Analysis
-
max time kernel
122s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
271dd8d8de94a2169b79e99155f127d6.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
271dd8d8de94a2169b79e99155f127d6.html
Resource
win10v2004-20231215-en
General
-
Target
271dd8d8de94a2169b79e99155f127d6.html
-
Size
432B
-
MD5
271dd8d8de94a2169b79e99155f127d6
-
SHA1
ffeb3e8ec5ef70fc22806695a449c6281a0a8842
-
SHA256
691283807e7e44bcd4229aeabedf132ea785c07f3aaf8c6d8b0a5476d7e09c11
-
SHA512
8ee1f339b2f69da337b84d6b1a6dee69695bffab2ef8a6b6b71c1517fe96e0aa7119f999ec75f726d1f6ddcd613b98af944933482402318286d21d9412edf54f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000e29d15d97e7c66619bc6e06470a500648a5473e54c58e44949448e4c430e1770000000000e8000000002000020000000568fb75e456dc7980bc8bec82e4d36bbff76d29d5a6f1b7eb90e633bc0629ad320000000b8a99e11618d9fed5284f6590582716d4be7b12253dff31fe98906cb75a792f240000000d442f0b0e7e30b606efbb64d05f4b71fd4af6153823556a6340358489c0e74405787a17e8affbe1dcdf374087b28d906990d8a7b3f64efc058d79033975a530e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 805f55382e3dda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{70845E11-A921-11EE-9201-42DF7B237CB2} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410329031" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2024 iexplore.exe 2024 iexplore.exe 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2268 2024 iexplore.exe 28 PID 2024 wrote to memory of 2268 2024 iexplore.exe 28 PID 2024 wrote to memory of 2268 2024 iexplore.exe 28 PID 2024 wrote to memory of 2268 2024 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\271dd8d8de94a2169b79e99155f127d6.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5573bf378af8fd7996db254c0aeda6c5e
SHA17a6a23c90018f737e5269477b65d8c362866c468
SHA256cd6a42386a5c33a114ebc2a8fe3ebc9db6d72039905c54d3e0ac8a47bd89f3ed
SHA512a91c20244a5ae6c228ca5675e85ff3e9cc99da72c692aed0ca274b3056b6404e9cbeca408bd7712c7cc365f546817a6433b791d41341780c304dace6ea5acbac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fa3e2e6bde067fe1d774b1db354af6f
SHA1c169626baea23c870744fc8254a97e26f969aafe
SHA2564d9dabf77faae9c1566ba09b7e927016fa2a71a909c080f66d60ceef3d98e01d
SHA512eaa11c8bab9047d81df32be02754981d430d853670ecdcc5f554748506a3c2d60f82c1ab6c06715fc03f9facab3a79b31e90ca7b8b9c7f75712690b7e664a09f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5474414680b27965e27dda14cb52f277f
SHA17f4b2c96e985e69a566f194c572994dd94bd9ced
SHA25637a556fab8dc6a5d58d9f611f7167694dc1670cdf18caf380e20a36794fafd2b
SHA512fec0e65d42478d1644fcf68829495df2b1159c1659cac589130288245b519c5de93cc705f22776f86dc4830c653b38cc73973545e41e1376837dcad75e82206d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cea1db10661d06c647c00679704980e
SHA18c96df6edc0f3a1c8bd01828733b57417cfc62f6
SHA256a660edf17aa6160ff6bdbf2a3d5f87d749291b39b2866306bbbf3d37559401ab
SHA5122b78ca55bd7a4274d48be4668daa625f0bfa6e469019bfe04cf826fc185c4781222124bdb9eb12c9ccebb615813ed4c2a37e23f2c562ec990c8e94d8623e2b90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551d0e3452da90ea8868e3af3d562ce93
SHA1ab08bdf9b2f86dc908bb22de525a752834e469f5
SHA256e9c439b1494917e8e64416b247b1c2c7b0a68ce12e6d6236513a14c7e5d76707
SHA51259d33101051574014de803e18fc556799a7b89b6e0ee07e3d029673bb065dc32a356f5eb6732346c0af52658e52fa75621350788fa0bca90d00b4dccb172eb6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599c0d38d7dcbac16c9bb326e46e0a7d5
SHA12209d09b65585f2b4f37eafc8fcf9b50a8d5ffba
SHA256e9078ec28cedcd180d82d3a8f9618835935c8497fc476a3747b81f50a91ef9f9
SHA51286db9e22d63963ea2b137d91697b6fdf12e9f359054e417ce0fc009e277fe3d7110bc15308d07fbe5628f72c939f09c0ee32feb4eb49d02c950211c6826689a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c90ac08433c900e0f44144c523563992
SHA1cc4fd465742a43b0578a4a7d29cf45ee89d82a43
SHA256784d3df51c2422789867128585c1f36ea4b93a49250fcc85611bf90f8e520b92
SHA512e14d89211eb804ec83c4ea1ddd80bae353fd9a65eedc23b69eff8879644a22199df64eafd7cf7faa223ccb368c80d2b6bd2cd2e8cba4de3de709746a36cad927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534d7c39881625e082d000c6b0a7b413a
SHA1fdea6a728f3d41578d2311177b8d1f9d5e1886c0
SHA256d7bc077dd7ca00eb9ee01d356f1034b66c66c6af798a6753995da0602dab95e2
SHA51269c5e61df3c26a3584a08d17a04110485cc55a89e273c0b51937543ac6e822070ed6d62450dd11a69951eac5104669c319f5d111686eb2e508ba5f84819c28b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffa94793d0d9399adb945a37c34e4ce3
SHA13309a8e2acabaf254cc5dd5d6df2242a51f73779
SHA2562920e8b1a9c5a8f30a19b462c6037cecc0d3504cfde9030d5a6aea7c2b330c29
SHA512f55deb266a07aaa484ffd117f2bea93a8c5eabbe9cf16c0e88f37ce061f9cd4f086567aef93dc5d6f3d343b5866506690bceb20011bd626222ef26ab56a8bb3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bddce00f105a8926594f1026e1b86e0b
SHA1533bb3d652a11a7d2e6bfe0a650a6b9bc312c53c
SHA2569b1dd6866c5b5ef68cdc399a9e46c0a214ca2e84746753c2cab41f4e4a847b91
SHA51208c290fc1421807fbf8a41fdba21965aa49a037c0f1cf11e36e69ab3b1e868eb1b1dba80df6d18f703d3d39ce5a7e1096ed4c3bb31117aa2324ef772ac688897
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6ae21454d53a348f713869f3902186f
SHA115d8923fd4686224f6f7265135a55f37ab685a40
SHA2566eaafdd35371f673b3a3f3e626f25ffe9d51ad017de19b7614d342a5f81647c0
SHA51224809165f6f08887f51e3cc4cf50ca06e2e19fe82119f343d970be6db2ab92c74d61c7082fb0bf0910243d9d4b595a214dfeefcf77e218683da47a6c73b6e5eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8b7f3190a1413aee13f7753717af326
SHA1bb1ff3dd68b82dac599d6fa6f1022c5ba78a196f
SHA256fd38e0ec0d4e245fb459d69eb8b750c1e946281f74c34ee1601f9268f2b7a684
SHA51201ed2f65e2517c7aa8a487f206b85e403e61d4c7b7b22d3cf82c49493f0d9d2e5208c87166caa2bd39a72ee2e151e7284311292db9c97bfed6c1f811635d5133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0d238f66c643f8442322f84579851b3
SHA108632cb922e6e06586de20140b14f53dbe3582db
SHA256a7621a224a7f6e5115c44080d2c93af86ac10ab886b9bd10e65fc90982b0f856
SHA512ef934123b909aed8f7dfc682762e1b3d3c75d565ec09e4b7172fc8e5cb309278d84c8f0e5a62303301121b9e4a6eb0ee82da110053f08c8bef2b2382d1674dc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58add1c46c411186ee45c0d7815eff382
SHA18bcea0b45adefbc1cbc80a7452209ce06d07d223
SHA2566eb569a07b63528c4b5697c743e7663b2b3d8146317f99132d24e95584352026
SHA5128cd65dc07cd60ebdbec9b83de6f2f7a310436d37a6fc6eddece85682686e88831f5b6a6b068cd89b4dc67c00f2c0df65e66803c88303178d869fc29af68b8c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591cf5ecb00c7de233be182aea1c97d8b
SHA149e6ebdfab9319e5f59d34690d436370b143489b
SHA256346895d6ff0370c51454254616d825d4352a0aab7862a7ba246c5f7f7851f336
SHA51257aea99fbe9608cc936791607b7209a8795c6ee1fd3ae72c08d1c1a836da967a6a309443d95787ddba2ed5962f9d342749b97383d8fcaf8a996eabeb2cf5e472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5823adcbda3145680bf2fad916b47f3e9
SHA113cc0d829f657ae0f9e7b616938fe39aed562acf
SHA256a31d4d3e479ba7bd19154b86b412b042748dd8b2068192933056901c6a70225a
SHA512ce94bf9d5eae60025d18f2ea8475c527b12857032c84fb25475ae049a34a70a2125db55e50d4ff6f9d14879bb8fddb6e822aaa66acbc4cd51cba0ad124b3c357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de249baf2cadc52d8d8ab7cf52cd8e20
SHA1e380add22c487363c5eef902c7bbe7d81db74713
SHA256d40b6f40a9dd8d3ac49bf73f96673eed18f75a74c49901e9c9b230bccb999829
SHA512c1c3f9cba3f9ead209149fc274478e83f36b54f5e958fa0f5c6296fdd014f93f585ba0d4a5ecc6f82a6e3a1f6c0ddb06ac80bbdccfb1da35a6fa1ee1c95daf40
-
Filesize
1KB
MD5811643b3cc23c81abb30bd56604a7693
SHA1bacf07eac7b88abf14ee3678ce4e1c689949a738
SHA256fd93340cf669f24b1297a473d3fff10292b25b545224e885bd364753ad0fc696
SHA512db46dc67ad566046b5f55d82d4f839b8a4aa620f1efd8e33c4f8fd34e309e9ae615e7a2f80beb2298208ed78387e9b539bf21ef57264629e27e14cde96e08b78
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\favicon[1].ico
Filesize1KB
MD591abe01116ab422c598e9c8af72cf4da
SHA10f2815fe8e067d48537ad168225ab4674271fa27
SHA256b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc
SHA512a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06