Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/01/2024, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
3e5b0b4d85216f19de958f9ae1d591ee.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3e5b0b4d85216f19de958f9ae1d591ee.html
Resource
win10v2004-20231215-en
General
-
Target
3e5b0b4d85216f19de958f9ae1d591ee.html
-
Size
432B
-
MD5
3e5b0b4d85216f19de958f9ae1d591ee
-
SHA1
bb87dc8373a5e53d2ffd8a337f1a8a0ccb6d9258
-
SHA256
95290b38ec3ef18ce4a533702ae84619b4ca5257419d1edabd3f559eeefa6751
-
SHA512
85cd2962f53419c36b0d72abf5578ca0f9a499487a914781e7d51100cf570b4fbdeedd4dadfd8ce6e611f851be7d09964127f42f627092c993e6a0bbf13cc705
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 106223751d3dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000b31676d80d60590f55a547a6376e7e9923c123781d83f80207e4d9b78b16c17a000000000e8000000002000020000000ce75a990fd42195f48ba0539b30cfec7e12d7890b2c8ce4a87a2eaad20ea79782000000045eaaee5e56f982b4553693e6c48b43d1bf2b6e933d1ce991153ede6a464a96a400000003c3445627fc73df7805a6fe2b6026f5f76ab6bb1679a9a155f5db3e964ec97895ad908eb695582109979115828347aca16520dd2bebf94f6fe450e4f1ff1aba7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410321834" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B00AC9E1-A910-11EE-A4F4-42DF7B237CB2} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 iexplore.exe 3016 iexplore.exe 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2028 3016 iexplore.exe 28 PID 3016 wrote to memory of 2028 3016 iexplore.exe 28 PID 3016 wrote to memory of 2028 3016 iexplore.exe 28 PID 3016 wrote to memory of 2028 3016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3e5b0b4d85216f19de958f9ae1d591ee.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d3a24fd7fd504ea46c0c0d7c397755e
SHA1839ba4e337825788a37bef144459109e560d1078
SHA2560ff60738847de39fc41f0d8fd2fff0ccbb929406f2a792b97aa43ec5b33a35ea
SHA5120d7b98939f05552f248cf22b3e07fad6d5b00fdffe710ae2842f2f761943f36197a93654fccf6f3748a172f9d2bef378776b53b82e43661d3704aa66c2e4a44c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5477249188e14758de1748206c4b927fa
SHA1ce111c09c78df1f4f9e9d12e41210544bbbd4956
SHA2565871fdb7cb72ef1db724e7e501768040972902ff4692121e4cdf4319d7fd0e91
SHA512c37e125ddbc455fb27baf623d48f2d6c9246bd6a108784f41f29d4d8ef94a287b77508ce2569d5433eb64447610fdb1bed6cc87c8fbe4652bd5364696ffc25a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511806e4714a2ffbd8b92acb1e7777d09
SHA10ef800d30abd35f78c92e11b82e5fbabba50d28b
SHA2560a0aa1800ffb942280f017f44e495ba33f1a4992b979d083165206665387a4cd
SHA512f1cd4763af1aac23c559365cde16166af88bb90533c2ffd68239794975680a440e13d4d148c0e5d29ded4e62c8384350e38872ad35b099e540e04a0135af3c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55084f8bdf8dc872c3b3469d2f296b428
SHA1e6c74f19c432c6d06b1b8b3d6ef6ccf32e5167b8
SHA2567ccaf08085e8887fc3e5fb20a596ea577642f518b0db32f4ef019d3810cf581c
SHA512dacd4ee5a3a4517a39024f1bdfefbcb9277fb3d8405802602c46103cc4ba22e3323ae2742cfd4f5935d42e1688abae3b8445900f1d71bf28d49e770bcd567fdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0ed731030bcce63012e3413a3fb6ca2
SHA16c11f62b3d1e27cf48474771c38763db8d033916
SHA2561415ae734f5968bf5dc09ec45d2dda0620291fafb0ff277bdfd911f409f8f18b
SHA5126b7c33e23d616f199fe332ede7f05b6a1c60088f2c8eb17a6649b9b20c6c2eaa4f887a093f37047074a0d607bfb9c22dcd699e497b42fc2857b5bf5762e5a52f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553cbe6a3e7b19d650d1a87a5069fb622
SHA1778085a8be93127a5baaa3e4a0fc237e697cda5e
SHA2563d3d386255ce871cbfa8df5e5d08f65116eaed27984b9e36521c3e92717cb4f1
SHA5123478ad50049b025a42e1bac06e95ace6503fff96562661bdb7ea881b76be3ece66dd8b1d795dea04d567dda0514ed1e8bbf1ac212a01cdd0a1b6a1f3ce5a6dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e895b3554fc70590734b3cfd1c62e618
SHA1583c05d07112a9101671bfe6df95c3c46ee7eede
SHA25615983ff9cdae25eaada4629cf9dad5b3fbebe00c35158e49654b868143c301c1
SHA51292dd9ed8216db899188c8da17999b71722435a557ff58a9f1cbab4c3810396562f1ea75eccee0a98b1573de08b90416f54d7e09cf6c527a5daed7efd07611a4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9f5f24f387c8173163f4630858771d3
SHA1e7040a12a6ff31ed2cf5d30359f445de858f69ec
SHA256fc0c449cffe614a4eba44cacbba11bf1cfe7a7163433b8e0cd80f9d38b7ee8fd
SHA512c8be8b1c2e5f243693ffcdb0f9f72c07ad3d266b3bffdee0dafe95e69cd6cad15920a353b82fc401d06378ea1f61decf18f5e6d9808727289993c15e3586762a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bddf200f4f84daa2a6fda1817457f255
SHA1f338c53f2dbeb0245317aefd8cebe53adfc1666a
SHA2564176c776297e4c2a7a266b05c1f82e8324440d0500a36b79aeaebfde703684f0
SHA5127a77a8088a717d65b100b611f78ad7e740a4336dae4af7af85eebab43655710a333b16c0c2db2c1b26d591dca4771f3cb7609a3632d4ac00e37caa374773b0f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5085c75b985fd2febb32d0ec8e754a0a8
SHA140bf7e00a00aadf2863846c103d474bdce655204
SHA2564b41ab8461848461604b5a45849477e240cdba27cb6e7d0342aa863e60b79308
SHA512bc41d36f905a228827d216ffe1aa1da27a687fbfc1bc83cb785d0b99af7698db0fd7c71e024cba9225547a94e7754e4b1a1c4531c8bc6d16a652ef633d83b551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b44fbab594f8e65d921251def6395d4
SHA1033c4690daf04c80a78ec1bd39ed6478f4f56be2
SHA256f9d2924eebf515250f467621420bc00b4a7f4e29242202843756f537b8b645f6
SHA512a1a3a8472d28707c5647b2b22b0e2c69d45331fe4987c66060ce766a35ebdea92481fd1eb832750ed71bdd2064395b5e91f356eb1d2fbdc6466c3faefa20a842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50140e7899acdf3aafdf60cbf02330e43
SHA1433fc0218ccd53b113b5a5b297cae96e17b1c7dd
SHA25693bae6c31a2c060b38ce0ea51e8e59946e2fcc3a6e4eccd09bd3e43636c6af1a
SHA512217f5bf0af40abc03b414427ee5aec66942f924d6ded548c923b42932b46f117e394c00d9db814822813d18239470a6e57198f9e67b82227f496719309360df6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513d1cd08f47906c220d1694b40509e91
SHA145f7c0132e2b01cb3956a4610e058d0fcbdc5091
SHA256a9705f33a05b26e8796ca9a7efc897abb28e6434efbd2c571edc719a686d8df7
SHA512d2efe38441ccf2f3df712ded4e9745eabd40920377e31d0945962bd388562b45a00f137433e9b523d4a04e1cb2f78f16ca8fb8d2e46371edb8c889129b024c09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5293afc3b3eacdf38b68b835cd8f95ab1
SHA15af828d8a16a2368715fc743265ea06634695601
SHA2561cc8f9c8474888ba180aec8661bbe18ef2e1530568dd82ea7937e9c883c217b2
SHA51281b1cc7e9964f82cc7263f76a75986e490343748214f4293307d6a31126c6fb1c71101576892443f64cd8083a73bfd8346a70c170bc1af840cd38ed2c054c6ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dc127969f4a69d422f515e77ed25b0f
SHA1cd5ec029fac08cfa4e0e6fff905a9de67798c769
SHA2560ab69163f63725ae27e90f85322ae63f52955776d30c31af577f50d844c6a120
SHA5124fd7a3d7e8afc7f51ec233bdadbbd187f242771e0b32d70ac566efba1e27bca104e324ac1a637fadce9d61199d5286770df4e95705bd7aad2f3b6152fffce550
-
Filesize
1KB
MD5b281c35887ed876a6bb7d18465cf0ac4
SHA10b71af3f5055e64d85b8db67c6625dd37ba7c88b
SHA25652f2ecbf109fc3bb0001a2e64be6ffbcbcb2c3b3805f7ad4c8427347c7334a7b
SHA5125d86df2a5021810f4b5cde5e7cb1878512bb689be519b6022b30859fc4b41d66409f9fb696551c4d2696793a9059e80d50bd9880f18446a3e1a6de38e5bc0643
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LFTKP12M\favicon[1].ico
Filesize1KB
MD591abe01116ab422c598e9c8af72cf4da
SHA10f2815fe8e067d48537ad168225ab4674271fa27
SHA256b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc
SHA512a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06