Analysis
-
max time kernel
130s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 10:59
Static task
static1
Behavioral task
behavioral1
Sample
48c90c61a8168aff0e9ab641b878d1a4.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
48c90c61a8168aff0e9ab641b878d1a4.html
Resource
win10v2004-20231215-en
General
-
Target
48c90c61a8168aff0e9ab641b878d1a4.html
-
Size
22KB
-
MD5
48c90c61a8168aff0e9ab641b878d1a4
-
SHA1
aa1c1afa7d46130bde19a71d04e368a08bf91101
-
SHA256
049839c3746e32677c15d2711276ebd9448618b28063886a26ba95979f7f4346
-
SHA512
096660a7a22205198dbab1bd51f3a8d95075a428706b7a09d84cf2020b7bd39edf320b9c0f0873037cd8d64c39bf4901df9424d84a911e2c70648efef16b124e
-
SSDEEP
384:SAl14I0xV3t3asBf049eTZk72QSSQGYPHDl6haXrtz6GnuZLM:SQmI0xV3t3asBf0CeTZk7SShYPZ6haXp
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000370a57d0eb8ddad9fce804e0640a22f04f1ec55497f90f91782a0f905c3bfc2c000000000e8000000002000020000000060d3ff46599559a994041ca3bd1070baffd47d110fc1d5f76946238ed6fd82f20000000d212176a8b71aaf1ce23a1a1fa56de6c3796e57b7e6786803b0c3b0f4920edaf40000000a9e0f9937e5f7b5eea9a4d3e7b73726dda4f5ce6253581c2bb0d56139113f6247056f1702b884ec815078ac51aed4d83166dc4daa7f1ad27d255debc65331719 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410787050" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 602f20a85841da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC73DDD1-AD4B-11EE-97FC-EE5B2FF970AA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2424 iexplore.exe 2424 iexplore.exe 844 IEXPLORE.EXE 844 IEXPLORE.EXE 844 IEXPLORE.EXE 844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 844 2424 iexplore.exe 28 PID 2424 wrote to memory of 844 2424 iexplore.exe 28 PID 2424 wrote to memory of 844 2424 iexplore.exe 28 PID 2424 wrote to memory of 844 2424 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\48c90c61a8168aff0e9ab641b878d1a4.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec8fe6f7f4c2d60363aae2cee2f367b1
SHA1f9e7a234cc52b2bef4f6d56997a0ee9aee48aa04
SHA256540b8adad2a4448910a873f194a35172cd0142b3d63193018c7dffbafc3f4563
SHA5122d270870d17191b7583039c078f25cd0b95fd71e0fbd56f290a05ee79023579a6bdea0aab0b596c920e5365eee28dd78f41c61cecd4f097790a95f482f82a547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3dbe6d548a5b8ac6854fec2c03318b9
SHA117057ebf3c733ee99bfbb800678bdf1963ad8b14
SHA2560688a384839aa012a8012448054c8a72f0997273f5010d9714a88038e6ce7bb7
SHA5122a1fc1cae283c1c4ceb72a11ab0925c49a38179448cf262387e835027df6f0c4ff1f6b6e81bd69b25c7b4713aadd01c4857a73c8af80d9503d9583973ce8e163
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516d85e225b1a6b6b738dd52dbfd28387
SHA1451bbdbf37dcaeec35b459de3bdd859636a0b92c
SHA2560f102b65487b24b411cd788b13b8011c03be779b133f352f12a0af0aa3464b9e
SHA512caf3ca58cccfef544a5642189b62c4c8ee268f4fbfa65c85d44d237c698ecd480ee59cfdf256012483817bb8d599f9a4e98d44302eff10d7852c248404f81362
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513908baa053d9bca4171e5250f91d85f
SHA1a8686ff95b26c590d2fc488a02daf97c553f8711
SHA25633ddb03ad2ae6f3dc89a86c821db2a695ccfd2438f2740261baadb0a109f4f8b
SHA51217dff1a9f2122efc361f514b6300532f8a7eff705a4a0c7fff6e804b8f47ac8b26aeb4380e5e7747561b82a19292a75bf5ff4b8e3b78f6ff2eb70d2cc847ff95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fa33932aceb9da8e31653ae64432002
SHA16cbb14a3ea5308efd8e7775f6eb188b4d63b97c7
SHA256affb5210375d913de3ace0dcfe2a8f69db9ce954abb31ffc063855feb1b167c7
SHA51269d77eb43c8fc746ceefea63a931f6f1b043082510e882de5ac7f7204b26b574de51d7e135fbb9129d17c17ff8f1f3238affc9ae895fd9cff6b30b77f45b40a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e59765f3af6c5f085b78ee4d02ac266
SHA1dfb3b2b6778ca04a399d20aa1c95dcca4cba94cd
SHA256487d051c35c319d3b1563329df4ae23134f85df00f56914e7e5fe361836494c0
SHA5126c6cd68ec2e33ee5b4c9f17b1c989fe16521fcf1f2d67dd79a007076637dde2a884ad8c42861591a082ccab28c50544ebf611afb712fe85fcdacc8ca4d07c933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cbfa97e9f80803df9b4b8f1993378d4
SHA11e3a435e19b29de6cb1f62271b79af1094e35482
SHA2564d76432885717eab93fdd9f4e2edbf171541621d220d0794a099abba9d799be1
SHA5126e42fdb6108969092b7ab1dc271bb559197b384cf5031a584924ecde293f7025959b0c7793276758b29958890850af98ceff25c42907a7eb9311242995931e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1db20664609e582717df83caaae74aa
SHA11407fe75ec44a5d4099f4036f449802388be27fe
SHA256eac29b5e4fe69b9eebd23547d04bd3f9e7450eac4aa461825bd305df90154299
SHA51250a35a8b9161b1283b3d986b6daf616b9b1c8fca99914054145055fc5cd2db513b638beff52ea81e1ddd2ab521d953115fe1f93eb5a1a7a2eb9faf836a10953e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58afb5f5a63940d79debee5fab3c4f058
SHA1a098601354b133ef7267647b54d67ccf9cda2dab
SHA256adbe9759ab102e33ebda2435c25628056809fcaf4ee34584a54d773fcebdcfe7
SHA512bf0420e6a67ca72575a54f9ff40b6b5e2896fb896100e4a0c80afcd35312f27d9d03d544ab6e892558d2977effe5f377c6beac67896ecb21f70fb1fc2e93eaab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500f7f5810c29becc505dbcee8f14587f
SHA18ee3667877915432a461b12c7a367060438b46ac
SHA256c807c08aba444ebcb805ad5bee4bbb28b001f9354792af57866c17413e68ae96
SHA5120674864888e0d37ddec74e81c111e7e06cd6bce21445100156743ab07fcbda568ccd5dbcf940f6f210337c0c3e81ef33e44b7aebb131c351d1d7116ceb6f082f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d685007942e4973c125afa36642214b
SHA1a823208b38535c11d9d4808357a947fa0ed5c907
SHA256172f3d31b36d42dd7b3e34aebb6da428ab3b07c8ebe72797934178294b33df5c
SHA5120e3150252f39f17d2595da1fa4e86ff63282202369050bea16038bad73133f6dc49f848f01af3c0f3b70129192b0561bd88f1945e3911dabada0bab6f071ffac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cfba06718b14dbfd10bf954c3158228
SHA1c0001feb173dd32870caec123fb097955905360f
SHA256f07e3f3887b6612b85921715dc92901e2f7e29e6c60b0735cddd00e8e61dd196
SHA512981fe8f9a6891bbf9252a510bd875b9d3a06732eab5d4d76a922960599e2881fa3d92a6be51678cab530a96c6b42ccb2f7bd036786613c4d04a952c5672d41a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea72e9988c743e064ca2381710060dde
SHA136d24553377f0df6ac5fb3c09125a0ecbbf21fce
SHA2569db52c7023061555a958569dcdfbab1f4c21ab4d3867bc171a950d8664cccaa5
SHA51289ca1fdb1c9791c09c4008c12e8f8c5b5f9d7de254c189d6959f1a487888d6a22ecf085c3dbe418a878c863fa79dd5e90a20b3e26b579e55a16330aa2fbb3251
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\53STNJLW\errorPageStrings[1]
Filesize2KB
MD5e3e4a98353f119b80b323302f26b78fa
SHA120ee35a370cdd3a8a7d04b506410300fd0a6a864
SHA2569466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66
SHA512d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\53STNJLW\forbidframing[1]
Filesize2KB
MD55cd4ca3d0f819a2f671983a0692c6ddd
SHA1bbd2807010e5ba10f26da2bfa0123944d9521c53
SHA256916e48d15e96253e73408f0c85925463f3ee6da0c5600cb42dba50545c50133b
SHA5124420b522cbe8931bba82b4b6f7e78737f3bb98fc61496826acb69cfff266d1ac911b84cb0aeeadd05bd893a5d85d52d51777ed3f62512c4786593689bf2df7f0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\rpc_shindig_random[1].js
Filesize17KB
MD5f019fdda31635d2a31b151ad8ad56c7a
SHA16adcbec55f66ffaef83d9a134423aa98eb2a2189
SHA256c7fc0b1526533002c956ebf8e8c42c3ad3f96c41ace73fb4063cc89051944831
SHA512fc278c12316e098976833882a38c788d812f9d36bd1b9b2b8c87dab4dc906af26a860df95436ea1b7d509236d44d0533d475a153437f8f5d42653fc28a77ad64
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M2VO416U\478691279-postmessagerelay[1].js
Filesize12KB
MD592169c8a0fbf6e404267d0705cdbdf42
SHA1a5cd88b74ca5ced239cdbfb458fe25540d671f46
SHA256dba668b49a111527aac8f616b9053ea57c944e01a84ebdcd02a13da921223384
SHA5128c5d35ea512fa7be367cd9a9ded2f23822dcce730e5502a355ed0d48949ef763eab13be0d50a66de6b0f8419d6a002c12c4ddbf20d97f5393ba922e48a4f02e2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M2VO416U\httpErrorPagesScripts[2]
Filesize8KB
MD53f57b781cb3ef114dd0b665151571b7b
SHA1ce6a63f996df3a1cccb81720e21204b825e0238c
SHA25646e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad
SHA5128cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\W79VKSP8\cb=gapi[1].js
Filesize64KB
MD5ee01651d160cfc55249d6011a3c45916
SHA179d6121df6575974ad21dafce33ec98e3f2f0a7f
SHA256639d75299973c7d3794eb7eb129e3b5a6139f9f521e1f14383abd0fd501219c9
SHA5128a39dfc1ff2c58ac106225976aafdaf7befc0a28903a0c65e2c272e1967c3336af2b477ec12604400bb8e16aecee6567c9cb9d157e3d54649e28b9b2f920432f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\W79VKSP8\plusone[1].js
Filesize56KB
MD51944af3661da46249991197817b6cd8b
SHA1f952df40ec79fafc7c798f37aff92878977376ed
SHA25663326a1c4e0eddd3501f0a064b06a2708eb0362f3ae934f53145978d3d0799b5
SHA5120bef19b32be337cfba179ed9ce4533a207cfe645d2e5fe0da9fadc7b01c72704fc89749670d1ac48b8d494675bc62ac089fdc4d8495979226f10828225594376
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06