Analysis
-
max time kernel
121s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 12:43
Static task
static1
Behavioral task
behavioral1
Sample
368e1e7e335e46660cf860a8cc856aa2.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
368e1e7e335e46660cf860a8cc856aa2.html
Resource
win10v2004-20231222-en
General
-
Target
368e1e7e335e46660cf860a8cc856aa2.html
-
Size
842B
-
MD5
368e1e7e335e46660cf860a8cc856aa2
-
SHA1
41dc06b9b210ed94cbbfd8e1c0183aa65327733a
-
SHA256
c782a2eed1d1d834dac6cd0d60ebf7ed7b74be121a637bf9029fa7995d95cd93
-
SHA512
1439a936270eff363592c21a8852b523484b5bbc88b2bf097225c2e459d6d3d9e429adeae88c37b7eb6f346e696f19aaf06192ad1ed45e5af78d80330f33b2f3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa0000000002000000000010660000000100002000000033f9321eb507bc0b12865ff520cfc71a0779dab88600a7206b8174a0256fd1d8000000000e80000000020000200000001fdd9a03546807857b855f544ad09a51143833aea4fc6f2b939cdb0701bc57f120000000bc5a50dfa6161a0151d954b7982924fb4886c01fa0306302239b3540e0c37f8440000000febcecdf9e40fd470ceae17d96710d5cb4207f2116186fee290688212d680008eeb3a329e00c0f13908dd609986a2f055a8ddada5717355f7adece8b92ffd74e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c05dfcbf283fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FA2D75B1-AB1B-11EE-9E63-EE9A2FAC8CC3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410546583" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2440 iexplore.exe 2440 iexplore.exe 1608 IEXPLORE.EXE 1608 IEXPLORE.EXE 1608 IEXPLORE.EXE 1608 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 1608 2440 iexplore.exe 28 PID 2440 wrote to memory of 1608 2440 iexplore.exe 28 PID 2440 wrote to memory of 1608 2440 iexplore.exe 28 PID 2440 wrote to memory of 1608 2440 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\368e1e7e335e46660cf860a8cc856aa2.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2e1f6b1cffbd50b2ba6a4be5db6740c
SHA1facae44d9782c71382b68b0a5857c87a92a9ef48
SHA2560d1594276f40143e9932e07992428888df43d70f044212ed1774e7e9fd888779
SHA5127fb0cea84261a0bca6018c41196971a91798d253c55efd00bee91996aee59ff53ebe1bccaf9671d1a20d1173e129d27d0b170b3f9610df8a558347d6101bc897
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534d5cd72ed42a2a8ff799fe8bd43d4b1
SHA14da857a8327cc3e81e0c9338d3977948cc478580
SHA256728d653f2e8d0f6792aca7a826c30ff6070be6f7042cc82d2365da2794939a76
SHA512433ec8f669efca4fb19250c90158bbf46658a81fe32eb69f3147ee34103c06921cb5d4c3e5eed72dd8d6c03d543007e6f73cf60e55a4c01db197b81d1353cbdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527193832c7512f25829b1670c1e1cdfe
SHA1e8995d0b7681a3fe2d5919f066359a8218a6a71f
SHA2568260711ec5fcdf94bbd058f2597f586bf750ec02fc8118b945c46bd1878ffbdd
SHA51222292cab0a143d7ebe7d05e217ceeb05859d3dd8946ba5b56311312628cb48478d2fe79501d6b0e58f793f7c114ca083ac0b11e38f8bfa540b3e97968b628d6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c0bed2ce971105c68742237dd53eb11
SHA1450a4dab1f95a522f8b05398fe1d7a98565e5b1b
SHA25621d7c71307c0bd999b2128c766bc54327799f2446e6fd20ae33230862056043b
SHA512a7df7ba9a8705de90d5d876a6a9fd103f212f6778c754e321201fd8451ca0f1a088b89e51c17df56e2de70777e9dd549b1d1d571fdbe6d1533fe3968383b3fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dee2516a7f96a9c661f40e3a913b44b
SHA1d2273a97d964aa1f0d18e70de1e9c7e257e7bd86
SHA256d8a6e456bbcdd6b88adcea5af094a71619fa41959556b3726ff5d4e0f34313f5
SHA5127fd07f7b68d03ebef6ca70ad007c63d1be022e1b98a18dfd94d76cfa0896debf66fe4ca536aea1be649711671e5dc071c7aee1cb96101160e635475560dbfdde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57822fbd6a0afdfbe1605cf2349ac8eb4
SHA1e753864ae4099fa8496fa364a7d3fc0e7f1092dc
SHA2569d6117f4ce6444552d1c3e077d4ee649742b7895548a12e32a0eeb0885b2cde1
SHA5124595faa87841395a3fe95d98cb275f98be5df1be5b697f25b43bfe436fb98968658ec184594cd25d6cfc4d9d31ce1f013d244d8937341cb71322edab39e492fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5248b6d186d0079b698a9c64e686dcd7c
SHA1f8ab13027b67aa07d8ef5747d1bbbda9991a0560
SHA256aa07e5117f54a6efada4476a75245cd4b780b958877f32b7c1cac28c0469c19c
SHA512e461d7dce4037112d6d3bbf5d6ebd5724030b8a724054ad1c526d0f6b46d9771afb185e237ea813566ff015f9ee397355f326b1400fe1b4ab1b7fb5bc3a231d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5512eacb9bb03be76b71659cf2e8b4ccd
SHA1a27a2a1ffe3daa2c490513f9b0d5c8f9900b4e13
SHA256f7092d14f635749ffc395a7af4ee6da5bc69c781d760ae27a908fd45782e8c5a
SHA51216fb966cf28ddd653616429ea827d42f829d86612e4edf9cbe5bc598264c66c840d92b51c514b008cd0b81b5dac002b6116bdceb4f0b7739bfbb38e348b48440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553ce3cc775c7ec03669546928450db26
SHA1fb9cb5bb85a90adbb4ad9a56d299f93fba2910be
SHA256a55d87e7a58196880f045798d16ef6d1182b4801c7d67375f79f0ce32b9bdd06
SHA5128e9696d700871d5aeda8feba19f0f8de4d8ce5ac4a0c7454473023fe450a3b0de89e4b3e13b61602ac35b7a3b70197b21b5569996cf8436adc28759d61da57d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fa89297e0fc706c941763c68521c820
SHA16b3d6cf009c6022966b88fdcce1e3bc66272fe35
SHA256d6ee3897e030b5f08e149b09d4f6716d2a19f0a44fae2db73b6b5bfb7ffe2781
SHA51216650edefc2d2867880b3f7b88b59dcb07ca6dacea619ec5383b496fa12a0ca5d676b4cbbf904b4c80594ca95f8121f039153c7fa45e913337134569022383f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535e735dbcc8a30dd2110acb8dd8a939f
SHA1775feb6549695a1784c2c8a448ec7c0277480d93
SHA2562336bb1cf8d29ac7b750f3e6ca882e2f280908c880fe1c1f08350a9211d0f940
SHA512afee045648cc6922aba0240e4c770b6b56d957d61964ba561ef6c8abcdb148aac04a5315cb6e4eb807dfab231a9a35d552bab99ae1cc897d7a978bcd8126ef2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5755fe5a8405b4bd162dc6e387398357a
SHA1bb1e73c2b2ac05de3fa8026beca002e6af1c2fc0
SHA256dbc4a2653cf3f22a9c07120fec137a17e88ca9a4d7d9e76f5a5b2f58bd697957
SHA512f5a6abcd0839c80b4af232be94359d92a5b20b7c4d22798a02439c4b7c5dd346105dcc73fd8b028e1fa427af3a7deceb499c91ca963401fe923eb49035a21c40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580c355041c0446b447d98252e9692e8f
SHA1576c6e0626649b6e25e318175c77ffb617107053
SHA256320aba97919aa517f34706b38212a8b697d3e45426f952a45094ddc64d73b360
SHA5122fe8845bc464eee159c12700acfb85341a9f1081c11cda333733b4af46ba724061bba6fef6e024bffa3cbfa91a6f55c14ba4acd82e8dc97196b87b7b14222b5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4947e2d737f01f098ff0b5e49f696bd
SHA14e00d25cd391cb6f0a3c2270f20a37ce1090495a
SHA2565a180931aaf5ca39f5166f43e277512ccb0ed7c8e917584c41ec989530e71d23
SHA51232ba7571e8bbf51273849a98af36d7a1e933a42ece41137f9d661b3a6dddf087e6b286121e00c1cf2352b3c24846fd8dc02ecd683f1684bec2733cc0683aa79a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0f6b24a596761fb879092af821866a7
SHA1a6db16fca3dc736c8866446c968c0780664da993
SHA25604bc19438f6380e4b3ffc556bde24f445cc83e24e6c96c9b23ab6620e3a39ffb
SHA51264bf8b2221aaa49ce546ffe29f0841ab31568a3a8897a63f6e00d1bd0ae7ae011cffc9ee1354ca79ce75cc8865a30ccee55cc36d887c62a3581dd19c22bafffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1b107f5740ca82048ad31ca074cd93d
SHA12189e70367e6b7aacccac8321338f201fd36d5d7
SHA2564b41b658ac925cfee2aad923c0752e95ac5b2072bfeef8b57ff27c1c3ec20bce
SHA51263e32988f0499a1189cfecd280429bcdd00c8b4d271eee3f9372798860db288b46b2563846e725de713493d0bf261bba9648350139a7ffc90b4db1ff1ad792db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd42749f50c18ebbb87c46c2510a53a1
SHA1ed5558b1b764c9603e7db61e0333eba2c1530fec
SHA256e70401d26139bc7d0906da862e380d85aea0a49ae13c1a9447e25f9b03f4ad9f
SHA5124b2faaf2bdfee722b92b0afa03bfc8ada342094e6eb79d4833af5889b4310fb660115c049912f3e007b255ac83e384df39af223f284caf3a60bb6b9bd89eda02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f51d581702b44edeb6beb32b67744440
SHA1fc746f2f00ed384d6264de88e478b7a4f388cdd1
SHA256aa28b243a479cdac05e21169a233ce3b25aab9c84861ae6cb91567c874d0cc33
SHA5124c5f1cfd36fd88313f4a0d982e75b88976ce789d006fbe8a2035eb5d8ae4078cb0e305ccec2d23099f2f7f093408ef2211e7ac7eae66b297bec02e5ee7b1e227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53101786c9f2bdc86942e17a3424a2c85
SHA1e8004aa67b2f7720caae5c754ac3f97258c0aa3c
SHA2565102f5e12f8650204e233e7304ed87123b7100af27672508b66d21346a01d630
SHA512ff59ee018d4488d75f5838da3eab4cf9166a228374a9cea9f66c22122e24e078d8fce2bd65599ecf462734a73162081174cad5dd902d8f6b4fecd10c4ec9dedd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb2ebebf31e6642a9793baf5eb507ed0
SHA170cbf2625eaa8d90c20b66f22b720583d74ed1a4
SHA256af2b12d305c5227b40fab82326d186f22718cd3af07ecd29a5291a9e0500a506
SHA512b5451f87946e6641327a0ec63a796c65d5b99809ab6527ecaedecd553b74d940978fdaedf281d6b8d47f39c56dab91f0e4a0cc36f4769c15ac3a9fd58e22728b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06