Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 23:12
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20231222-en
General
-
Target
sample.html
-
Size
21KB
-
MD5
4b3f024561906993092de11b47e62f46
-
SHA1
cab72c1045388be8a430d7d87df6ee3bc2c52343
-
SHA256
33925c6c8377714b06fe2e6904acae2a61f338249535d874a6b5ab354af22edb
-
SHA512
8424edf835f07442138f881ad50aded7c874d1e205ae3603f2adffb55e5b02744b1312bac4338f19d4f93e644874eae413f816179e3c709d4655e16d4feba5b5
-
SSDEEP
384:6SFpvsluKiCcbnfHM2ASNmgUywsFRi/1RFUvMotdvu3hl:6o9IJcbnfHdASNmgUywMM+dvahl
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{96CE4561-A898-11EE-AC0C-EAAD54D9E991} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000006df550b1a1e7381f680a30d9be8bbe438b62be7d0d703996eb048a7ad0e75c7a000000000e8000000002000020000000d9c3373b06c6653881dd0565f063f1093ea86b5126dc662dc42e8e5406f4333620000000e7ae82957e462ad3b99565747c70e94b35f5df1a293a49e343e1822331f3104940000000e1d2c6a5ed08325f76c66254cb5e63dba218963b0c8f20e8d3060f6eee3b80c4d2df850da019bbf87cd232f17592e16e79d3209b97a36992edd42d9668260ccb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410270249" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20649672a53cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2976 iexplore.exe 2976 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2712 2976 iexplore.exe 28 PID 2976 wrote to memory of 2712 2976 iexplore.exe 28 PID 2976 wrote to memory of 2712 2976 iexplore.exe 28 PID 2976 wrote to memory of 2712 2976 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575e901ad5824e1e7be38f6b8a3ec8f33
SHA1dfee16d50a7954af07164f069560ff95eadc9d88
SHA25648a75eda42dc9a9d018775644e0212a877ad35fa99b806845ec322ea1c3adf87
SHA5122956df556120a0a13f640ca0cc68518cdec374765b54e10da0416213d7d8cef1309d0ad59a5b630c67f735a6b7b8229338bfd3037cefee7926e06414e224e0bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d29c27b8f72102a65b8d0abd7b805c64
SHA13c88dd3a4cae32adc444d0e464a152f8b9aa82ff
SHA2565119d47be6f754d4a615b3b491a44e4f7514163740a8bee92e71d67e087c002c
SHA512af9952575fee8bc880a23872d1d4ddc088011ac66e6ee8b09b8ceed49563f7d751e9cfc1ac545da939201cf1d094f578e99a6d79cfdc027586c8249fdcdffba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d91c6389439427e9684857a20d2cbd0
SHA198ba5ef0887829cfeaab5cf965ac3be942c7a658
SHA2569e525581d7b5f974a3df84003e3d05e0a22626ac697eb9ef8af318c7e101e561
SHA51231743df43e35386d61e3338adb6d02eb580c49fa69baa0676e67ab1d50405a4fd0f350c12be9ac29e5b8dba335ee17b36e5c64523b7240c2c0ed5d38bb69c304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599d5a5027b3bcf5de062988fc183a399
SHA122c85e089d944bc31585966a4f23580d26b3599f
SHA2561678c946af9a526a8e1379f452a4696b85169e9012a1af54d5a51552198e6270
SHA5125801f2452f456b3b250cdcfe65aace06ad8f7e52804bd4e4c67ac7cfaa3f221a0dcdd043fba813d9ba9424c1ab0ca96bc121f9e4e7f8240b7ae40271b6756de1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f9eda2f9024e4db9a8a9fc021c310d1
SHA16577d6c2219bd6c8c7d1524d7c5c43f8c4c94447
SHA256606d1ae178292acaafe26a54d812786da7d051cabcebe211eccca691debee2e3
SHA5128b8eede5631e0151d5ec214044e364aa505bc1cae5ff7d154cb06df7eb5aca35cb053358864fa099f8ba78f9b25da48f906ec6c109a8a3ee126f650a7e5b0327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae0f05f569ab5958dbb46cf1769456cb
SHA1d633e4dad89b914fa86cd96b9d9aeb39a89dbf61
SHA256db6bd00a4e2e0f2b7f8af2c209b6f58cdf7cc48c81e58132ebc6072794586912
SHA5123171955470a88e3444ed7d0f82605a2aed091598df6a293bb9a66f832a193670d4f60c6ddb60d04136572c5abe3b5d53d00e091178380602cfc713d0510c5018
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a9303405407ef813b1df7c9c68ab71f
SHA183b1081cc0beec76862145017054f0968e433ee2
SHA2566e2d3f4a80cd5728a4121b5c585c2110d36b747b9d1e89baecae963bd9a3d950
SHA512212a193c3cfcbe316abc93260b36657deaf9f0028957893bf727861334e00a697519828db81b3a4a272d8ff855443fba2294c83599fd77ec3369c23294615ceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a94cd653cc648076093eaa0e1db3e62
SHA14756ca2d2c039c737a55f9f94e57aea03b4e408d
SHA256d84ab66e20ccceee12ce43cbe360e957afc2dee8b7613855ae837e58a55e8fc0
SHA512bf634e2628ab4b1f11ec4947bcf7810821ae5b69c19f730aad0f2186a9ed3b378c1657d7b4c09295a21ebd09ae511bb0ba5fa43bc7dc9ddae87c65f3fc252b8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f39ef66d243c949f2fde33df3389957d
SHA13e418a665afa111a0c4e5f3c3012af9785c73a20
SHA2566d7e6c9b30fe756aee6b508e1c67ce23401a494b4c6adb3ac3fe2b9c0c6bb8e3
SHA5120d7360dd180307ed95cbca33a7fdb9dfc6e35fe150e8b4483c4e6b4f07ffc040e73b944819035d1ff794ba11448e693fb07046b6b092d7cd454b52a894c8e468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c487492094dff7565ea9dde09e74d43
SHA17cc9834d4d0a0a7d2ab09d27c453fba4a7b853d8
SHA256331b4beaacc9461c80eb4b765f2d01f3fa60c1c9c1f12086ca8570d52bcfc75b
SHA512b98301518c88041b196d51e8cdc91d068459f2c40756739056a05514e983c4c8fa4df490ed1823f86ba286d95a24e1390659190c4ced9acd4f71ec638f4a3dca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519bfb3f67b8dca300fc706fc83ddc041
SHA181159084445bd4eba12910840265f85ae039b8db
SHA2564e934652cc3be358478fd8c31a703cd965e629312af2247807bd3487b2a8c4c4
SHA5129a907b790e72e5d3dc9b889320eec88eb1722322fcc90735c8c8a2422a287c6faea6472eb56754f0f51eb7d533bb8959cc41301c51080786bd3024ec69fa144e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598d5512d1742435fa7ddf481db74c85b
SHA1ac45f85539c20387e2f374f32c049600cc463587
SHA2563465cb3e0a100413f24b72116dcca26010587b4c75e31cfca911628a6963ab72
SHA51224dc27bdb534351db7484bcbc12bccf4c53064ac5a9c1463d110c380b504aab72f8df707303a2d27a9f98c015d5bc50c44497f7770ea2cd81380a654385b9e24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5c69e22cc35125efe4827245cd01910
SHA107e7b6fe8964defbbbdafa6f5000c5cff9588470
SHA25641e36a5808172df81fcd914697c60157b56625fab38e40efa168a1c54b89290a
SHA5121643806baf8a46ba952364c4855ab0aa78cc9cb97c7fc9c3132ecaf752cc624840e76da2d32aa8ba3d15af636377acd715b2ff67746d81ef1e2e42f2c44e03b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5293f012a0bfe81720f87a1be3b2efb94
SHA1f1d10c1a1731230b6ca3bf7140c33acaca9230e2
SHA256fae213f9d068654f7773983189f3b89b75fb10c153fe10ca38ae427f6b22d14f
SHA51249676181fa631171efc5582529faac1c08b0144b9c2daff52742eef3fd2d5e2aa6a81b96e4d5f10048bddffdcb1f3cb5cc5fd60c0e97d14209195cc66bd74ef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a71f05521fe2a17a1256541dd3d7beeb
SHA151124bcb644e619174f6760f806ef03cc7f07126
SHA25690d99f065d5eb9902cfcc37e5621948068bb625d6c8e516f2e34a82553f70902
SHA51268a3f414445088f656684a2bf239c87de40eb8ab99c104ebf85e637edcbb3d9c16dfcdbcfb970660183614e8e8e4d407c0c6291242f79b49d31caa422a541a9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5745bf5292c71979a7e58dbc8ff64b26c
SHA1037aec9e04814f9b478be1848effbd82d2fa3f33
SHA256f23ee2314f73a54c29f6f64d39399e04d86a220a087c311d1f0b03d3a156df69
SHA5123b9931e21c3b47ef8949607802a3d652b1fb4167bf19ccea2293b8ad1cda1d2c03d05f2f4902765480ddf506d0c9f7b01d957e10dfff973336e754ad7d6e58cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d394fb33da00879755cc1e1b3f0dc96
SHA1a6e40e39b7f9fecbd7c603eb7130d1c1d7f785a1
SHA2561356b027d1cdf70ce306bdb9733711c2d2a8e53d1c7dbc55eb0ab46d40ee3381
SHA5129c8bb1af7d9ef7377a4675e04460c3b9148032c973e43a78586f1f7eb7bbf39a4c157cba8024a9e709946c0528c5e2c8e3f16529685796fcd3f8ed35ee923f49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549d159fc663246e54a315e3f021e4b3b
SHA18d72c424b2378838fc00529ab5d466a37a0c17b7
SHA256b9c1dcd9e2f36b849833c322551529c50b2d476f09805ae8a37e13ec1434b3bb
SHA512835f39997cd97302317b6250769008fa8e62a651d5dde04acca4d6650a2d1832130adf910d98719dfd8088db0fea33c8b30a6953a406c871e309297d173ebedf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06