Analysis
-
max time kernel
139s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 05:22
Static task
static1
Behavioral task
behavioral1
Sample
0fe2d6116996e86dee2e2122716509a0.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0fe2d6116996e86dee2e2122716509a0.html
Resource
win10v2004-20231215-en
General
-
Target
0fe2d6116996e86dee2e2122716509a0.html
-
Size
3KB
-
MD5
0fe2d6116996e86dee2e2122716509a0
-
SHA1
081f2c35b5e588766a0451b5aae055a6c6df87a2
-
SHA256
0c232e3a7df666cd50909a8be692d2a692c3abbfaf4dd35ea8fee2d4362493e5
-
SHA512
dd6489e98ea1051c42376459025754368dc62efcf9edc8d6a060f980d255d9218dc3e1ed7f82320a56ea7ebf6a426fc491388cfc783a0855a8504e780eee408c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 505a64a7823bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000066298265f8d09b34c4bfdae0afff09f178bf3664dfcdaadc3762f7115f82bfe000000000e8000000002000020000000262fd3197d8a0ad145f2b98eda8e41f8aa7fa767270efdd915ae332354393d2e20000000a5bdbd1e20a5860cb4b48413bc68b82a1724821be935b22b08ac3bebe98acd8b4000000035043c365ea61691b337829ba0c42d0507efbe37bb8cef2ac080c154cbf946580f92d0fc917d127fdce266107a674310f7ba4dc3bee747e44ef2add47946aced iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410145363" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CAF8D771-A775-11EE-BF8F-CE253106968E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 3020 2176 iexplore.exe 28 PID 2176 wrote to memory of 3020 2176 iexplore.exe 28 PID 2176 wrote to memory of 3020 2176 iexplore.exe 28 PID 2176 wrote to memory of 3020 2176 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0fe2d6116996e86dee2e2122716509a0.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d424f6cc9629f0d14a45c24248676b10
SHA1324d6d78d2a7f69e13d3173dba76acdd5fd25567
SHA256ea4a334a0109a527084b9f18dcfcce4669ac12505e095dc39f8ff28f5daaac88
SHA5120569feed92aded8266f36693ada182455e224e2c615873800891de38933aa138944d4f4fdffc7dcfcdfa0996896c8f9019dc0f6d647c8eeb656b2e4e32602256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a28007724f1920ff98732f5003a44d7
SHA1327bc3bff8197d387a7318e3654a5a7f4dce92df
SHA256c425bb51160fd6c218dfbd511e1c9683edda1eb21f05386a54aeccdc7d0bbe52
SHA5125d2d3f24ffff2503b69882e3bd88a46fc170bebbd09d5e3eb89ce922ce7875f52ca9a65cb357b4352bf221b1c29a95f9ef308cdfd033eaa5c3ea5f99e49391a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9e266ec3d3bb1e1855f45fe9e385e83
SHA1cab6b23d8720dca22a4e829f472252615d028822
SHA25631a58ef96d4eb33250669abf34c739fa8d8797ecbb6fbf670e004419c4acd20d
SHA512cf85a82da01547188d9bb4647095b87a536b3d2b2c3d8cd2a6b668fdfc011767551b36288407002137bf6a7b72f425c9fbcc6f6c996ecbb9bc3ac4e6d4de53c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585dd866121ce09c41af4915118ec8ef9
SHA1d315f3861dbca095bc71b9c2dcd49f8c283034da
SHA2564f22d2f653a81abc95d5e8a6ecd2ff6e28a03e3657fa709bb827f1f7a094f361
SHA51269060f628f1879a4183a75ec51f083dceae98a2b533e1bc2a1fd7a06f120b3b6dfa3a13d502d99f131bdd321694165d85999f6f9f6ce2ffd1843f2feb5e84bd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bba8eb471483317216453db35ff3b33d
SHA185c4dbd3c90d1466e8ab7f641543de3b1002bbbd
SHA256985b5062684e2bbaf81ed933ddee8c0450a5841ca63e0eb6da2f3848893f58a7
SHA5124c190f445eee330ab9643eca0f441eab77bd777a28cfe953dc4baa12af44846e0e37fdb39d09d1a7d2bedbcfa3cf25ddf1c5825fd6d3711821d40905db4059c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd371f080271e92573ab9ce07b16285a
SHA123025238c747cee2dad305e3a83f40ae29264885
SHA256c7af68ee978bbe55faa34baa179f76523dbd4240520d74930d29d0d236651010
SHA5127a074d137d40901a25fd5f44e83887e920217de31e444c9f56c5d9cd4229246b82bb044cc9fa88933e25b3d0c911ea5261f7726d8475d4ed9c6767f2b20dc8cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df19dc4d0967d3b28b75be9b0c6d834c
SHA114d73757d6285ea69ccdc265cd0c152660558003
SHA2561cbb4014800b7ba6a22429fc14f24b886916a7a8d3073fe192ad79485b5b6117
SHA512cbae48b71c1799200bcc935a78d36fffa428c6367eecac1b0b980a1db4faece19e1b91e6d1b24239e7830b6ee14a37107da07de0f43c112288d7ba4c504209ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52134b9dc47a87e212c6cfab9b64fa1c0
SHA12541d5ef26853c834d4403dbaad8217af3d90cd5
SHA256dada607c46478934f9d856c4f7ab25d84acd9e7ca43438bb62d4f80bdd888b5a
SHA51298bf65f58a4b43d6876ca52d663b391bbe5346bcbaba2d3cfe8d2e8f1b9fc25fc964e8042ec053376f6dfe28531c3c2f1eb50331b7d7ddd6de6f32c345c7563a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecf476692b355183f3b7440caaf7bdd6
SHA1ee86ec1aa5a36836ffdfe2af32cd13ff4a1d1aae
SHA25601c1a3f37448f56ad6c3b111a0d6da2592c8500b18c1546b485cc7e4109820f3
SHA512821ddbd6df6f4ae132bda70ccaf9cff290dee810b9e2d53c214d01d4b1958bfc05ce3c7e044aadfb638602b15ac3c66bd1f6a6b8867e24253f5b095a6c9e49be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524bab2ac8bf0719536a0efbe7ce0d8a2
SHA172e61f4b3f479153474bdca92d9222422908e272
SHA2560ebc5ee45f86582ef44d616dcfabb89f4f4d9a9d265e7861ee4a835af5258530
SHA51272617e766d5230689d1245e2ad5fe39392c2b3418a861ea06d9e824a89ff579f5640820fe4b12ed316cc700f9fec91a861852cb95b304f02a8ed645ab83226be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502d16808ef141c1bfc62b6eb4c3ac90a
SHA1704a2452145ea9fd85de987eb68538dc503c566d
SHA2562b1a48a97252fe75aa251ae39b73f744abf7bbff62c3c218465924726794ad71
SHA512b75f0b3b1f1e33b2ff4a46a7e584324cb5eeddeb9d09fee3fde3627193b0d2f2a267fbaf7c08ee120d2e199c25fd0077652ae3e062539492f1f487fd9cb41870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585fb2bb454f9f2d592f211492269788c
SHA18fe36b139f71ac08d8d93dafdf1aca6e70bf1b7a
SHA2566f1fbfa8392f9470202dbf74989d44192384f9a7a502e5054a9a318d125b29df
SHA5121a1043284d1dee06a834cdfb7a91040d32406ebb8fb95cf06c84368745cd1fdbce4e3837d6485aeffd9e3e9d4e8acba4daa0e62ddd01dbf7e1ea457248f62e5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504d943945d81cb6f82ea81c9ad882170
SHA1354ea13faf6400925432c4d71f8fc27639795e84
SHA25650b07955581238f78db7f10b10e57e9ee594adbfc2cff5b705007d76a3302f92
SHA51274b7594ca05fa468fe8390802c18c9c8e094238074a63450d35c1f1f6674c7810ec95f54b6cffdc7781bf427ef858b6334613c0db4d7333329c6832740eb7f64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5507bc48d704b2a3c5cedd9b54724a03b
SHA1814d8b62b290167544a0244c338746a9849a90c3
SHA256c2e48574a8c02d238311532295a0a90ace9641b4db8c7ca0e6df319d6e981dc1
SHA51211cd8599cb71d08d667443f9b0f03a4ae1090fec688bd5b2dc4e53d60554c6019118bd55022a899a450f69350ca84aba7536a30b460c3609001e6fb2c422463b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f581255679ef6e2f14a5c6c861774ae
SHA1f38357f64e22e70bc41758ebc7d02dde10b3a3c8
SHA256a95465f85173ee6535127c7e31db682a8aa4e7c8bfa74790a356ac5cb967cd3b
SHA512871dde45ffc75a2488593a783711c5a174b7843c1ad4ceee73d6f68575f3ea737a816a9f52b4b9f4c4109e6c8c7aa509610373a0e110577b3ad317e0de8b0b8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508a3ad34d3994517d2d1a56e3ce4fd3b
SHA12087c25881630103d54db908742487b7cc9b0a58
SHA256cffdaaa4fe121628f40fae8afb3374f66100410476228f132eb9dc1995f33794
SHA5124eb77a75e5288d53b93789b9cbe1cc1c0d03ebb127a1170492bf0956958c53d7f0986bfce6716263a8b4770e18240002c6581b7f251c8a5845b6fec17bcfba4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b581711fba426c11769c505d8b45bd2
SHA1b1f879d592aa2692f526124595d1396ecba9d428
SHA2562e5ccae1e5e85f6733147616c863fde312715e128f731eaa841aaf06590d245f
SHA512fc899979ef1ae90ab651d102770313b3a4b30d5d6a0a5525bb9568e4a84893ff6e03d26180ad749a27d7a970c7b99939a1f06525a89bec28edff849dd03250a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c2461e0bbd05794ff3dada9f3de0f28
SHA1adfe6e4879c7734e0e8acbf702eab2e345bde0a6
SHA2569856761fa539e5acc44827e78640f417e88469cb127cf3a231b69d5f3326d88c
SHA5128bd4d45839a94ccc9ff27d31852479ac706683b474bdc84bb2aaa3d53f21c60248de043b7b869a23a72a9f0f1597b87da2268153cd2e96ce2fd44046a0598746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc1c9c47a407db618fabaec69494f226
SHA1da921fa54a49497bff1ad3110b7ca48a114953bd
SHA2561d07cebdbb86d151779a717beeb54e95b78fc42915f36e15ae877eeb40cc9b9e
SHA5122c9cd822a299284779d65f10b7dd567ce10be658343f444d2722291502b3abffe397d7de2192cf065d93b9600d9899ffa72a51937bb33ea3e6dc013b23aad122
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06