Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 10:09
Static task
static1
Behavioral task
behavioral1
Sample
48b0904c46519cda8f0734a98b9ee311.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
48b0904c46519cda8f0734a98b9ee311.html
Resource
win10v2004-20231222-en
General
-
Target
48b0904c46519cda8f0734a98b9ee311.html
-
Size
28KB
-
MD5
48b0904c46519cda8f0734a98b9ee311
-
SHA1
e990a773e5152988a5e728446aeacc0a45bc5269
-
SHA256
e1139a227835a47e3f31c22d103c76ff3b268486fd57fe99af76416355da89bf
-
SHA512
e4faa3c2236e6957d9fc72ffd90e47d6a34a7caa0d0b6b595c5e4f1d263f168de6dba787a43364dcb847577be5af5c7e6b1fe24814f3f7a7fff532b40042f1e2
-
SSDEEP
768:Zcd9QZBC7mOdMMppC5I9nC4ZwAwXwLlPd:gQZBCCOdF0IxC8wAwXwLlPd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000c2f3703d8a06430b0a8dd17d1b0ed459ddfa7febe7a0a429dc62866805b3a3d2000000000e8000000002000020000000309570581aeb85c50fbe81f8fc929ab988e9a8fb5ae802d1bebf287734d8b0bb200000009d09884daa1e77909a22912ef2a2016d8d079f33f8860508b2f7f514740da50c400000000fbf35cb5b72631ea4b5118fbf2a24a77c82adf56db7aaa70b1a6f3c3616ef18564b49406dbfb5b6136eb7a7d326bbfd88502658c257e6f4e1e70cfb60b656b4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410784062" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103186bf5141da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000009eb6a617106088d1fb349af276fa7b78768055dd5df9561a2b69bc6a4d886dde000000000e8000000002000020000000a30b3b461626f756ec7a2a96a5fcb3cac8997950b9a4b52c170ae59716f5a6cc90000000629e494371ba332c0b5290215625d88ead89a7a8fc74645175f4981c51ec5f77ca95cf8aec4dd041a8880e57fae4e536e7072d7d136aad3ecd73537bdb137430396c3c2c1fe7aaecda01b6b841e423d642dd7353d428ff97c3be15584d4a98a1bffe44f0a1b45adae9387a7bf88b58b77c956c2f67eb89a17aa05bf5154af3e06d627e5550700ad96286b606b33692ee40000000c12e4e99867814f07cbe69d14f371ee9d5a4e74de4d7c8a2440cf865e556319b28711ab950bcdb269a7a0252c7c550f8fc15ec4ccf640ed3a484c0848b20804b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF410611-AD44-11EE-8CD0-DECE4B73D784} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2744 2088 iexplore.exe 28 PID 2088 wrote to memory of 2744 2088 iexplore.exe 28 PID 2088 wrote to memory of 2744 2088 iexplore.exe 28 PID 2088 wrote to memory of 2744 2088 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\48b0904c46519cda8f0734a98b9ee311.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f6c4c5726b3bbef187225db58280b34
SHA19e338fcadc61a0481e9189e1bf875655fa672e1f
SHA2568845b1dc4cf3c2f648a889ada7c097e400aa7ea62348d55148ec4c327dc92616
SHA512443e3b2c82b6f9bad05e8d1eccae90d50d35d774afc97cb74197052a9e3261af43cd7ed640d5fc92f59629baa3fe169170ef54d1eb515e77bd84bcc65ab0cb09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536f57805e49547b546e28363f27c847c
SHA1bcf76bc59daf0e0ce73b682bf1bc3b73668cc76c
SHA25604b56b3dc309a9410a38fc39fbd6373c82e2f8703e969368e64345bbed8d1e19
SHA5129f92488456c302d0a66f005cdce8cf831146e08ee84f333bc4e334f12d1295e4c434fe570f27910569bf99ea96d94e8f41cbf254435a9dfb6c1bb8cdc8b7bc4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515b7d451da93860b922c32578efb7edf
SHA1f13939c0b55cafd441eef2703e5335e4d4c392ac
SHA256451d5a872fc41d9e8f66b5cee1199c0a47d31f459fca41a8437679636bca4831
SHA5123a75dfe8df592065a7e3f744c367bbba2fd678b15d286800d896d94e0b12119eb3dadfc175f714ca44c4eebae78a10bc120842ada5c488e7c4ebd5ce825c0b9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcabadfab71b45ef91ab7ea8332791f1
SHA1b1aa5b368e187d2ffb7b0aac93d8cdc3ba0257e4
SHA25645471f09125fee6092c680399f2b06f57984221c56d39c4dc5fef81f08687606
SHA5125dadc8ec781e3193085f583309621a76d3575dad3b88bd3f25eab9e321fa5672aab90d893b416c9ac8be535a9f23ba2b4af59540f66c212fdc6064466a68dc92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d0a4a288172194eaf9a56a241a15494
SHA170d9fb15ad2f28df1b3aa407b9287fb5ebfbc3de
SHA256df03d31a90521cd9f4cade4f820d686a49057ae05302f335ea5d39f1d3ab54c1
SHA5123bfbdf3fc55bae4c1500881942e0a78b5791edeedb5c55961b69cb54079d3dcb02a9e6a8ecb2ccc3ac2251d0503e26fa769645a4955e783275b39fcd6e00bfbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571795c7d6bc66cb7c142515596444117
SHA18a26991f9090710fdf000ed7cf0c63755215d6e3
SHA256c82a7f005d27f7e43287e11240b5704c98a0a34c92fb8c2a836565f1d9cf18b4
SHA512edf8c0e7202a4ba5e302608b432b613f5f97f347400cea4c74c0b4f0748e22c958fbc306df3d0229370e14d20490e056e8faf3dcce661bdff3e725f94a1597b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56518050dcf4a724e6a555fc91afb1472
SHA15f27981b278ef8cee3ec75454542827d65a465bc
SHA256140e9464eac61fe6f6f6580b73feff3b0110b31b793e3650ed7ce52887bc80ff
SHA5124bde255e8e1dee14a064cc32a65b2616a08b34bcf3c0f37b7d6d5298788664e5e6fa60c49b1118d94ffecb5da7ba37bd2d4d6c742bd2e1c60e68363b28a0c0d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8e5b98ca5e0fbcb454cd756c0bcf847
SHA19d9c20e1a3ef913a5e445a701e32a8e11e9eb208
SHA2563719a93d306b4258c498ada35bb0512aec4d45b04f40d1d5a822f64732e38bf5
SHA512a1a03efe598bd5ffd445e26b5f8fdb396b4252d7d0e37d78c88c659985519ee9aed2620390dd07fd6076ce041d9a950ca97a86c3b37d67f3e379f7603269895a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c38fc83577e2a6a80f6fb60967b927ca
SHA102e22e191f88661b29dbf26b915723cd9b92478f
SHA2568bec7e20f1fef9def016a40963c59830a21f5f9c93892dc4a7c91b269777f236
SHA512ddbe88d70a1af51fd7efc33f9afd8a8142cce7a0de307867a3bf8c3ee1357c761b9bd02299f3b2ad346218f354758e9c51b748c7b31638928343ab6321344542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52099e98cd2707672da17229dcd32564c
SHA1db43f0475f56f0e5159bc98f1b409301f5f613be
SHA256ff802969362268adeb4c3c657534bba545f1eb92ae24d938628fc91273d00b73
SHA512f2a0b67cc0086e6ef8555b71091ed05eb700410b4483e935de6730825e27cdf51f57b57c81cebfd2dec7b836f02d5fcf5c415e4b7e9c99992189fae3fd892c8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529f380dbe99b8921cb1e169058f31481
SHA11dc78f9d409bebcd39b2cdac0f11861ae7b5691a
SHA256d089acac4981b986d1af949b58b77dd6099ebcff07d8eea06b1f88f5a0117a48
SHA512f40e2d641a209734170764b0fb45469576edbf90205534bdb17fbc1c30f8304b11ccf048df2706df0b0d990dbd9121edf0e89893e8b41f08cbd9717dabbf8dce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e9849662013e624cdec3fe05497cd59
SHA1fa7f1410681262a718905ba40355ea9f81cb25f5
SHA25653a26b0ae3215a91926f500b52c2f44a27519b3d364793931c2514f4bbf897dc
SHA512e44e98b2ad8604ec228be9d5c73d6836c490dd83aebd9e2ba74d43f0bc7cf81ab3e69b6ff92b0311397acb845639a39c06bb84ec3d58dd318f0c57c1e713487b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ae9fbf5f7f72d282dffb0c7199fb6f6
SHA166f5a4ca25a158d098ad598340c5bf2d1b4484e2
SHA256792ff8c478de6fd3da73484c747e357cfed8608b3ce4dc1a88b5b91768fe5bf7
SHA5125bf25c294ce180880ad989552159d5e8996f42e862540d9460adbc59d5fed8c32dafd1c60a8082b0bb28c766f1a6abddf4ca220fb7aab4ad1ec5a99e3670844d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e890d073be1f8cdb58aaf6e4c1abb6e
SHA1aa802158313724edd1e7a25ad4562b49fa6ed31c
SHA2562bf35140e58c702f46f700d210905b9f10956d95a76045d57e2a783026af106e
SHA5123c111443114fd7dedf77adffc94002e0cfd6dfb7ca2d349dc34ba0f7f7c11c733ca05a612581354b51f647ef27accab9fcfbf6f53b7942621c36804566d4b750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d373f1152f2d41dc1ca40ea582e086d
SHA12df5676ae2a90228f8f75d670b95a4b2cf6f764d
SHA25646fc84e742b67c70191ef7ae929c77987ad4a8237f6f1e311817545d47adc3f5
SHA512daedc30b68341a78e5f7d434f78058369c42de7da9e3979df5ed61dcfc3a0f1585724830548b071edad3349b72b7ee9bf0c76f0d50190860c4323cff898015ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7a5cb1643d0d31d1c201e5b53299b86
SHA16dd0cdf18c70af027abfe06e09378b511f6a825a
SHA256ca525e803ed19c7ffa3607ceceecccfc4b17d94659fdc50d2bb5372ecf3fb48f
SHA512c0c98cc2904c3456bb379bc3e809430126f6e1a80b12de5235eca81f74ded3b0f9f76839adab52d8266a82f4e336b3ce9444d2e330061abdf1b59db4ce551a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7826f28ab3e1a0398839b39d4abe3ad
SHA1ce1f49432fccd1df56befd5d3f04044dea25f8df
SHA256ac5fe1ea5c8feafe4a29e5c6bca3ddfd3493e29c450d40052ebef9cd0919a041
SHA5126b09a30825399518f3c27209fcd48cd6917b99b833548bf5cdf53c87ef315bbd64c9160bd8926bcd633c31e33d40b95ff8d231767d53b650e783a7f17a0e8108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb7df632cce121b8a841525e41bb6835
SHA1ed1c128ef119c227b60acfdac67d0a35095ec465
SHA256e4559a0c8e9048f4af608fb7cfeb88713c773aff42206c7cb9e6d639bb57a631
SHA512f70abc7715b3ad94c897821b638529665af7c4de87020e8ff619b5be85e3e612fc420e44d0d2befcfc77606139a9487a422ca4d54eed256d796207a209d2cff8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06