Analysis
-
max time kernel
117s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 15:50
Static task
static1
Behavioral task
behavioral1
Sample
4145f80813e6bf37d29f716a723d2573.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4145f80813e6bf37d29f716a723d2573.html
Resource
win10v2004-20231215-en
General
-
Target
4145f80813e6bf37d29f716a723d2573.html
-
Size
3.5MB
-
MD5
4145f80813e6bf37d29f716a723d2573
-
SHA1
ff9ce51dc03518bc79fb84aa9f5beeef5fc954c9
-
SHA256
6b436d3faa5b3920713649c97b9f97dfba2f368fd482b6d87934651d7107a1e9
-
SHA512
03b124688ccc9c41db93c34af0275f0ce5d384c0e055614b87d81c6cb95b12badb85d2ab428f1576d91858b781690bfc823f31bd2b1c4f0b7eb5f0b54a4edf22
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6Nyy:jvpjte4tT6sy
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410545312" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{00EFAEC1-AB19-11EE-8D93-6A53A263E8F2} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000934a07329cc4d2bffc78221551ccd132cacb4f5befdd0fcba3be2e7cca0e7d87000000000e8000000002000020000000c34068a74b21e942c25dda5c081064a0470f64860eddbf94ff84fabad582e048200000006f7f31a413e2f3d3eb5a3377d5e5bdf82af14b6c8dcf6abcaf54c2c6173e4be640000000d0ca324f8e7200074038b3d89974e24d163455d61f3d106628e15a83f8cd7d74cdbe7b4db8a5e9af232535ecfff640ee8b27d2f51ab7393432d0a74a5853da27 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0abc8e3253fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2688 iexplore.exe 2688 iexplore.exe 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2900 2688 iexplore.exe 28 PID 2688 wrote to memory of 2900 2688 iexplore.exe 28 PID 2688 wrote to memory of 2900 2688 iexplore.exe 28 PID 2688 wrote to memory of 2900 2688 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4145f80813e6bf37d29f716a723d2573.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba53a3d8af60a6b28eb91600bb121024
SHA153107c7e86d6f84c1563303973111bd9b16237e2
SHA2563442f6a42d2533a5df20cbe549c18bc7135513cbdbe1ca8f6ae1e005818b7736
SHA512e5868d73edbf1e980b66a42bae65ffe525b0ff1c818a19bc4b4de2d97e465ed7b738db25133ca0012204223ec081cd6baf95ff7cae4e287ea5aff51137f8a4a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5625370a7b27d78f82fa7a00552d3642d
SHA1e54c9e4976c8a1ff3fd12bd0898c00f20170be95
SHA256bdfa5f36e82d0ded80307de97e9f7aaa80145360ab9ae5f50c667ca7c93e0e12
SHA512496ff59854b08778b0f08d0cdad199caba32d6426d8797e830bd22df5ca314b3f3cc00303d0d5f6658cd9e75ffa328acecaaf0a15b17acc0ec739303d32c592d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548f98ff88d4897f22d94f15032b931da
SHA1d3972b41e254eca9b6566aeb668325fd0f3d37a6
SHA256964b717caf7577377f2807d61b4d001da058b40207df9a0095ec84cf4cb76a52
SHA5126401d50f4ecd3bee5e8fd6e8fb63bdd0877eb0f84d6b5014a965c1b949da149fec381ccfaae072daf7e667d3abcea5d00eb7f66d6164a075fc320c7338a29723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b522ff359739ce1e0dce499a48674f9
SHA1a6f9b638573137080bd7958a7658fa477d851de0
SHA256fdf8b56e3a3f12e2f88bdb8676ac51b2a0ade4e3f43dac21a23c6621c1989487
SHA512f265c216c01dc1d7ecabe54eeb4d0b51672903d69543d69b548a28456ebc04b53cc8e768d895a7ded73340dd8bc796068a966e379e6ba571ccce8399ca34b537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5405d40d7c46afeb0ec6f4a65c69385fc
SHA1875d558404fed9ee26cd91fd02fa834a32bea650
SHA2564af8fe528cd34074ee9fdc03d5f8c7eacf122af0dd4686f549b92d9af67f7f7d
SHA512ba1a84c69832e56a36fef53963aa8fb32743232824218b5ddeb38a41a8881e2c408465e3bab9bbba2fa933e47d322f5ee5a8b18ea7df97c26e172a3de1cebb33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569aa3222e9dae3c3b3da41c50ca64169
SHA197ba3d2113acc92dfcce8f8f543eef4e88528188
SHA25664e87040dd584accc0ef047ffba8d90152e6c24947be7dc7cec85e7e78872311
SHA512256b28086d02aeaa5e0131dd298d249307e23eb9e3ca8cdd9a6e56bbbc9d6f104be0619a5398d5f4732eb5d672dd337ffd5441311b53b6210192a54826a57092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4f514848272341b599a0a1786f46244
SHA12fbe6d03387129315d3260cb2cbc0fc4436f6a3c
SHA256acb77d2818b206661b864b602ea4a7c32e7079dc61c3e6590a0ddae605e3dfea
SHA512dcd7f936a3c4732aa6969758143ebe572d23cbcdac92bc43bcc639dbd980b0c922d17c8a11321bf42f27ac529222a7b5755bfb212f3dbcf183a14c917f84e982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50315502fb4ebf3e9316fcfb87c709e44
SHA105ae5dfb48685695d203d31163fca8fe5cbd1d02
SHA256cda9b5233c2761b6369b50e914a471405f11fb39b0834407a57cb18d42edcdbd
SHA512aaf386076721cb95fa353659c4c7a8a3b472d5c8a22c5220195b91e97f246982cfb92482094969c45aa751cd6a5230fcf0c357c857e4452dbd66dbbe6a1086c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584199294f689fba98b8a0c75a15382eb
SHA18e771d6f3d77328e968c690d707d945979d530e8
SHA25673e0d5bde14294ab746674622d35531bdea092bb94df3a4f3c4f8af4c3c4b636
SHA51257e212370a21b55e7033de74bb59cef214d332f5809d7d22af304d8a53248fe641125e20a30c3f647ef06c0adffe82dd22ddf3bf84bffd359c2cb97365886882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52de2a1cbc74f4881efb14a7c7c9e9b48
SHA1a1bd13bec132255fabd3ffd62f6c380a988e7f1f
SHA256a89e253f196380f9bbc338151ec364c7a0fa82d9fae4ee39f259a03c14c753ed
SHA5124f7411169f319467b6d01de44b623d366861498a2a4307521fcabef25566294bc19ff448a51809a337013b8e87d76a29b2db937c31663b9878c576ae8e015720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b0295c6bfe957bc5384d7809f3427dc
SHA1cefef6bdf5635c94b405b6cbac63c6eb0dcaa81a
SHA256028e9ff491923574efa0ea5abe6e981c1931572348eb5c020cb18c6d41dcd2bb
SHA51218ea7fdc3258257ea4ecccaab4bbe6cac772ac56cc2bb8e304d599e9be601442c5bffc95b2baf9e20a65806e01e03a5a9a38ca209fe61931c8b0c176db94dad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4138cf9de67e66946d567cc030cddeb
SHA138456838f16d04178936dd9b641c53ded09a052f
SHA256f7a88cc0667e870ef7dc7fe2dbf0ac4833734234ae9f20b5f64c35096e56c6e8
SHA512127725ceac9d28bdafcddf7833d8bd86323a33c5677b7c3cff8efd8743fd294d7ae99def335f7ae10431644615bf8f4e3d55fd6e76ae07a51ebb5a7f03271ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b52a9bd5d5f316ab470b0ef33a07f54d
SHA1607bf211d3a434a7897b2c4b21aa7ff9a3938065
SHA256dd339528aec7544ddd4ab1a0607910aa08f75f77807fb64c4874db8343246e2c
SHA512f098973850175b7f7859dd2c8216ebde977f9f579b297785c29ab39f49ed7425b86eda7fae46defb23019c638b8aba6273017aa07a3c8d2be5ce0837bfe15671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f5c4254a798a6b9007c38e167c63d39
SHA1d82dfaa7d895c2de9d17f2b8eaa2c20b0f9318f0
SHA256df9a304444cdf00e73a59f477e7bca8c81b0c600e472b2211718df007fd948b0
SHA51210c7e49d5c943f71751da15b8793a803e4616e59d002c87a8202e57ad83dd71c0d834400ac992ded24f7b524ccaca98499b250c1c7dcf11db5d34f3a1ddc8a33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1afe67c35b3dd6fec7e58c887a9abee
SHA1c1b01be2af9ed8da788fbd6d521b76fc79e2db7b
SHA256e3cc1addd95de091b277f565210c5fd039d816f59437c0baa46bd33fdfa5bb6f
SHA512ba69a5f101482a254d57135cabdc4a0dfcd67573ced01e2ef860c2f0763e9cdbf0ae9c8e82b1a48aec076dcad0063930c918306491f58935462cd8b2e4630ac2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6IJYZ6B5\jquery-3.1.1.min[1].js
Filesize84KB
MD5e071abda8fe61194711cfc2ab99fe104
SHA1f647a6d37dc4ca055ced3cf64bbc1f490070acba
SHA25685556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf
SHA51253a2b560b20551672fbb0e6e72632d4fd1c7e2dd2ecf7337ebaaab179cb8be7c87e9d803ce7765706bc7fcbcf993c34587cd1237de5a279aea19911d69067b65
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LFLWQ602\jquery.min[1].js
Filesize83KB
MD52f6b11a7e914718e0290410e85366fe9
SHA169bb69e25ca7d5ef0935317584e6153f3fd9a88c
SHA25605b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
SHA5120d40bccaa59fedecf7243d63b33c42592541d0330fefc78ec81a4c6b9689922d5b211011ca4be23ae22621cce4c658f52a1552c92d7ac3615241eb640f8514db
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LFTKP12M\beacon.min[1].js
Filesize19KB
MD5dd1d068fdb5fe90b6c05a5b3940e088c
SHA10d96f9df8772633a9df4c81cf323a4ef8998ba59
SHA2566153d13804862b0fc1c016cf1129f34cb7c6185f2cf4bf1a3a862eecdab50101
SHA5127aea051a8c2195a2ea5ec3d6438f2a4a4052085b370cf4728b056edc58d1f7a70c3f1f85afe82959184869f707c2ac02a964b8d9166122e74ebc423e0a47fa30
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06