Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 14:21
Static task
static1
Behavioral task
behavioral1
Sample
1b44058ed99ffdfde0dec832524b72f8.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1b44058ed99ffdfde0dec832524b72f8.html
Resource
win10v2004-20231215-en
General
-
Target
1b44058ed99ffdfde0dec832524b72f8.html
-
Size
3KB
-
MD5
1b44058ed99ffdfde0dec832524b72f8
-
SHA1
b558770c5539a45d6f428e969d9492f79448953a
-
SHA256
e9568a86549066308fa02594908e20648f839b18a6d622159768be405cdafc06
-
SHA512
06ea492922fa73bd3470376901a341d80f8eec6651582370b2505f8db6ba35e7393c022c13705f5c951e4512fd67c02bee3942d2a8e6605676710708196565f6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410485315" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5210DEA1-AA8D-11EE-B383-EED0D7A1BF98} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa00000000020000000000106600000001000020000000f2b47f211e3449d32493286e071631e606a5bd39198988a1eb0c98768ba25327000000000e8000000002000020000000c163ed8364225eb8e6aef8b4dd338077cc1ee54ae71fa368924a82eb404c15f22000000080fe857cbfdc070ed83ffd40fc234330d8f422ee85d2464b747a0ea4b743ce96400000000a8be6a5e35dc4dc0d1aeeb25f5317c8f2261cbd7044a29bc28689abe44f3fdde7c7bd8aa49bcc727c45107dbd45891e977a387ba3174fdf6d403d8110f7034a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 304ced409a3eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 284 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 284 iexplore.exe 284 iexplore.exe 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 284 wrote to memory of 2288 284 iexplore.exe 28 PID 284 wrote to memory of 2288 284 iexplore.exe 28 PID 284 wrote to memory of 2288 284 iexplore.exe 28 PID 284 wrote to memory of 2288 284 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1b44058ed99ffdfde0dec832524b72f8.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:284 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:284 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565dbb364fcd25923d18c42d4ae30e0d9
SHA16143d2e5d7861d03e9e3cc84a0b8521eb513d981
SHA256ab088d14d99d78d7f41cf5ce979d3f17da5f844edd1b7fb88af0adc8e2d01541
SHA5120f84af08c726f2d87eab6597b5c55d2523bf67d276ffbac14e43a841f2894fb0bf56b830d050b28446a19929ff61b564a63aa187b1b822baaff3a2e10b73c439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57482bfdeaa316588520c754a480f7458
SHA1dba060e34b9b357db629436abd9eba7914648214
SHA256d723f6c3907dc7c3d55e3d3303d3d27893f26de27b3d64f9343ea2818abb6b9d
SHA512b9b26dbcaf9ab6ea746cfa96e06139d390b292053367ac05e883fda5764435993a34615b401ec4ff9dfc05938172ea73d76f1e2de8d7a106836cff9654436439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fccbd20f0d25d04d22e9a809d35b132
SHA1acbca801daa965494fe982551edd0fcbb05832e4
SHA25691e8ac326f8299674de47a6e47bc8e035c1dd9e2dd82a9966161b226bd38765c
SHA512b8e311867c78b3597071ddc9ebf3dfb70d164e3148e596769545dc12f8b614ecc65121bb79370b17611a285e014a372818d60499b55a206ac7d771b93f233a71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6c8d83f8fedde1541b67aa649443299
SHA160a8f56e6cd763e74910866ddc49bdc2ca89ed15
SHA25628aa56a1d7d2329110430c148f4668cb7ffb772e04d50b86c37e17bfc23f69ba
SHA512d0474e017170d06c5d81968d4b85ebfe646d10fac66abbf272118e08d10b3541540d0167f0387e14c6cfa6b0ab7f83ea8c4878439787be2d888fed94acc83b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aba26b9f3473b7adf171c47dcdc8fb7e
SHA17cfb3a8884583e193b8109a389dec9882e8570aa
SHA2565a5a3a726e69ea7447306d32074a1866065e647215da52f4cab63cda50421fda
SHA51242a2405ae9abd0f0ad018fbf5c151a84bc63f55f04b91a9c3a5bb565b0b74b3acec04a096c7710f67e8b59e2b53b59e292f025e52c2b15860fc090b272f3ed40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509192ec3c4dfd185adb5b06304c1f300
SHA18b227a0b38f95c0367c5140a3740e811d799d435
SHA25614b90e6e895446c541cbd76193972a8adac6493d8126bc6d0a228667ae28e3dc
SHA51207c2b2859bb3a7e0c3741ff7a304c657e8d06837b1bef0036650cf5c766970a99cb95aaeb5595e93353b6d448457311ec2044177734e1e5019a618262715aac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556b6200837e7929a08e29ba237410eb9
SHA1b6c1af8f9a057228baba6e6be41d6e87aed7632e
SHA25651e36cb11cf8a372120f830837833fa6b0dfd981c6ff710cff18091fa3dfe151
SHA51255b41108e06d1eeb968775c2363e81308ae956725ce7bf12647f9d9bbbc9e55867f45e6ba45c95445d3d7aa30f0677bbc86390fb1ea02887d1bf44ed78180395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c132bdda0d2553286c602dd452dee52
SHA16a033ec61bf825c3fefda53b8f8a28b6a7f7f5e0
SHA256b1b971b559196f2023036c1ce80baeb8d82883c7e1786eec919a75bd28bfd475
SHA512e785e004c24cacf0e61d1563878fb7478c1d6f8f647483774cb0456d8692321bd4e4ef0c01bb9da097f93490b0d483755547bb516a8b2aac7352360f3927f5e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e12a6fa791243008823b5d9e7c5d906d
SHA1227e89d764847f5f4b917ebe99f341052c42031a
SHA25680ea2b9ae66679a28bd75c608fbe07de1ca46cc4629cd614f9ba1f8dd052d39f
SHA512e38e69dd2fb9555aad1b096c1adc3d729df0da8d9c6b5f9130ea6bb9778490df7ed474ca7868c5e9c230aa7164e7d8a6509b67462e1bd2e1688eeb4128346f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf284b7f3eed02178c61e8485b0b5615
SHA14a210a66e8dce3db223ebab507540b3defe6a658
SHA256dc7a000a12a095dec94ef5798af439a9d8cb601682dc1fbc55d96dea6ce20a55
SHA5124711cbb8221188273c6336ff8ae601cebb099f829696e90d00b4dba4edf5f1702c9add97cb6c578c7b94a019626771a9f263d9d6140f010aef7591ce27566fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dc8f9b81e725fd9e7ce6e233ee280b9
SHA1e87d85b9de360d259b6421a434474603e12dbfa7
SHA2561c96a04f21087c7d992fb684a059c8cec69f93b1fe3b6d7737732df038b54e34
SHA512528256bdcde809f98306858ba77bd00a525e9290d10b64cdd25da308acb35470d6505d8e335b638297797f45c38c5deb54a3a1f8643ffe6a5c06060a1612ecb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a598c9a212baa141a2075f4bbda47610
SHA1c7e21b6c05cea02df5c958fec5cab0373489bb9a
SHA256dc3714940d4600fb92093b8b6715d19ce64a997a27c63d7203ac23ba37ae91f0
SHA51293bbdc6d2ae7e8fbb0d73c56ec08f018cf1b3ee9b1529d914ea28392fd3a44ca780af6af15f2408333b494571cd3bf79dcebf03f827320ca4c60c20d7c45b566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587ed6ff6f40623dacee22d85eb63a024
SHA1c36bcdd3cdbd8b510bc71a2a659cc881007b73ef
SHA256627869ed7b6c0185fdb9cb81f5c114db1ecc09181f50d2f8a76f10417889d9f3
SHA5120c559f2919a2448419b1680734c0bd642a649444bdce81e99d19cdb969c54eeca0ccf568a02d9d67f68fbf79aba0d413fc467cbd45cfffa97ec2452f9e7d0315
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd3ca69fc815a1573aaf3febfd4cce3d
SHA11ed0f8e34f8121cfbf02991fd0b4d038f803be6b
SHA2563a8ad3487ee5856147405ba2c423fb80b23f0fbe574f9aa950b7b456a4370c83
SHA5129e6cd179164d8f1bb69fe540c4e265de284f80549f27b80ca306394725df6afbf05c95f276ecf3de15faca944223f620ef812b2e41a3eff92a84c3945822a8aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5908b9fda17da56464811817502e9cb09
SHA1e6e531f16744266ca44f57b2dd498fc9ba9a4ef3
SHA256129a98a0171bc664396ed1dc06974f1df5e42ca493f41f8c4a72da792628f4bc
SHA512b1f307b15d8f76f87681ee8d34cb3a3f3dc80691b4369f559875d12569d01805283cc63497ee7b3406fa667e347db99dbd0a16d9fe2e702f2f0b8ea60dc03b58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e83b6cdce00823ff79e752f8e2b338d6
SHA1bc92edf57041a15097cfe1621ed8632729dc49aa
SHA256a26be86c34b4750eb5bf71ee88baf2fd137c104c7fb66e7c0f620b53bff74e6d
SHA512fcff8339530f46d5bbb019f48482c0d76478a7e30be0d926b63123bce42465b7e1fed753a2acbf37542b2b3f0fae75b3aa32d03940590185ffa1d4ff448e9cb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ca9d89888ada56f8914ae55d57c439b
SHA197d316e90ecc732838303e498732d22d471c7cc2
SHA256c75f9608802e5a5feb450df40a841ddf4d3c1ab9709e364947a6697fee4a018a
SHA512897380a54bc6ee7c2ecd39fdd38b431df483ff17f437004a4b3939c77a6634cefd2d92fc9de0a5033929d97aafc441d0c2c2a6e5e313aad3913a956dca12a8c2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06