Analysis
-
max time kernel
135s -
max time network
226s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
0af644814cbd6f70b9d0474cb59df595.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0af644814cbd6f70b9d0474cb59df595.html
Resource
win10v2004-20231215-en
General
-
Target
0af644814cbd6f70b9d0474cb59df595.html
-
Size
9KB
-
MD5
0af644814cbd6f70b9d0474cb59df595
-
SHA1
15f3f0c13bec7f4c3cb2b30b39db1a16858390ca
-
SHA256
e2308ed02fa8f3944a5d8160c55464f460257450e573d4b8436ddf193e0f517e
-
SHA512
56e81e82af9b7fe5cb61544136bdbc67e62c5a8eb3b4ad978d6568df8ffc865556c75bec27d569738d50a2a3ff66303609e80ee9dd3205f11beca31f9acaf812
-
SSDEEP
192:79rmu2XAbUKc7FgkuZX2T7ZkT1Hso7ALvp6pzpgOp2SpNxpzp+apTpzpTprpjpjO:YXKc7OkutijN7gBxxpRhxphxR5xhR5hc
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c19300000000002000000000010660000000100002000000000e3f597e83d33899f9699e3f1fb8ca5925c884acb0d2642bfca2df5f1314fcd000000000e8000000002000020000000921e3edb87f3cb184bf76a19d6927225a9a618e1ee6cc9fd655d3f46ecda632620000000ea39340a3a7e28ce031f0daa490b4e4a348c7b1dbcbed59d0cd5fdc01628f0e6400000000be1c1f6c76d11cd7313aa8323643456bf669ec52624c7b513cba65c6da806e5a7036e12aea83eb744a9dc317d64a178b00c49d8bca403efc0eff106184efab4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8029654c333bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410111281" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{75C05980-A726-11EE-80FA-EAAD54D9E991} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2716 iexplore.exe 2716 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2716 wrote to memory of 3064 2716 iexplore.exe 30 PID 2716 wrote to memory of 3064 2716 iexplore.exe 30 PID 2716 wrote to memory of 3064 2716 iexplore.exe 30 PID 2716 wrote to memory of 3064 2716 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0af644814cbd6f70b9d0474cb59df595.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba125938331613c79d2b77ac0fb8f572
SHA1d7be2dba23d345f00eb66ffa50fc7625eb83db3a
SHA256f609393077c657a6fed5e30e75cc7256778e7e8fab620edfed73b55926adb9c7
SHA51216f9757c14b2db6f33dbf175ef4072fa6da7c9e11e2badb586da1617e829822c3a323bfa8647e2d73fb1d135168c4fc5e84674908c90370632d66324d76374ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583f01e050d40032bed0b772d5d8db1e2
SHA1c016e215f19521b6dab587e6b8fda2ba8ca62f04
SHA2561a41c1ad0e1aad18663a8b8b514102b666bf32121eccaea7a99222aa5ae6888b
SHA512bfc3ba8c85494ff8eb66962634d0a33480593b221b2e2903f5a73557bbcfbfbc0fc3356ecc0662be7e87d3fa618107c2de6f8a7c23ecc7872ee57e753f846841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5265d8ae986cddb68bfc81e39659cdcda
SHA1a737b87b1124f02613486a974d1a298fc95100c6
SHA256769c29f08c2deafd12135a06796a01ee46091dda0b93a4a1f8478d3fd7dcb997
SHA5123039be31f0d820dbe6043dab6e4f64af621b9616ac1ecec8c65f9ab3e83d8c73e9efcfbf4487b49728f26a3514aa4ab52338c5e3641e442a2466afc117a586bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e16ef518fc461c98066d937fe9ff0432
SHA13fca11f58fe6859d51bd608891a435e10b844000
SHA25644d55b0d81966ef9fd75378b1aa8611798e2a76453e882907114726130136a24
SHA512fc5c6ac2594050ae765b1f06caf3738d86d1aabc96b398fb542f901252b77b910cec63077ba6e8bd8114ecbb88fdcadb2504293071e9cfd5e50e7a8167465309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55145c86efb9367a293db266e42ac6cb2
SHA1e5f5f4ebd270a5dd3a9f8c941aa936708b9d6877
SHA25606cf273738146d01ffbba266060f12b7502d43d3c8f849d78f3b94f82371d9ad
SHA512575d935d7831a4cd0607c26f55686a41c41fa6406ccb39189bbd5b13cb202f8ad3e08b2b29159786f5d26fcd16c4de5f519299338e6fcb37f8a9bc03d23ab17d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc78b60a14b4cdd6965aef05487a2a9b
SHA16463bed5a5d5056309f9041a0849e9eb19fc3310
SHA256dcb94756e3ccf158f91df0a332b8bfcc795d5d5db625d0e1e2550475527d9870
SHA512deeca0f9d48f7e24c19ae7bf663c58d5da23f3af05d40c0cba815aa82547318e29be91fdf5781b75f3bd757fa4bb19bddcd03c3f8a11bb61a836035f880f945f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ad6545f5694231175f8533455fd73d1
SHA19e1a2399a02c20642b3e019d091776e3ad05dfbf
SHA256f576c937e19184fe453a237383e0f91ca644a671e39a3ca3c2095b607c54f489
SHA5125570a57d749948ae7740c4abb326e9a1b67f31c7fb1b6f7fa213cc7d3fd4eaf16b2634fa473edf200661085168d4c1ed14fb1d6544f73f39d57c75ecbf31323e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559a2e10da7a90b70dc6dc80093b11ba4
SHA1ca8e4bee0c8cdc4ae5c37164130f5f99b91bf8c4
SHA25607854546e43aa10b3277bb4f1acd303d0ad64deacbfb9ddff13740b020dd091d
SHA5122f4c9daa95a2cf8a3efd5d4ff3dab1cc09a2be6cad92465bb06fa931ec7bb2995ed8875a7b10754fae53cc413d41e87cfdd7418383af462269b7eb6757016735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51509cb52e73653beebd792fc68b9ee3e
SHA13d522f43536d823a86bb4387376e611c547628f0
SHA25688342639ea70605b5a408bcfb11246b60b17622b9dc3c1855196111abd02c8cd
SHA512011b00ac2055e75c7fd255ce20c23d9af60941e90e0cbbc9f20b6fe9a2fe3d4a4c78b8cba4fb5bbd00bba235ec942dd643e376fc5e1c011d76743c16514297de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e843245999633cbcb78c24ae5d1ef13e
SHA1f831a581571211690131eb5d7169dc0dcef9fb99
SHA25607fc11860efadbeb29f0423cb0265e57f74b34f4f7359f39c1a869d4f0862808
SHA5123a25aecaeb55961aff47a2d9059650745ea43cd9ac48c44a050e17bb9ea2120c463e2a2b171aace9944d1c105398692fc0ec5f886515082cac0a8f1918f82e8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b1d4d5c5007ab983866b30b9e45d14f
SHA19837f6e195b18ce6f33d1b97e6c0ee17fd0c2b0a
SHA256e731770ebe59d26197f3f6d66c2a5bfd48787ecfc9a430dce62b696edceabc40
SHA5124151b64ac2cf72738992041e3602473007648c81c63b03722f7cb2bea494b6519277ab6d5a2c4ff810716576ad0a41d28f85a2602b3ecc362ede9ee89d38de1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5416726b86b7c51e83aa397e690b9437c
SHA1a53ebf30d3e08112f5b87b9aa64c644aeb719ad7
SHA256ced062f5c0c2d73a8341293703aa9861968ac5a8095fbb60fe193187983d0664
SHA51272c28f91d9403cb8622d7c1e61ec5f3710acc21a577e1c76386277c0f074cfd5b5047ac6b8cf3f20fc431abb79566c9162d0c52faf421d63d0ddd668432eb0ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5298b23827c12d7290f2b4cb4a8462841
SHA13bd2de41a475176517ca64d963a3dd90040c89e6
SHA256fcc87f0dba4befffda9d4b86e639f9201b20cbe11b9bbc57512c3c6d620fa697
SHA51278cef61c45d706fd552606340fb2ee77fa20bff27e7c908c611413a3c81ed3f5fb9f7821868ef874fa95f0092db8b329dde15854abc9eb95da5e417ba170b35f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea46f7146a51d26d10e6516a43a2ba7a
SHA1e6dc6c46b6f28f9ede4d3f100a24dd1ec1eb872d
SHA2562bfaf62a499df358b2c93d9c2285d2d0f0d3db8d3257b806b09dd9376e5c5993
SHA5124159aae7d0a3e64369d155fdea3be498c3fea70e15b03245366159f8b1471d29646be7febbbe685c146a6d3ef0561532f2c581049f6371f5f4150aad6f960d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556e9e32a03d2037d2068c127ff58e558
SHA1c4ff2a2b236f2eb1f4b4212a11bf2e8c3e61159f
SHA256d22ec9d8e1bedf870ad3c28c1df0b0b921ba6a8447ee3d8d048176822073fd79
SHA512131ca1af5e1d9fd02f6bb788eff11bb946ab5d236d6ca4753400bf2d932c56c01a75389c40ccaabab0a3dced238f712d12a73dddff71b1b31b50250de0ee4fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5793f45ca91dab0858ebd568a426c9bed
SHA1f62782ad5935b02d9a2e762cad3818817a186282
SHA256baa96f9f3e155fbeae8d6c6f951319816470342ca1637f8bc56ddc38ac3aad7b
SHA512ddd6a5773bc7810be0a32d3e32094a62f8a66b07f78f8839bd6fae05a5db5255bed5a02863a20a084fed6dd394e24e7a3fb57b2169af7e8f4037c6638c6ccba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a28c7c245b88543e6dde763fc45351b9
SHA1305a8d06e465ad509759df08b56b224aa2fcebc5
SHA25662d7c53c54ce604ce7fa7009fab89db96805602ed44d5b8ebbea3c3a122e5abe
SHA512a7035dca178f6476cca44934a964acf8664e514d2006190dc1614e7b856071d014b8a743bdb315fcb9566e05d2fc938b4c2569accc8d42cfbb353c548b4f3855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58986a6e407e045f1402d608baaa184cb
SHA1413c9aeb421cba82461161ff9da6bc2bb6e046b3
SHA25643e50bc863b9a6c6c424acaec1f7f1bcf42566214c48358b31b5b4e073c19f82
SHA51270f17e7d8069d5b3c704beba5d7774a2f366bb8bcb6b606f366b652f77ca6afda82d4cfc1ea3d497d24c68df9e535ba609e4c6927a4e766c1a17bd4f970856c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c82ec7e7532a3b57a717726530d8a940
SHA174479289442b85323ae5c2709e3fa6738361f868
SHA2560e1b89a0d7cdce7e8bbe7b1d1bd721e163e98895d59915f35ac88d0d45af2034
SHA51294cd13fcfdc8d0c0c767feea7be0df51982d7fee943c2a96ff17b7c9180d124a884c2b3facc2e60665f8d90a6e28d373805d520d1ad434dc4c68fabbc93ecd2b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06