Analysis
-
max time kernel
0s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 09:50
Static task
static1
Behavioral task
behavioral1
Sample
4b1d1f9551426cfb28d866292a12a07c.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4b1d1f9551426cfb28d866292a12a07c.html
Resource
win10v2004-20231215-en
General
-
Target
4b1d1f9551426cfb28d866292a12a07c.html
-
Size
432B
-
MD5
4b1d1f9551426cfb28d866292a12a07c
-
SHA1
61bb12b8db2495082d31cde5db2e82686cebcf8c
-
SHA256
4fe8cae6ae45e3fc3376dc96534a8ecbdeb53759faa7a745565ee920a1c486fe
-
SHA512
d7073d396e70159c94e85f02bee3c49e8174b7d15e0bd94e6286f18f8cc0e8ca7c9ba05983fec84fc55c6a7caa1ec196140e808e5ce75a081d05f5007a42d1b7
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{536D0131-AE0B-11EE-9CB1-72CCAFC2F3F6} = "0" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2984 iexplore.exe 2984 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2192 2984 iexplore.exe 17 PID 2984 wrote to memory of 2192 2984 iexplore.exe 17 PID 2984 wrote to memory of 2192 2984 iexplore.exe 17 PID 2984 wrote to memory of 2192 2984 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4b1d1f9551426cfb28d866292a12a07c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2984 CREDAT:275457 /prefetch:22⤵PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
23KB
MD553ba8bdaafc79505ade1d370515de415
SHA128b2aba70798b912be08612ca64a6fd0e9ff1afe
SHA256374ff1463d9672810bf5cbfc55ccc6456bc7cffaef635a0dbb66a14d7583d7b6
SHA5126f006cd212f65340ff546e5c02e19765df7361a5dd3b0367043d7a57449c488e5ac92e18d5210a7bdb853c5a734d88283e770770d51ba5baa2fbf8818bbde90a
-
Filesize
39KB
MD55c12011c9ab6cbe86046525661391289
SHA16f67e26085904fbbb6e8b60561c8625c2335240c
SHA25634b8de65413753e322a45c8f94fe1c16d0f9b1c1a7cf167fefe1fe47e2dbd723
SHA51289bcebae789aa2e76ee7a4b4eded81fcf3bd95c3ded79e565d67f65f3469529bb4f46a6eca7610cb106a762419762aade50dc88ed2dfeb2b5600e4724483f48f
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5a99eb3544ce6a3f245816f8af6b9292e
SHA1d5c4014087ec5d672918ed40e5caa80fba51ea34
SHA2569fec0f472e203f743ff99305be919163308aff01f19ffc65f9a0a8867a7729dd
SHA512539bc67c8cd557e8589559755f889cefbc231bfa240dcdb214067ffc1777160411ec4ba4dbc1248bf1cba06ff7bcf8c3a44a064ec1bc84fc2534ed4756e905d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5268f00fde9d47a7cf665a7236c594ef1
SHA188bf695778231c3d085ccef7e04d69735f748473
SHA256c2d995dd3ee17abf4c68c84d452a513c263c10361cadecc688c63481a21470cc
SHA51283cbb76deb755a95d33db1c31775fa168cf7973286d1229176cef6b84f863cc651248719c1dab732cc1ad9d45a17e56c54a74f98375bea82d56cccd7de7046cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a18b9720c097904fab34561fe836f41a
SHA1896f6d610374c34adfe0f96761c020d0ea41c38a
SHA256f53b4f55c889180a1a775c0e8d3c2ae88e6964b0f38bb27464ed4356b8a5f919
SHA512be8c142ff0145a66996af4729634c56932728a9adefb17ba29e0ea8c56284c0c479bffd98782af79a93ffb720e31b6cf1abef52208d5b7ce44727d3616ae8918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572a0030598d63255a68d31b5a41b765c
SHA132d855cd9ec41ecc8725dad1b9b965f36e2eebee
SHA25684b540163a51d1a2fa8ab98449279147f6f94f04cec0c2ab72e0ba6a86207b96
SHA512da789f58697a3e3ee663c7f4bec2ef6f65fe35415fdc62edd92c94ab9892887e7128c0865826d3fbbecfe72d65b08f5ae329b8094c7872172615cfd12d2e3614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7c32e89c390d9d1bdc755827d90c6d6
SHA1ca9216efdfe9dac5aebcee5078d93f8790cded57
SHA2569b26cfe291f61c59e85b5a0cd1455d4deeb32ffd18593c3d6c4bd203e677c128
SHA5120a8b90a8093646ea095948eb1c520422e2a49111f20504a8f04bed53145c695a42bb36a8fb1f4bd0cdeb135ff893d4a180ebeb845220d20a608cba21b3d69e4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502aa4a09e8fbd308b0fec119762e610e
SHA1c36d3705c2d2357398f958b039070bde9fdbbc40
SHA256902dee47fcae5a26fa53158ecfc816065fdc5628c77c5b4dce53f973abae096e
SHA512897edee507cbd6965eb33ea40e5f15fffbb6a93086680cfe6fd37fd052fd012caa1c41e1426f59444de06dd824450f1f0b14616f092749d2d61562e05f087a6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2182cb602ae2a833f9b5f912de57295
SHA176b2d5c9fd8cbb447b971f692175b958a970a51a
SHA256c78dc34236dded1507ba6ac18dada41be752e7b82c304f8cea90354d170664e4
SHA512e47b410c44bf01f03ec972376777b80f53c5fe4de7c95cbbea21b0b17879559f8255066de39b53d2d19c11813111b0d49760a93229b5210b9f42761050736fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d5e7d3dc41fb53f9dcec6e7dd7b981c
SHA1dfdbd8d716dab809ac307faf584a2932c8932134
SHA25657c64d07af319751ab6bb2799268c8dc7efaccf37fcb4d58a120c30065083fc6
SHA5122da9313afdffd469a02a214906fad013884547bba6fa5751ea29d6939ac0478467704630fd0ca55120803678e581767477815545109e7b1956575dc95e4f4998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538708968c464aa6f1c79d226cef67c38
SHA11d7479c71b80c8229acff5e4ffe528593d0c6202
SHA25641c0b5d61360276d226dd73129687695b93b7f4c8ed624878f425cca922df6ca
SHA5120e7b0b679194ec34e83bf461554637692a12f601ab73114873e6ca0a8d6e7b3adc724b3f9cd9bce197d9a243d392583fcab9638ead0a0d9e74515cb3a5907e70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb4dce776343164c57176cf492f8b743
SHA1bdaac4f66770adf385385c07aa895c0075623345
SHA25662becfa77a0de4094f0b144ee41a57c5e83cd76868d497987b46b554849f2a8f
SHA512cdfb2da270872911c959a4288897a08b04157521f363c86434ceef33dccf69d21f9d766bde001003a9f9d104f5d9aedf8315e20db3c3a2dddcc57e7608ad5c6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1000d8d7a73b9019613f75ab5f4ddcf
SHA11386a8ba0303048936d9d27bf8ee22df235eb66b
SHA256841ca9b575a97c183f5ca26b4046efda9f098980501bc33bd0eb5020210abc8d
SHA5127dd617841ebf258dc7a8f072fd708ab86c0cd47826e482e798c64eaf22f169529cd36a9ca7feef86a6ffb53c67a0a1efbb15aab22864e79a84e32d90b532cf71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6c7c18f0ac3b61be92c64a614d062dc
SHA11e29acf069c49f6568f59556ef54a08b8c52efd0
SHA256f0c05ffd3eb57809a66362163ab4b54c6f45207dfc21da8c39a5fb7ce33d087c
SHA5125ed885aea6696d15f684dca8375e151f41d9c5d73337fc58973adda801e0a55c03b6b21c571ac0b9d9681f338a684533e15b0b32966d01b84a1ecb116dc77494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548cd2f7ecf2d174b29b1c0940a97f90f
SHA187aab188a7b28a923886cce82618f197bb7a47f5
SHA256e78c4ec45916a42bfa343cd1aad1908a7b034250d2db0f938051c1fecc32961e
SHA5129165474e725dc5519e9abaa2a0e4edd8877b3ded5c662cbb73b2eda95d1662176e047cdd6a9cff4b33e43c5e88fa88e97738fb9670464b69ba1ae60e5443d4c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eda46c29a76ff595ae9608acc11210d1
SHA15919accef59c7244f69c79fa5a7d9e6440070868
SHA25650f23bcbe0ad59b6f31110821c6a483cfe12b702570f0fd1f19d86b2975108d6
SHA512d8c407128e9cbd2091f3a24c3161f0e8133c6ff1e8c508e44cdadc159900b00f5b6060d8ecbaaf6aa3a1b6a3414c98bbce137d09607fd0693b8a7de8e8965084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5285dd9ba49c55dcca0bed4dc52e216f2
SHA183f8067e1fb6dc66464aed4dda3f537aed46bdbd
SHA256240ddc75e0c7c5d325972ee74febae2675e034166b9fdf8ced37b6f5394ba88b
SHA5124c3056965992a23c8968a2880476e3132316739046f47d515967894897edff2421f4f084e0627db8f47b3f8d6966872a0ebb7722d7ea899f15a9b6c31b4a243b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be035c5a8d3b425097bbf0c51e700281
SHA12bda18b5b9036a54612e596bb9fba52b59ea7df8
SHA256a3f86fba4060ab5257c505f5bce41da2772b506b03fd7457422526f210d6c27c
SHA512e2a5cec13bab2bf826f30ce3db438870a5e5ced2bb03e471ed9f95af1b7662990abfdcd947693d972d61dcab45e92dc6f763d893ae74b2a3d9ff0cc3155454db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5354bf08afbc172ae4d659162d4d712e6
SHA1c66d90b778a4822fbd5b16f88d97c6aec4a8ee86
SHA2563122a867870923444bfa29d3f233e297ca0ffbe79ea8839ff01e0fcaf3c8bcb6
SHA5127092fbf09538d4c7a9f2ff473b7ef359557634eed2cc55709ddc0ccc278eac567ce24a92d3bd217f1524ed9fef80d89b6033341726ce342b87ce9d4be0e9e70d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502ac00951313312a932ae23e023dc8d2
SHA10de28d207b94075ffb89fb5d5b030d690f98f88d
SHA256801066269ebcdd017247524396cc33d785e72aa8dacb0cfe7acbd3a933ff1bd7
SHA51232f7532a82c42fc1b78d1e7125f58031d02a079346f8558d2d5655ca32bb0124e89540cc98e50f118258fa61e1b881d12c6cc1c57e8fd8527e0a4c3efaf9c81b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1724462bcddf53c6b296fbda085e225
SHA1fdb14dc2bc3217a317cd02166136dc34bf851831
SHA2561e8b2d5196998c1fd00d31b9910d9d3e3611f2f693752b486f8ad5f5861b6586
SHA51242e2ef1f4515e531323f818ee2ee310408b23f4f48a52fb72b659a6747a45eff0a1f45a0a22040cccbfa6c1eebc7e6b26c4db966750d7d7ec4264cc3be595b96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a49cd3db0b4635728cd320031f85398
SHA10ba3b153f381e3ff205eb1b26ec3b61180d3779a
SHA2560dbfe0fc070ef2df4aa87ef13af8dfa7b1a39a31df336eed1578204a427edb89
SHA5129530f521f4c274d6c55dcaee5b226397cf852940fe30e7c0df3883d22ca2c8db8adba6584e83908574973cf878246aac0a5f02299cbd3a3ef90d0c6ae5709806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5986117655acd953241fb4b9b0e252e59
SHA1fb5815ec001c34cda553f28929f8f5287b55f42e
SHA2564c73a59fed52c1508185295884ecc180e1d739bb2445e7977c139159f74cdbbc
SHA512884cac0a8002a92491f669af237885bdabcd1d0539a1f03855a284479ac1fff0003cd14eb95c067e55653071a2aadc1d4a83338d8b9b20e67bcfefeba2869f18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53d054ffab15efd6568d7b74cd215c7fa
SHA10c445972a3728c1739af54a61b21a24985116b39
SHA25665384e1881c64158d26c1030f5ad582a9342b8e6ca1513c71590ab2eef4e8396
SHA512a650ee82b1c286fa009c9d80563054eafd2d6a4567004a5da0080b475b60d5d28400edae90014b9828e014eaec678f9d68c2f298dc9388bdcc935f12d0a3eb1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ee49cd06c3dc07f6d3de8dd8498b88c4
SHA1f0f90228cd37462d81e60d60b3071ae55bd95c6d
SHA256e47ceebe7df7b276f648906b55e554ce73019b2eb56a8b8af76dff9b3eb2ec4f
SHA51206e2f27667a1a9ae178910669c80b78efbdd3867c59712d839df87a359fba228bd299ae81fb8628a66211b5d08e746d43f75fed5bf0baf79a52da6b0d0f472af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
1KB
MD5b4a99291c1aedbbf92ba91f813d2372f
SHA1710601fd20cd9bac58edf7e5c64b2d76c3a4658c
SHA256602ffaaee64c357c1314beff65f856e6c417c50b798b70506d1c0689d5e232d8
SHA512bcb55a39a45b03ac0047285d40a28335b41fd08028dee8376221f1dcde6bab8a60a5599e736d23e57c027854a355d90650b25bb2a5c9ca667966d19131ae8d03
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PYIWWTJA\favicon[2].ico
Filesize1KB
MD591abe01116ab422c598e9c8af72cf4da
SHA10f2815fe8e067d48537ad168225ab4674271fa27
SHA256b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc
SHA512a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c
-
Filesize
11KB
MD58d035343411ae154586a1d3cd56524ef
SHA19112a0199500f7cb434399b5d15f696ddb28dd91
SHA256c4f0e7a03238e7eb9bf897b159fc3d09ee0c96bf1d8fc9720fd155383eec8c95
SHA512e0f47db0088b86a80d087fd82e46b7eb0bf6766abb966ac69e50d7d0ef4ee10d4dca46ee0e665e969d2eb8a297753d6f0ebedf9334bec92f187c718663d29d5d