Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 00:14
Static task
static1
Behavioral task
behavioral1
Sample
4a266b18da64fa1bc1dd5f423a7a821d.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4a266b18da64fa1bc1dd5f423a7a821d.html
Resource
win10v2004-20231215-en
General
-
Target
4a266b18da64fa1bc1dd5f423a7a821d.html
-
Size
34KB
-
MD5
4a266b18da64fa1bc1dd5f423a7a821d
-
SHA1
6073fdeabcb3fb13a3638462fe957aedb4391f4d
-
SHA256
83793427beeeee7649cf17d8df05a5d3c6b5d6f932b034e4c519360b14854c85
-
SHA512
ca7b0fb946296c3104823254e8df636551ebabe6b605f32801aa0475e61c120dba8ad0a7d33b14d646f2fc56332460debffcab240c49b2e47c444c945cb26410
-
SSDEEP
768:3iPzzivEm5BelNnEiR4XA8kk6U0QFk8Sj/Ei4XAYt:2zzqeldENXA8kk6U0QFk8Sj/Ei4XAq
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f12000000000020000000000106600000001000020000000cc64db2658b751aaf6883630e396463e0752b76631c64b7c726773873178cc60000000000e80000000020000200000006f5f461ce47058ae7a237afc2a00518ce2736e622557809f3d8457d30249455a20000000c987585d906e7397eaeb7415d213c7ae99f51511b60f5ea7695a55797b0a4643400000003f1d06eff056582a47d847e6e2887dc9f582bb414d6299b4c7cf370f91e153268a13b82298696d1dd9118202ae862de38409b0a3e38a3257e5a45b61313315b3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410834763" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e046ead1c741da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EE91A221-ADBA-11EE-ADCE-5E44E0CFDD1C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2888 iexplore.exe 2888 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2320 2888 iexplore.exe 28 PID 2888 wrote to memory of 2320 2888 iexplore.exe 28 PID 2888 wrote to memory of 2320 2888 iexplore.exe 28 PID 2888 wrote to memory of 2320 2888 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4a266b18da64fa1bc1dd5f423a7a821d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD524da5e2c540b7280ac4ee9ca00e041ba
SHA198a3fd5b72de757f2f1c407b9581fc3400c888bb
SHA256d0317860ad1a3a9e84d09c28d8afb7f29dd0c49e6784c4d632e429c717b69739
SHA51217c341b690fb5e0cc06905cc8bb43b436da63189b4176bb8c6e4251852fd3ec2f48f521742eb3b78dad0d3aa086ca5aec9ba6346b80a8b88536a52faefd0a2f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562fd2d64dbe911c90f61836f7bd9756d
SHA11866167365c6046ecf4533e694af09dd4290100e
SHA2567793ee180c97851a6bf1bf505bd14ac4db498c3018b498fc15d2325f4c795896
SHA5124af2d500244fe5dadc3d77b035524a717830bea8696448e51a98f55b41ee8922ab9122c642e49ae35616b6f2ec172b10f4fd6e4d2bd22d4428d5bfec82ae5bcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a55b22899857524180978058bd711da
SHA1fb6163454a3c0733a67d14e8c16cb4c51a5f4aef
SHA25622d8c4c1c35a2a8acec5af0b18a555271fff4d91cfbd6215d85523b33c2592dd
SHA512892c711189d6dd565c7a9f9ec09aae0a50103d3e062ce1c186571570f7a2be02bc51b984d8735267a0806fe541cf0393dd19680f58669567da4f332cf678d58e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e613618767dd2ca6c1e75c9ce5209fa4
SHA13e649859e8a8d4f2c78b9aef17ebf3630410ec4f
SHA25656e50f067a16153c3e3c336fa632f0786daea631244d65ad85094debf479535d
SHA512d499fd101da69be4644b8c4e7035cd675c194e6a69ab2b1df3664e579491b801b8657972c83eba119f1d737516577b66b8bff7189c1406d13130a34232a4d3d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fd5336fe4d5faefb01a60de72f49cca
SHA1bd0aa92b1966d2e134e0fa92f4f548961f8b76b0
SHA256be58ccf0352cca130d0945aafc38e1c3a3935ddd1f6b7983fc211de5d26b7638
SHA512409ec517b403e9be2d3bcbccede0d3dfe7e999ed81f8f028a2fdd13687c1074e3f4633d8ff86cfda82d44faef8fe8d5289d87a442bb890c9e4ea1b370ee7fe89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d752802f4dcca31f185f67d2df9615f
SHA1d77f2a993e5f52a2bd82ea9e432bee79758d45b2
SHA25648b123e5c560c136d97c38d5b435b181bb1729b303b1fbedecaa9bcf40421ec6
SHA512f5692acc0a9dd694865dc08fba505d98809ecbcca5a14fc8b3ddce05576eb5e9a967b590eb767c6b36f345a94e9c626120b48d2edd1d8362544d2fef36534b66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521bc1287015c141e5b5d0b6305c76ba4
SHA138154f0c8eb896604fabf3a92fd295ad26716163
SHA2567f91a2c31cad5ebaa733d412cfd1d351a6515f1ab58ae2843d8be65b335ada0d
SHA512e2e2b54492b4afb76910ba24a6fa1ccb0168cb9b0893db5e1f0742899979f73d2aa6d1cdcc6b290284cf2949678544d46a572c0a54f4f11d7bc9223a5ea862d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5641cd6cc71ef2be6e38661baebb402
SHA1aa598103c4cdce97fcbe28228a776a3368c62f5a
SHA256d349813440fc5a90e3f75978c266986d1dd078ecfd41a2baa90621fac780a792
SHA51293a5f13aca40d1e65f75fc23891bfdf6b56a78d7bbad5ec6a92330b615671d8e31c372339bf7c6504262f75ae8a78d6224f992205eb5c16095ce89dd26858933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db20d69d616d8279a0a60b0a5ee73308
SHA1abbf65d079e0eb88c6ad1e5bb4ca947623842eb6
SHA2563efedd66809d076cea9a9295368bee380268abb3af92a2067c10e5abcbf5b0f4
SHA512b53e9fa9284dd8dd0f413c0123cc7b907566b129d2d929d95160305a4efbaebade51060c8ca34fb7cc2a32f27d0f9c1f316b4d1eb263a5c17aa950d69f6d0aed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a4f75cb5a7a7797781e2e0f6ac54560
SHA19c946efa31558e7546b45908405f9efdb0bc6228
SHA25667c2d3216905544a5a8e6eb82af82b85eccc24410eb8700d44b90e8b7cd9bd47
SHA512380865e93d8e996d3a7fdcfcfc42805334ad1c1732c238384e6d9ac29540e411cf270d3603007c3a82e6e4816a9f9da1829a1b34f43adb5d2f72d91cfe84348b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598c347fa2932b16112c54048e2643767
SHA10ce436335396bfb345bced273b3e09f9d37e468a
SHA25623728a5b48a4805639206508abd8156e6f22f4255017553a8c4a671e907a0e36
SHA512ded139b6b9c787845127f0df8ebd5265d0584cb4d82cf598504eb2ea5fb5fcbb60de8ee08850f30bc6a5c98d420da16dd766acd421c3325c63f2d868845942fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50423b435a25a3647eb0b07a5299fcd19
SHA15d655da669ac6ab544e6f8e1356917e88e4f6d4b
SHA2567fd49a19641e0476488c99df52370cbeb392410cc2d2d74477f3c0aac077c717
SHA5129bafb27e29e80dbd8be38c67ab75c410ce856df34a6bff7169bc0aea0c8b040e386b599b35a82f2d65a12d9f2f4e69f7d815690d17447fa47320100b58e233aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e45f39b8e1a556bea8d0eea4ec5d9a23
SHA1128d5c7773c99ae441d1e158948c4804b340f205
SHA25613776118c0e172491d5690293a2f096d385ce14d016703e8ce77d1367783b3b5
SHA51258b7d6f7da43f349c042c767a2f38237553df43349f6ce77932dd4ba2fa7422fd3987eff810a46d02639afcb663721b4fcad8b3b6bab175779d5f1b46aa70425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD558b32c5a01100d125cea211d42554c8f
SHA1d8fd436d761130140ae2d9a9c491fafaba0f8a24
SHA256c9c63a560a5a3577e5f84eab3d8a1d2c1f40c4417a50fb75fdcea129c04e6235
SHA5121de05334d5871cc408ba3678356b859a32ec447bf990b39d33c356a6b9f455249712daee6b79dcea6ed0dcb20c4f2f3f0960b65b4d0a36d19e08f039ab21e35e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c298bd5ff8771a4bba58b989a6bb704f
SHA1d136e2f77999a64da9ca4c7e0d7348e70398d86f
SHA256237031b02ed4a040cca1bde436b0bf20759f0ddca6d995d4a0daf6808f52db19
SHA5128d966f8f4d38cf3f0a02d947890c13f29a6f31a77ca2d616788ed1e5e531eded42ba4fbd85c9a2de11ec9eb4403de63695ee1bb9830c22b1a29e2af25628fc0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06