Analysis
-
max time kernel
0s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 13:28
Static task
static1
Behavioral task
behavioral1
Sample
3804f7e86137e5ff8714148bea240ff7.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3804f7e86137e5ff8714148bea240ff7.html
Resource
win10v2004-20231215-en
General
-
Target
3804f7e86137e5ff8714148bea240ff7.html
-
Size
87KB
-
MD5
3804f7e86137e5ff8714148bea240ff7
-
SHA1
3656eaa801198659b4c0466e6885280fd1d1886a
-
SHA256
63a81f44eb5616756584188e27696d6e7428882acdb1f5c4c48968c5ae9e9006
-
SHA512
c54110f714976007a04dd52c79b2a93832f794c43109003aa790fbefd4d0bf109df2588ece39a3e1b2efe15816da0cf0ddf0b83e099658cb0903065fe70b2c40
-
SSDEEP
1536:OrbGolpU1zc81QP9p6wjMyzAjri/hP//iUQpx4J/ZozbGBj72j/Bj2EjtjuuhZ8m:OPflpU1zc81Gp6wjSjW/h3/ix4J/KzbT
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2CF06FA1-AB78-11EE-8857-46361BFF2467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2880 iexplore.exe 2880 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2772 2880 iexplore.exe 18 PID 2880 wrote to memory of 2772 2880 iexplore.exe 18 PID 2880 wrote to memory of 2772 2880 iexplore.exe 18 PID 2880 wrote to memory of 2772 2880 iexplore.exe 18
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3804f7e86137e5ff8714148bea240ff7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:275457 /prefetch:22⤵PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
889B
MD53e455215095192e1b75d379fb187298a
SHA1b1bc968bd4f49d622aa89a81f2150152a41d829c
SHA256ebd41040e4bb3ec742c9e381d31ef2a41a48b6685c96e7cef3c1df6cd4331c99
SHA51254ba004d5435e8b10531431c392ed99776120d363808137de7eb59030463f863cadd02bdf918f596b6d20964b31725c2363cd7601799caa9360a1c36fe819fbd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5c709b4484eb3d47a0e1c30eb4468783f
SHA1180ba5e901d97ea7fbfb146c482ae6ccaa93e0ca
SHA25677ddda433e6a6472da4b40bb866404196e651ef17d5e98667efce3ae13c0b654
SHA512d72479845dfd77081bcc7d42d601169adb68940e3c3bc255d8dd5bfbd7e3a8ca6e7beceb714125f51421c6d190ba70115ab32ac5e3c1851555d886cc1ac8ccf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4A9377E7E528F7E56B69A81C500ABC24
Filesize176B
MD597e07bb98f2e76e4cbcce1e70ccaf8fb
SHA17942f9d16fa0595461f779ae7b00ea5fe0ee9595
SHA25660405a05f6d1f0e61bf03af0ed5d2557ad38ed8fe29082d61137b67fef998ef7
SHA51219c8117fe9c635345736265528cc573ba1d1003038894fbcbe3f52f0db7009c89fbeaafdd613766efcb1e6e2b3e8418f73ea00257b2e31113d947ad6958a10c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4A9377E7E528F7E56B69A81C500ABC24
Filesize176B
MD5d8debc140984728ff0ac03634b5c05fb
SHA102cf466adefbd8e67b179386474545efbaabd901
SHA2564d08e99e8bcf97dd0d2dc22b400c39f0c992a4184e267bc5cde0d170fd6e9f41
SHA51205b57c7d02ce72f2e2f9059b4e2e347ef1eb58463502cc193d5dd2ad1c0fb2947d1e8c57fd8bb0bc047866a687701cebd3555b3e8d6ce8ec0ba8701cac6278a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae177777532be8c92522f5444b2c7fb1
SHA10b38a0644f38a01da4b7c55d1a916a98d0367b5a
SHA2567b63da5cc3129b9187a6d34260b86834e7455eaeab9410463997b01c11ade877
SHA51266bbc1122524dc56d13cee46dbb0a14c0011a0a7fe5c13207b4cb037e621ed603276dadeb648cdabdf26fd224ab3f004e3df1a8c886e5ed56f4f62f14af7dfa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8fd0666c8eaea75e875de7ea1efc5f4
SHA1a97bc443f914824194a9a98189ffce58f425b678
SHA2561df4d805e8e4fd5ed602ff3a615f5152ac5284dcdc5813cf8dec07370bbebc4a
SHA51267afe3e02dd8644f54422ed8f1c19c5559171fc5ba0ecd4d55c2011ca581ac4654f9f85fd6becf9d4fc601db7920d826ceb7ee31ee7461914df4dbd22b855f45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f4e7a1087ec2c7f9f0ce2a337bbf8a3
SHA170643eaecf2dff3c2d7c402e1e9fd4c0a7a41bfb
SHA2564b2424f58bd4f4f24cdfc08a698cd309123c4ddee1eaa04ebde089d43c71dda7
SHA5122571d14282b019b43f121365adb8144d0720c69c3ab9fa8542ecd5651a96c5243e5ceb2a2df0dd2232df56f82b2a9007abc92db7149d5079abbe2ad58c5903bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a1e8928396b026328c8cdaf41044196
SHA19163b5c4b322c5ffa7a7028521a9d8dce13e1f6d
SHA25651b1dd352d0af2a4eb1759ccfe514a2f7cc8b41efad46a10bc33b78fec16bc2b
SHA51270e0bb5fa0b833e22fb4b963aa3411c06cfb182c39988387ceadec570cd64498eb167cccd89bc09823a718f0011d4f658bf718cfdc5718635892e9566fb8b7d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528b23930fb1fc1294177efcbbaf6037c
SHA10ccfaba477dc6d020fbffbf91b32604bd2ef4f73
SHA2564f8e692c49d09f41ad1282b7ca888b5dfd5885b3fdfe6fd293ce980fae6f409f
SHA512c917e227aa9929ad88693af93256e6e7f4757aa5c9b5d188948ab7755877b7e3d4b334b5eef52b82502d9b635d73b4f888f43e530e0f41f3bbc613a929279257
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3d7f9cd99c64fbacba728725d657270
SHA1d535ffcac2e10cf4bbecee1b5700db71b6d798d1
SHA256d652cddc4342b1a42395f97004184dace85d40c105b1e0d452e38a125832170e
SHA512560c57d29ec682de6c5032201a18c63934ebf7ec18c6a30c10e0205627c080a9ee41dda23c9b0dc3088508c9608b6b7b472cc9a38e6ff7d55763edb509897c78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5276bd8a72276ba81ee19c7bd290b8992
SHA199b7f440e1d5228443455fb3ed588a55d91581cc
SHA2566d8234de916132f1eb77eb32c316991186f8e96b28a2880856f3515b19fa7050
SHA512b0427112b43e2d7fc4de82ea4b07aaab2e25d9bb42d52e0d11f4e890a995952f1133537e22169906f3f15871b6cadffc5a4de9f86ad37e7f2d65dcf6104cf40d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a139bf969475b98daf7f7deb4973c999
SHA1ad83a3a218be3f63feee1e792e42f3f9781b1698
SHA2560bb50095de2a639acbbe6908364c0e5266198e6f7d52f6e53a5d2fb818423e64
SHA512f1ff53ad7d374f11338589a5df33e963107462ef2bd4f7e97444f3f91fa1ad70e868faf808b8d05e7770a72ba207911082ea5f96314644ba7637409ac00f644a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b7632efc3fda88f5e91d5b2736999d4
SHA1cde7598c036169a0c8b3ac16a255b4ba192a7e63
SHA2568c568f191bbdd119a3351c0bb78cd1b8800ff13c9b2ad41634022505b4702447
SHA5128b4599d444331565bb4b1113efdae933a459e82d59bca8243fb59629ed81a3ba9140d6d5dfeffe573ba3c7e91b028cf4bfaf45b6bc8ab7835a9e9b567213a2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5962cba75e65defa7dc0cb3f9b430887e
SHA1206a83baaf928e658118f4e4f02071dc92b61c8f
SHA2562e473292c2612c3d65297cb80768e2d5ef7ce21cc13477b0a1a1c55f5ab0ac68
SHA5127f36dda385a176551f9dc5ebe7a95e5a99cee0cbefa0dbde8d00cd38ef94a807c4098bc0278ba464222470d2f45abb3d798f409b3fbcb2c9d6ab616008dc9d81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c05b4ffb5fb5d3b43dd72c4291bb0c80
SHA1dccfc246236165e0b6b2e8290a43fbd5aebc3267
SHA2569b3e419272122065f09b66c1b51153d9bd3a85a344e8c5f28dc80be2ce220ad4
SHA5126e11b4d8ea446f435b84437d0260a389920146a9e66b860f49b074bc1c1c529cec7f689010ff5d6d414cb7f9ddd41e6dd1f821a602ea2f9c100236aa3a622c6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD54ed62a1f92f3cec91361a425e9be71df
SHA1364888bf163b0c866250748f2bbc071a3fd11d73
SHA2568b59682f7d99944fb82e5e0e32462a5380449dea9d06995d25be90c3df461a99
SHA5125407cc362c2d40a650bd88200ccf6a8f615ac036dfa18445a53fd76a1608fe48ad33be2e6fc6c336dfbce34a305cd17812e20add8618c4a862a9d297d361d38e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD548a7d1ed577625de05cc0fa83dc73030
SHA104607f3fca2b6d192cdd98ff93939dbeaa5062fa
SHA25659b890173e762da2c30ff913cf0f2907e3ca12de5e32885191041657179a688e
SHA512650755c235e997ca839a9b5bf49883def1f9cf5fbd9f308c499fe5049f8de7976aa65c55ea13e386a77fa72239ffd47d0bcdd89121fc64da76bfdf8ce574f7de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD59e5189971749bd6a58d2cccca4e237f3
SHA1a3f5a9a1e59c2f45fbb760310879866a03169cea
SHA256676c436610d29731002bdb593304a8fe9aba70524e7aa576ef5b5ca4e2ad27ec
SHA5124a97cb20a4af28d249f45cb8d14adc41040a486bdd92f32e392ef5706125e5ef15d3d87d1784d074ac3c7461d6093eac330dd4cf58a8bea64178b8bb5b29da61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
1KB
MD5c2c8e46452015770f5984a636635dbfc
SHA12117f954a4a5dca91468609fad194b0e0d4182a3
SHA2568f034050c63d7d40722747479eed0de6ed3f14ab072730856dcf2a3f6528e1ef
SHA5123addfc0834aed6813ef30f0c652beb6bf6352e39c7a7f62c4a0cd30897d4134aec872cf5f5c516b5c954c785b8c48b0f7eb6b68152d4dff1b85b0932c8948cb3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6CVH4O11\favicon[2].ico
Filesize1KB
MD582822569cee4869fcc405bfb6a35a2aa
SHA18cc8ef8a43336ff147b70d5a4a722620a5b07fa0
SHA25600f1007531a28a771e3ebc0dc64707f9699f9444d88576b96867f129e2c6e618
SHA51204d001d9d8ef6a39adbb15cacb6c35d1f7d550a9759d1b07dec3437ad2261797b8d250245c3aa841634ac1c6f9fb1b2ffd2d66c203cda4a776dd1d1e2891880b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\C1DCLRVV\plusone[1].js
Filesize56KB
MD51944af3661da46249991197817b6cd8b
SHA1f952df40ec79fafc7c798f37aff92878977376ed
SHA25663326a1c4e0eddd3501f0a064b06a2708eb0362f3ae934f53145978d3d0799b5
SHA5120bef19b32be337cfba179ed9ce4533a207cfe645d2e5fe0da9fadc7b01c72704fc89749670d1ac48b8d494675bc62ac089fdc4d8495979226f10828225594376
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FUINHLMU\cb=gapi[1].js
Filesize133KB
MD5288c5ba5b7001fe841c32f690f62cc93
SHA129aba9d8e4f7cbe25fa5e64b9ecbe256e51fc789
SHA256c2f33dc18eae27d4e878bf837dd97f1bde5151e44b0271408535bb93265b8c52
SHA512e375d41344a086d35accfb02bb1f91e2dd383db032af387fc3d6b1230057cc5e432e9b2cdd976e51425b4f587391d42f4d9d857c2e6f11e822a65edcb85f1c9f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FUINHLMU\jquery.min[4].js
Filesize92KB
MD5b8d64d0bc142b3f670cc0611b0aebcae
SHA1abcd2ba13348f178b17141b445bc99f1917d47af
SHA25647b68dce8cb6805ad5b3ea4d27af92a241f4e29a5c12a274c852e4346a0500b4
SHA512a684abbe37e8047c55c394366b012cc9ae5d682d29d340bc48a37be1a549aeced72de6408bedfed776a14611e6f3374015b236fbf49422b2982ef18125ff47dc
-
Filesize
61KB
MD57d57648fba2bdc3953652b6b9157df9a
SHA117e9ea79bcdaff6eceb99866268e5700c57d84ed
SHA256f8fcd2185de51912c27de66fd5976807154c8cdba334c3144b4fb137b5aae508
SHA512dda923c6a07341a4255d31852299652e6183ec5680346f8080c04c1a67f224f5f7b8eeed0c464c345847c8178ec4575b45ac448f5728c4666ef13cd15225ac49
-
Filesize
83KB
MD5833699a7683bb594f681d7f07c0c15fe
SHA12b4af4e72ce6e485e9f2ccb277a3e8011c537ab7
SHA25675f76de373308dba90ef7d9cd25a70fc441d01e80bd1e67de15a1bdb180d5381
SHA5122f7fa898992ba6e7202196e85808abdf37440b77691d48cc5c7ef3b100d78fd099252b6b8af9a6f0b74f397606a14a48baab949e29163a691de891da52c84c4d