Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 05:16
Static task
static1
Behavioral task
behavioral1
Sample
29a4ef5cc52f59a7cd8a9e7b028ad961.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
29a4ef5cc52f59a7cd8a9e7b028ad961.html
Resource
win10v2004-20231215-en
General
-
Target
29a4ef5cc52f59a7cd8a9e7b028ad961.html
-
Size
895B
-
MD5
29a4ef5cc52f59a7cd8a9e7b028ad961
-
SHA1
ff90356f225930e978b3c6ad836422009489875e
-
SHA256
bcbf3b60cf2eeb651e15e72d8dff024aee311a637e67f4df013704b5a52edf32
-
SHA512
2a18c185ed201d789320b744eb45cc3a5054f1e9ff415e0e55b9585b4ec4625ef01981d0b01595656e82c127ec172aa943c5472717b2fbb033a015d76b1e7056
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d6000000000200000000001066000000010000200000008cb3b090a89c0fa6177514448207002ce6986679e5cc77e98c89f216274bc405000000000e800000000200002000000067b50245bf802049243853a85743d443e3e41d052d9936526e88c19261b9bd1320000000ac61134220cf9a1dd1daceb199cd8c63eaa8c30b1f1a744e874e8ca8e20c8008400000006af4a41c07a416a00976e2f9ddf20b6238faf042b2be67c4507e7d3dc0e117969fa02ada32cfbe4dc2ed1037f01f27f00dc803db8a7658ff6d7ebe9b75fcaa08 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4624FDA1-ABE2-11EE-B59C-EE5B2FF970AA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c022c619ef3fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410631750" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2932 2088 iexplore.exe 16 PID 2088 wrote to memory of 2932 2088 iexplore.exe 16 PID 2088 wrote to memory of 2932 2088 iexplore.exe 16 PID 2088 wrote to memory of 2932 2088 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\29a4ef5cc52f59a7cd8a9e7b028ad961.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a1a55c88a19180cef53646339255e54
SHA1190e5dcf5dbd2f8ed2bd8f9042baf9212136fb10
SHA256770b9a26d1be66691c6b6f2cc9bdb4defe5beea64b8e1885cc759c7d6b3a503f
SHA512999c4ba64d698ef278282df6f3b2457b4a8e82df452241a3aaa4b86b5fe7bfc752d6b32447900c3875c59f7a24e051acd19da20fbf6d6e4d8cc6e3143e318478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571b16c6afdfca85564eefd5250ddda0c
SHA11b484b0f2fd3b5c008c88ed5ea895ad96275b1f1
SHA256cc27dd1485362eb7b84eefdcdfa86e40bfa3afe195eab2617035c8bf07214e1f
SHA51209554fad17d6ee47e8a3f7c42094722b39d51b27360156eaf6f3cc8f70bab7bfc560dad041ec79f125262dd9c9d54db01c32ed3b6389182ebd340486a6a61bc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b91b75769316cf19924782aeeb9bc6b
SHA1013f416db6e79ca6146bb0dd8e739a5406d1a3c9
SHA256c34c8e9f67dde15669fadddc57ff3b6e761061ca7aad99ce118d6b3d9e37ca7b
SHA512877e6ed3b0c2fbcedb7b17554dc25bf6665d9cb1b5e6560300b623517fbc204bd542e561ba9a1038bc4b0f9aedb92ae40aee45d8b581de8bf112c78957340b28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a3c4f3d2c256880c529336a6ca069ad
SHA1dfc42f09dce87b8ccdd26e05afcbc04f8adb8d04
SHA2563a0294ee1f9c8ebf637264aa683d43b4daf8f320b205748c014db393bb564e35
SHA512f0fa843c878a71affb824470d809505c6298d99c44d672505ee25c7d2ed653edffa7a00135f3cefb3ca075d7ef11b34d9736e303c43051ffa44cba4052428ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e71c5615248e1da8ff53b9fd7cd97061
SHA177ed645ce20351bb37cf50ee4c4a99c7c5a6e14b
SHA25673c15063576eaab0462e48251d12d5e0b1b4f96e1b2cd192a769aa1f9f6ef947
SHA512abfc2320e015c5d6f7f9a4f8cd2a9db97caa01e84dadc86153577c12da82160ab48712a404849d4293abdc347eec6801cfd315fd9e8be5f1ace49fbc03cc8ce8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c83c5510566f0d209d0dc8f3539dbaf6
SHA1ca181f8d71669e798df912c6f0c8cdde699eb373
SHA2564e0aca27ad976c1788a6737d3d95e1bc8968b0a090fb1d2b9f9a2bc2ee7fdb0b
SHA512b74560542176ecd3499668a6b4a4c0e9bc6cf981b5d5a6ba9043d31f452b6b2e5ae29cedcd95ecb1caa2d7364f3165743adcbec8705f43cd91db7628bec15045
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ab83996d0f3485f07f73566048b5f3c
SHA1b4564c3e25fc69223601da3a81b70d698e329003
SHA256994efaa562c367e12b04bcf093d878da937da25a6130f53c673b8efdc2e0e9c3
SHA51221e10ea35b9edea53e0e70904c281feccaa8c1171fe4973eaf10a8ec4078ee5895aa7cf83fcceb71b215517a5da081791ae63a263f21ded7886ec56233359b4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f938d1d6692a2aca4736d3772c8526a1
SHA1c288f605a46c0e8e668d5279715ea78aca641bcc
SHA25631b20f0031ded17b38686588acd742c972ab0755ebc7be8ad7379e00735895dd
SHA512a491a3641069eb133e333a65ca6892110ec276936866a1c6ea62b9ff1fa6f26d2ee50f2f42a41b3d4cf1b43a577451d6addce946cdec609c0cb2f737c9321cbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e1af65977902105021bc939fce29c7c
SHA1886def010767d304fbf0fd9133b37ab3a21cf64e
SHA2567729e63f7c4697adec9e574f2845a89887c064cc281f6091839541a87dbf51ac
SHA512487868c10879f33abeea36408d304c0489301c12c53779b099ceb962056d93694239f7d16c4cf76d3196bb6d51289ce2ddea64f78932c006a1d20cf140a649b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ce85bc50f6adea2573c3653aaf53240
SHA148aeba91a8d6718d1ef2a4250606a23e76faf7be
SHA25654187d5d01d34e0fbb579076c9ccacfbb9d21c1ac00a26eef69262f3a8990148
SHA5120a9988983705fc5ddb19892b7523d548babfb0973fd96101e34589d4a3ec8c9264acd7ab884b0b9ec0994a4f50e625c5459acdc41def0cb609503142614a68d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5525b10b69104bde6bb378cee27eff3e7
SHA1f16a211e145adae28b6ed6d3f96e4b8afe56c729
SHA256a4a78997f8b859b1ec4eb5820745dc396c59a0f1d07ca49457a8588948c5fe62
SHA512dd80565f7e5f1c3871494798aa4f8e5aaf5510d431c8a1ea0a2958f19133268b6af9082fbc9f7d03c8481af1f0d0fe00356921d74d57907c8e5c414773c82b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e1cc15564947890425c4ca6f0d7e5dc
SHA1933a182a42e3f5ffe4f17dd7c1071cbd30e59a4d
SHA256cf53f02d48638d011d62e9edbde683aef00471e648bfda87fc7a7c7dd1f5d024
SHA5125a817f654777f2aed46cfa54e82f91e25f4bb3f32fb712011f6b892e4dc0c36b1511ff05cb2ee2df477934e1705b24a02886b61e5cc9c9c4be01b8be6c3bf39f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e629dece98674168029ddde7802d3cd
SHA1909b42d5d099dda87fc65ea21b6aad013a7fb279
SHA256e9fb7892a6a27134476671dc2b9d3e85b5ccbcfdcc6b603fa97d315d6b5245f6
SHA5127bcbfec14b03fd9c59f2b2498a1e2a87bbbc3d711c32653c53fd6ce957388f07e537585a82577fb436daddb5f3fef8ddbf3e7e3f6994d2325328a5732f63fcf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509fd9aab93fa49017d5a6a9424e952f8
SHA169b8ac40f3e20cb10fa4311719e0b5e41d1095a6
SHA2568fe4fdf4acbbe218ab710f934e4709095c94e75611e4021e42d18f3674502469
SHA5128dd072ab21596c8f4fa4959929cc277eab28c38bc894cc6dcbd841995f6186a6627ca5a3da732ddaadc5136362e0c9491d9188b224fe0d1feda45d2ea66e9201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5757234296332c4837abccae01dc75001
SHA1240b96a701ea70fc8009510e9e91365778a29dc0
SHA256dea9183e4f72e2e5c014149e444efcb707df1be62af2796c45cb71f79fe7f576
SHA51254b0ada35435875acbae240fa420a0bf2453f1d42a288f561bb4710abd437ea4c19bb1496dddecdf7302b9b8ba5a9c5cb561a58dfb0cda03b5e44f90989bb5a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b43d086e7a894740b18879b3a6e32d2
SHA1fac456b48d737281c154e7276656c72f0090ba38
SHA2569cd839850080c78a31103b748f883b9197b8fb6ab6631a3bc8a8f78eb67b3209
SHA51207561219a9c060af4a56caa35df246aa10edfba9f78097ea9096adc54985864fbd059fc469f643ddfff294e013a45ae14dab78af81d363143a1e50954ba96d04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cbdf4a60deabfb9351cd59975dae449
SHA16106e1117651f7ac29f7824cd5fd588526bd653f
SHA2560c7be71eeb0bf7be05d45cb440dbbc31e0ae6aac6764d02b5044bd191d556e8f
SHA512028df426045241c0bdc50ab3c133b81dd81d5ea83ff3c872f78ca9250cee5c1330cd7a85a7f7c111f73bb28c0526a93c28b0bb6b9be71d1107a2c6884ef709df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569c1331207614c0a89fec2ddba4051fb
SHA13dfd9b4f0357aaa6cdf59943f1275a156de0749b
SHA2567feb5bb806dcc6d1d046ee249bb309532573d3eb81e853f7f1182fc4903264b4
SHA5126a623448d448ee5324a6ac323c846a52dbca34f22793e017230dcb514406c136a404b08c8d0a3955c708ec5850b44e960dc90b7eae08f31ec0771d41fbfb3b40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548d657697a449bc03ccae6b7dc654621
SHA1ed211d9bfa70df0b05d8954e974e727f5d4d85b1
SHA25640701043a9f6dd44ba78f83caa995cfe6fc25410762195a79ad784d609e6bf7b
SHA5121bf093ff7b50c1231f3751d9cf0dbb37873971025bb9d67580a016688dcb35c67e8ea568ca79d2c595f642a1637e9edaebcfc46b9a84be53f177c629e9882b9f
-
Filesize
1KB
MD5881631b85028ab9e0eee42b4bb30633b
SHA1b169795cd7654e1d080e0e2048213dd4a8eebbb5
SHA2560c2ab1a1a9dca0322edede7b0d24b7f7b42151ee9870cbf9e9670cf1a2cce7cb
SHA51205f1368c6e3354dd850301d9c52cebb489b8306e6febf9a46b9bdf33c09aa69a46d9ff3b8529728cd95a4f078c3e329960d40fea1ccd7d241de9c4f579dfaac2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LFTKP12M\favicon[1].ico
Filesize1KB
MD591abe01116ab422c598e9c8af72cf4da
SHA10f2815fe8e067d48537ad168225ab4674271fa27
SHA256b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc
SHA512a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d