Analysis
-
max time kernel
119s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 06:33
Static task
static1
Behavioral task
behavioral1
Sample
2bd549f2ec92acbf9447225180d34e60.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2bd549f2ec92acbf9447225180d34e60.html
Resource
win10v2004-20231215-en
General
-
Target
2bd549f2ec92acbf9447225180d34e60.html
-
Size
155KB
-
MD5
2bd549f2ec92acbf9447225180d34e60
-
SHA1
6bbba17ab4fcfd525386f40f605757da42b48fa6
-
SHA256
b4b0dd96a06400ee81813763c0a9df966286a52efa8ecd0138dc931f97fcc098
-
SHA512
d0f75500476b267dd0f8900837cd9d4b9a382b854c69664593e4cf5b7aee3733a6783293e56e2a98200f153514e91fcf296c5fe47a62efc1724549915fb47a85
-
SSDEEP
1536:g7N70ZnR5DFXd/LoE4LH/3UH/3/sn0W85h5R7NbR0H/3ebz2dJByinBMNxor4OHj:Dn1Ne/U/knAFm/ebSpZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3DA6ABF1-AC01-11EE-91A2-464D43A133DD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c00000000020000000000106600000001000020000000b6c15f4c626742a2463d626377897633653281edf0d7c337f6bbf0e45fb0b395000000000e800000000200002000000004eb6fd4128b0e2108db7a74d7b38b2d7e0d797de339633533e535105b88805f20000000612d0d9fada9584cf0ad5d9c00b22d67988d1c90d6caf4fcca82f7c986add71a400000004da4aebb38cd8f38e61c927dc6c533764b9439b6f6b4958ccd626d09d1194de87c3c16c6fa7cb9d562f95694585304a7c26d579e6b5ff0272fbe0582d1a02037 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410645065" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0a177410e40da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2356 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2356 2524 iexplore.exe 28 PID 2524 wrote to memory of 2356 2524 iexplore.exe 28 PID 2524 wrote to memory of 2356 2524 iexplore.exe 28 PID 2524 wrote to memory of 2356 2524 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2bd549f2ec92acbf9447225180d34e60.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D0E1C4B6144E7ECAB3F020E4A19EFC29_B5F77004C894173A10E3A199871D2D90
Filesize980B
MD5ca0fe348bcace1ab5dcfaa777461a29b
SHA12e1f609325aa7a32c5d3dd7d8fa8b17939b05a5b
SHA256a1cae7ef002ff8dd264c712458d2c68c0ad4adcd893db7915d633ec50df56af8
SHA5123f439024cd0799278bb36500c3f9963b94e00c51c69960ef5b9550a116d11ed1ca2f877ca556dd4ba416e714ba9353f558522d2df0911fff1eccfff12b25337e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec927192cecbb7b3066fc0c50d255038
SHA189068b3cf018bcae3876c7631d305cf192836f5b
SHA2562b0e3208a5b8619ca5158aaf51affab155d8a007f7535818f3383c9669a07f2d
SHA5121c7fe6317c7358f8f1b0804866c6a7d170c7626ad0b66b524fa6ae557ddea95062c9b553f2a6ebb778fa0b11f9931b9cee94bf78ca64ea122674ed99e970d802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dbb81dc3443d2dfab77c9b8f4d6e44b
SHA19b9e770f0f7fd61f6036cfdb135866d970f28e72
SHA25674eca2724c797e8ad4ccc6c95aae71592ebf1658aeb0bd0840e8ee3fd377a4ba
SHA5123a71aa1f7b0791fe5b315106de07eeb8735888a120c60ddb9b9a121ba5fa26ada2fabdaddfde06686699a461b080ea91c6d9f972cc25e018d0000a7cdfc7114b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c84a20dec2c1922b3c733f0f0e26158c
SHA191db94b5adc8cc0df0efc7dabfe8c053bb620390
SHA256d2ccf5eb5fc67fd742d556a859d44f2e02f115a0101874db2a15cc6b026fddd6
SHA5127c3415dcbc9ae2eb734a413f0da9780a513925f2621b2c970b13a9761ced986e0bd6475aaf8b24579fa1e8cf0a7d5ac8d9d9bd9b97307ccd93fd2dfff4de9213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51100db620f714999c165909423048db4
SHA16ccc4e5db76eac6084e5bc96f9deadedebf6fa82
SHA256e62f1d0a17026cf97c9276ab27024cc36dd97c76143fd5cb0a933578badd3cbf
SHA512193835cdde70cdcf798df91c4e34366c6fb3bab4b0cc758bd65cabbef20fc8370deaf17fef526472d24a39869269635f5c7887ef876839888b1e7b5893326437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58468ffa664196364ec8260aa38976c69
SHA1cb9ba1b3149d4d9a378e7acca1a786132e1e887b
SHA25611ada54d71bc8037747cd8717a6a2ff9ba6835d16263fbdf6468ec52fd116d0c
SHA51253ca87a290ba480a0841ddad5be180bfc73d598965cede679583864b9a9b7a051742ee09a1822e11991de8a53d484cd84daee8ad750a69e89ab469af50434894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb6d85ea599c51cd5ecb3b8f3aebeb45
SHA1edd46b5a72768080656a0772718ec9429d365849
SHA2561af914b530d70fa83b5562d6193ac9a41dd55c11ffa9949fa61a4557e92fb898
SHA5123697a2094f9fdce7392c2ad3d0777729101e1662217b47d7bd7028b575d502c4139351cd324a2761d0177b9a9599ca6accec891c8e177c46ef7e0e15f7f8f911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea12a6c1286adb51badf864bf1dec740
SHA18fe68f330e38a839c96f4e006cbc0c0b2233ed16
SHA256b45b65de19fd6a4f593c9196a6f512dbd7420ee1549d8405888b9fd2ac7eb684
SHA512431a0d6d3a53ad4060b9cf21c30fd6ea54c7704cf57a84324f47e0b51662f0562b81c503511bba542f03ea0d89ab4509e9840fa4f541d87f9056384ee1fa2b63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3758ef7174208480be01613c1c63c31
SHA1dea350ed07fbd882100da430f382d97c0bffe89f
SHA25655e4ace25aad2b9535d21d4e2e21c3cad8be5b2e3be321910f810fb795e0c550
SHA5127b5b2b624b4ad3a0b395c39ae12cb8db4549c3b4a96568019c8f81fcea6df50c018c5394ca1151d73acc87bb2c6cd5d8d2b96b61c0948c40263e0d49a530d26a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59214a21f4c2127bab69bd7dfd50d1b22
SHA1de1db1554ba35a63457397fe3ad055712d44ca86
SHA2564bb7e0ae9fe305f7cc56b4217ade29c40ffbf8cbd70fc8bdf45d340c4bd964d6
SHA512ec9e59db64a29a9b16882e94c08e25fc8904418071f9746ccb42d33c72f0b3a8e77e5caae0b3b43eb0f873feb55faaeed1a4fa2fd3ee55aa62cb5921826816f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c3609ccf93057a43c2aa4e877cc3c6f
SHA18af11bb2d6113f3677321c64da88838bfe339665
SHA2567d3c028a4ecafa2e1382c403ef870a97c8a67e94a8207801f355ec87bd71cdbc
SHA51211a091980656ddff83d2f9c63d9e9b354f7b4bd0cfb6b74a2e56d275e9e9cfe2451c93d414826c68bf1b4850436dc2cca00e9537c0d99f4afcba18ba4162ac8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51615fb27a4b7cee391bc449e8e230548
SHA19c3c2c76b1030a92ea9bedd610495da389277630
SHA2567c35356fb562bbe25268b5a1cf3c5200a027f8dfabf8da6e093c2421a30a364d
SHA512b40ac3703b65c666a258031010624b7c0c3a233b57d1c7bf2222f4aa0296d84b937d8985fdd68575f891341acc36398f72c5257b486e0215d93b4f5ba90a2538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f2b01b877e10a6d735c307b63e4f85b
SHA1497b6f1fd4d11aedb62875836174ed4fe8ba1528
SHA256be908978fe9793617c18ca20e003cf2aa69351db8b61572bfc138be04c5648be
SHA512150f7d18aa2eec46214b66f6b6554bb6ba36c7160f9077ddcf44b10baa4d4699d129a515e2773222385062d2863821e5d37e9fb99cd00a717a386fb256f71fc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e463f06920f4a27c3415e060bcc6a52
SHA1aefc3879bd4356f3b2e6fe07726a14c90bdc903e
SHA2565f14084de2c0ab7bbd4b83596c23ae2799038b45c3b12b9d1872178200013886
SHA5129ee4a64b1f9d00a716308cd69e1f18374ce1036ffd8437a8ffeaf0a377fc2bfc1d8bf1ffbd46977d7b31a9fa58755cfc1410ea2c5fa8d5bf67dc3bee8943ccb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4a6f463ee7a38bd432a8fc2f772fa9f
SHA1bc21026810121f631432319b3ad57a39e55e7608
SHA256c9cadde77c4f9b39576c424e3d62197c286ab33499481a4b8443138dfc260bfc
SHA5127a8168f8c127dc29ba63b7a3c908eaead1748e4741be9a6577aac854d26588989359913f5c989bbcaa8116c52ee5be1aded8e88d8b3c171a589607977ef61ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5626605fbb455328b98b760be9570df87
SHA11284709b40ee70d0981911fac9db05c399fe237e
SHA256c7bed903e2a78c34f5f0c67e09bf396770b3a5f8d9362ac1adb7420bcb27de0e
SHA5127424b51db47b7e6b7dc196166fe1ab7c11f948fca6945e6035d01d127ab68346b99701ae6d658b1f1cacf285f83615ecde2a63697d730a511792894789a6a688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c56b0b32262100a4dc37de44212c41b
SHA1b1ace4df985f32e1179a6c4e2911ad30c8d525df
SHA256cafd30c572154b07a7f92dd9173a9c49b3431009c1e704f53ac8da646a1441ff
SHA51240735316dc19a32f47ea4a0849093c0e74803f9c79d34aaa65ccb42148cc37e32281a965f5945d10f0d8013abebb80e1bab7427a4c391cf6f9287cc27b142dbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d3f6010b908854d25b11f5dc6693082
SHA1abc255cc32444596a8333c663f1ddf9996d9cd55
SHA25614af70e5c354d6f4b5b6ee1c71a88e383879353719f01623a1be01f49341cf8f
SHA51223640bd030f9b686ece12d4ba243f341f25c6e550826f1cc48bd15a70290f9f645880bc99beff4896a5494f379df69bba1c56c28f9bbfedf629c9745314087de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5211d3635f646d11228df2e87afdddd29
SHA14da5add8c4e45dcbfafbfe6879ba532294fcc9e0
SHA2564cd78d043440f7890b22806b4feaaaaad647576d14121aa68d4fbdc50427baa5
SHA512872a907ad08ab94bbef800a4591240b865f6608014017827621414659cb2cb1566543e94adfc3b2a70805399e9cd95597c636ac91fe4e7d03d73810475bf9417
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06