903b38c070eef4a8400000003df5b68d57efc4b2b50218968583d7ecbe8a884058b18e247cde841b4373bc3d1c014df3c19d170a00392be6f341ba81b179c220e8dbf149000591281cdbf854 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2216 iexplore.exe 2216 iexplore.exe 868 IEXPLORE.EXE 868 IEXPLORE.EXE 868 IEXPLORE.EXE 868 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 868 2216 iexplore.exe 28 PID 2216 wrote to memory of 868 2216 iexplore.exe 28 PID 2216 wrote to memory of 868 2216 iexplore.exe 28 PID 2216 wrote to memory of 868 2216 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\03039a157016d41f15aa7ff2b5f17b2d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5c601d0be8ad76ebbf57f92bd2fbb80eb
SHA179b9ac077a3e8274caeb9eeca1179a47e40c3cdd
SHA2561ab1aed48d30e176b099a83a08e30113607b7b14e98b16505c9d5e851174b087
SHA512a7d71a781371d8946072ee261ec8359feb363e07a1a3f071d4ff8a597bed999a248e4be674c96b358eb6eefd38de876948babae41d91a4b265971ac764780bcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52945db8a9a803729ea64518e9682696f
SHA17c761c517862fde0109787f0c076722bf9d00a9a
SHA256b2b3c54bec07ee410d32da2b810623964d35f3aa7c7d69cb84f00b84e6c5e133
SHA512054f7f8791677089f302889d2b0ef86e6de0d044f1b53261d95a7d4859c0c0d4f2b219bf61c6ed5fe7478633b9739463a49b9bec6a2cd6b911f119897c55bb44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a481fc8b2f75b025dd7ae9b5550dabd
SHA1dc54db42b8ce4cbfb85a91d75c72f8ebe65a59d5
SHA256f1f6ae12ecd862e315efd0ca459cff35d4937c598e8295c2397f68a744175335
SHA5120b94681d7ab87646763010e4a5d3d942505ba0414e733a06a00365e2bcb31dc27935cc2564ba7f5e4a501350bf3d7cce72652b01d20371be5f0839ca17b66bd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5e0dea3dc50b04ee492af453ae42155
SHA103f77c9d2ae435b91f65dabc2ef5348a4d6e1278
SHA25667b3d2461fd0123e28b71c0c0beb4e4f99d8df0cf0c9e4b9a7ca5c48d5219c9d
SHA512b8ae4b7301a1926937c5f2e6f5b050b38d68a59d0f549c05daaf82cd122b542310695f8341ab4c383a9f917c044ba6130ff7f0e36e61e7dabd27fdb1ad23dc38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c167d1ea4150a9d595cd172a3bb74930
SHA104d1c3de0f608990d92c37a78f1214e15a97098a
SHA25602b4ce1ebe875df69271166747939ef8c7851b76e62caa636c9e72a0d7efb917
SHA51276547f8e179a260e5409f97b0413d2f347d117b0a1772276f248121817e5ef51cb44d0af22dc2ff03823f94546eff25c8364dbba771a2279fe572ad617560fb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e10514d29811b72d683e36ea5b714b9
SHA1cdae5312e5b9b3952e798a4cb76756047bb2f760
SHA256d111d2b125521d520517043c576a74a57ee7398fa564529afae39b18ff9d2c66
SHA51254dd97aac0772fea2fb8ad23e088014e117cb3ceb83a30ad7f1dc09ddbd4f33aff0de6764b87d3c7f60148204382c7bc1b2ff6067fc3fd50a8aa5261a7581a6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e5ce46d90ccfcd60c6261f9628ce2f7
SHA12462a7afac4e71462b3365df0a9f66cc4b71bf8e
SHA256e5b2731eea301c7cff92d09ac7f3f60b48b39c8df2ed4cbb4db40664b79f3a37
SHA51231186e5679b7af8b3247829fdea8b12a4d6eb349de2a290d2e308a3f78f631243184379b33599108cee9960347aab2caa2dc6f729737af1327986e3385586b39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b693a10db4f5c1a640f2fdb09ef42590
SHA1fb6a88cdc6df8987fc2d5c90820ce44633de8ad3
SHA25630c38d9a71b9419a0de04834ba4b2f253cdfd62af658ee55e5c8303f8466769a
SHA512e81e4b32f8e46fcf1f7c57cf48f18ea3f6975c79a14b27535ad4d372978ddd90ba6844216b8bc93da6e8fd4066b9dd520291614d3b650ab6d74b0174bf428ae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581e9d21370b261d8d7d405721dd54be7
SHA12e93a5217129a3fe04a6eec4a38e6e42474d5172
SHA256a1a55824241783bb75a7518fc6c0209a1b9a409e50e25ba141c7608a127c99a2
SHA512f06e02cd501547ec39da9624aaea931aa0d6cd7cd55c288627ccd30090faaa5bdf9dd130109d91bcfe59b7c1ed00f4ecfb2cd2f9c9715fbad47e0945508d25e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfe8bc6438ffe12715573f937a6d0d9e
SHA198037c8c74b5a47e832c252b663931cebd63bcae
SHA256551ae5919d487ab1749c79859819c1e48ee10f9821d4e7bfa37e02bde6387382
SHA512e6bbcab40067a61286ccd528c9048ab440d220bf9756bfeecaa939a4ec363977f23ea65422ce54ceaa05f3540171f4e3fdea4963e472cf126a0bd428064a7961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5039223cca2d6d5a44259d26ee55e514f
SHA14d86a04e83ab60771694c6a397f9020c70c23945
SHA25693c6a947bc665e031ff47162568197137e5b9bf5879603e5a4acdca0b2ba26eb
SHA512524d870ba8938729089db068ce21252699b70756ad7d4c0581440756a5ce1bcf51989d041419c72d121bf6980fb75555379f54beacd871583f3b43fc0fdd9423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fd87cc5a4e0f99ec67f8ff26cd96fec
SHA1ce5ee12075637a77b927f83ada73adf0e24d3cd8
SHA256cf5e960cc59d1f1a530bd4aeb3c5929ff3cc4c1c31955ba8b639d63bec313c04
SHA512d3217e2de4253bcefd8d76221aad0ddf92d99a85623af953bee5ceca58e7ceb64f9c5c09e02dbde675fe8197356edc52e288278a19bb0d01b96312516222fa60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5388d912a0b8aaeb481a46885c191bbfe
SHA135be12597a7502b811f2aea04d0fb91a588aef5c
SHA256e4e1a462e0520ff66b88e48af8c70418ff3b005bf9d59029ed465d6a4becc0a0
SHA512d806ad50c116f6f7d3e5894fa3fff79818ff9eb49ae10a8f93b3af8710d2b38a54e894409dce414452a32ec53cab834b144a2f13b653be86efee31cd230bb21e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5003a40c6aa7a79c0486b7018837329d4
SHA18ac4e9eaf441fee40e47585604b211ff9b68058e
SHA256d6bab78e4e9f53d14d9c1340c8952309c61d6a2eb51dcb4f6391566a82117cf8
SHA512ab150f3207b5c204d13db387b6256ff977226f50a45091defec03c8550ee8e56747ae85ecd339104c086de5d1f11829b1e62fbfa172ff6ffc102916904f390cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c6e2dcae326aab1947cf8d08a8339d22
SHA10889d311cd685be74c1458499bee0a4c637c7f75
SHA256667aac09502a35b51f184daed12950a508923ec866efbcf716a968021d542dbc
SHA512ccc1cf7b00f6660fe52a3d32964fb81045349d0ebbfcfb2061ef516eef6d8502e2f3451a227048c4800d4b71211475c04bafbcca0e1ad2f6babf3681a3f2dc3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06