Analysis
-
max time kernel
118s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08-01-2024 11:13
Static task
static1
Behavioral task
behavioral1
Sample
4b46cb3dae206f00aa47ff8a35c9f9ba.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4b46cb3dae206f00aa47ff8a35c9f9ba.html
Resource
win10v2004-20231215-en
General
-
Target
4b46cb3dae206f00aa47ff8a35c9f9ba.html
-
Size
3.5MB
-
MD5
4b46cb3dae206f00aa47ff8a35c9f9ba
-
SHA1
62caf7506fe7110d931466433703b95e398b2b80
-
SHA256
feffe42dacef3f4f7a99d37e451a4c3bd02d7f425b4781d5d1d8f96568024650
-
SHA512
ebaf04f0d94ccfe41379b58b056c5dcf8bfee62aa7ed844d744a987e5887ff1e7c27bc860dd2572e3185cffee8469b62725b64ce793f56baca24e9410c6c589c
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6Nyh:jvpjte4tT6sh
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70e220d22342da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E94BDA41-AE16-11EE-BD99-C2500A176F17} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd7691733418900000000020000000000106600000001000020000000dc5da81c2b18069b75137bc7f62d5d3916375fc0eef0eabacfe3597bc7121297000000000e8000000002000020000000308d24ce94f229a35d9d92025d58c9bab47f8966ad16a5b00ea877732ce8dcb520000000bace08c0f7ba5f20df8b0493663846689ac76b27a7a73d4e65d858d30112ab3f400000001249310d46ade2618adf070fc5383af105a2d9597aad98a2071cc01edda9baecf620f03626421a4bc4f68664171fcbe1c6725b02bac70be0f3643ce30b2cf797 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410874264" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2472 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2472 iexplore.exe 2472 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2304 2472 iexplore.exe 17 PID 2472 wrote to memory of 2304 2472 iexplore.exe 17 PID 2472 wrote to memory of 2304 2472 iexplore.exe 17 PID 2472 wrote to memory of 2304 2472 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4b46cb3dae206f00aa47ff8a35c9f9ba.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2472 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab8d6cf767fc617222736f2dc0ef6e36
SHA172efa838da0caa9acc46f4f56fa3af9e8955501c
SHA2563d4a0342d44bbbbea64a0391a00199773537a02fbacf0150c081442f3525bc3a
SHA512e6dfdababd8499d915cad8c0a32685f10547cc3a0479d7895edce7ceb61a92c96d02f2f6ed633e4d4927b1ee482ea1ba680e46c63e8cc00b5923f9bbc14fb54b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c0a424dbb738984225074096a7de356
SHA1f775d5840cfbd49a5a631ae265775de031293b93
SHA25684a01c1aaa5c633a8157decde89f7d38dfc2a6285d3447cec1e39a5e069003cb
SHA51256cd7cd100d75f04498b04a2f695cef2dcba989edf6876e2436e701216cadaba703e86c3d31d84814582326da88d17e909ee9917536c52481af9c0cbaeccf147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebf5b94af9cbf7790ba061e45286cc39
SHA11610f3d17698909cc2ed82a0894aa55de448b1ad
SHA256036b88108eff9769be8799827862f0c323978d7912ff657b9997e51eb021f075
SHA5125826a1d42831ecd7e5658a86d0821f4a654d78fa0744d30dc1f6a2e5f09d00bd876a5f6655d5d119c6d36b02f62508101c14a136df013bab3ce0d69c6d9d68b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a2193ae405bea5eb5de8f1c20f292f7
SHA1240137b17adc536abc90ffa562684803b2ab070d
SHA256fe8a74173f1a4e6038fdcf23e3f4c16ce14b165636c9e0dba7e4f878a30e693f
SHA512dc139050d1509658049fe2286607ac8fa216b08a5506fb0042d3e1857f16e625ad833eb17d22afacada4dbb39f79773af2b767423f597a095edba3dfe430c2bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543491fa29a761e44b560940796e6a1f9
SHA1fb1ca8615f9af7308c0d5fe0fc75ef336364170d
SHA2564402c17a62984f7f070950af31c36e1e738fdb96a77a2a2224197d61a3a77e20
SHA512ec70728f9ef234661b94f57331c2d389f044cb6b7c756c69b80342bef85e8aa9989efcd39f44a169fd8d1b27f12d01d8e654fc58ebc99c062517214202ddb395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edef36131cb8a57fe61194323973c48f
SHA11d3a8155eff6f161ed896861e85dc2cc7f578200
SHA2567e2db4a278f40f92f4bb014444145deacbf4af6df4bd3ea811d4b2ffdcb4cd15
SHA512261e4690a84975cf6f670830a2c3e471286bd1bbfeeb6875ab345d6bd76aa403ccde60c0e67310f4585d5bd09bec515e6b3e7958b70575c22a376046f0a22d5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de3f21128aed05da4116b3a3006c1a92
SHA17a7a23e4ed0dc62d6300215461750cd3cdcef425
SHA2562d968990b6bb4c626bd78325f44161fa8d685785d19bd7c3b5bc2bd7bec9609c
SHA512c62fd0f160b920f473298b38cf15db12b089cedfccc0cb53dc098811381759311d11f3f22cbf3ca7f9407107cb0bb04a2383a3dcbb2d34d6745eea3302f69a7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50679d6da72dd94a63c299f2f25d1e7c8
SHA102ed3b57a382c6e4181a7a46a66ecb3e506e6f2c
SHA256d87ab0980e5129469d2b8ab2b59156f97d167e968e55d41b924ae45a3815faf3
SHA512ab2f5e0667553129dc9aaa78a2c2c324d9a156e3e3613e14577aa184d161814658b08698a44b78d0990a8c2fa1b2a19a8c060c284f470696d511723107cc207e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576edc4f00ab7933503ff62ec2bc58aa4
SHA14581d5a88bb5f769e0b31478750a4c0654593339
SHA256ffd4ef32b3db0f12d0f16f66fae676b13f9600490a849df8ea47932842d50410
SHA51215ecd7bb7930330b443b584b4a0cc1b1ef9bae514b99fedef0bc450e215b6b168ac9dc9bbe2035a85e70f49444c5b03d4dfdbd2aa7c9898eff4e5bcccf52c52c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a305745eed5b88fff53e1ea4225aaff0
SHA1cd9ba5b6f112142838dc6a6995928a8ac5cac5f1
SHA25689a1092e3482d412d11a86c5cc9185887786bf395afdb15cd9b3dd15cde05ba7
SHA5123557a6cfaa6a6f57e39337cef5d02e6e6b857fbdbdac73f83abf332f3d6b07d0f84f15ebc4a892482929b13e6ba5a17cc8dcbe70ee9e6f61eb04a574ad7d3012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553b59f8c1654a91521ae4f1f93e900a3
SHA14b913031c5eacbc5f69ebf5d26aaa9b54db25bc1
SHA256ad4546698d27ed49d590a7f425382cfe15f0e3892488871703ada18bc8d1519b
SHA512e55e96044a56269e2e704ee1b7ad719f7d38d724cf8e8092ebdb376a46a5731b4525db7be329d07ca2e0e5423f49b3b76a72819e3bfa24b7afb0ecd445fb33a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af88e02e6572bab882234e3db4d347cb
SHA120e5f8ae1f71bef5300d140ff1d5d93b5f1a5bc4
SHA256ae4c8e4168a10391023b40749882d9badc1e9577bb990b614ef2f1a32830ec4d
SHA512d45f32dff6785d959353c13fd0bac0f2703876c438ee887ac93e987871aab02af9d6b2eaf876a3c0a8ffd093e37e0f49dd14e0568c630f202b0e93e92c6a7aab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55aaa39feafa6219e7682ea52db1e75c7
SHA128a6d691a923a034a98c579f30c0d12b8c472f96
SHA256e82bf952a687df7a2f6e01839f9c144fabc57f1fb3867ce52023e59595e0d233
SHA51216ee9ce95dc135763968a58e5571c76988faff77ee96003107ab97c98f3dd2ec6893d3938dcd22c58dc58594dba616256244572e0b0220566adf17511bb1ce65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5296d3ec0483c0ae4a2ca59e5cd93eb5b
SHA152e0eff8aa3d55f0f668f33cdf96e8c6c2e631f9
SHA256be9496d8c68f8457fd0a806567f3afb46f93e7ae7a12e4112cba09e8e381c6a1
SHA5123ce94db4a0abcc57c0617cb8fa44d875b031285857b2c6b17aafcfe44b4cdd54b8bff53c28041729ffd40a4eef1ae69377e03766d7ca2ed1c65fc288d1fc8607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521d883c3cd6fdd700e3284345838561e
SHA1bdd0177ad0b6bd3ee6e46877f2f73f84185a36fa
SHA25694aa50101baa7334dd93d54acbd0d2caf17ca9cffe108e252c59c099182fd012
SHA512e7d4552362dc96297bbeb862a7545696402e179440fd1d4b6727b59f0bc1c27bb89e491199ed2047209ce9e1bed6c5a2cf89c02a3acba67d2cf19f71163dcb16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58496c946255cc8ac7484b9a028d2a1bf
SHA150b24c4bf574c03e040de68d542e8f4194c74301
SHA256d83c02d6bc44ddd746db93305ff9f6e11a0ed450c26a15b14a712f2d00c5df8c
SHA512c1de49221828e9a84bb4f26ad014b0058a7d373fffe357ca9edfa4f285249388cc1d11b39a2b60d525c0d7144c9e5bcd14fba66cbc373b07f06023fc0cbd09fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504fe5a0dd3acbde673c746239fafdfbe
SHA1cd19105ca18c16a1753e3edd1e554693ad63e092
SHA25667991283d87670b6277cd26018a83a150540d936447f27be82cd2d24055fb284
SHA512d8277ae364485c89e5f8f8a8fe1ff03b093ee4920d0b3f13c2ca156c9e01813a99b76b860f24efd45ae07349db5a9fdc32a39c8235762df95067d51208f93a8a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RU3RPYUN\jquery-3.1.1.min[1].js
Filesize84KB
MD5e071abda8fe61194711cfc2ab99fe104
SHA1f647a6d37dc4ca055ced3cf64bbc1f490070acba
SHA25685556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf
SHA51253a2b560b20551672fbb0e6e72632d4fd1c7e2dd2ecf7337ebaaab179cb8be7c87e9d803ce7765706bc7fcbcf993c34587cd1237de5a279aea19911d69067b65
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U9VC31Q9\jquery.min[1].js
Filesize83KB
MD52f6b11a7e914718e0290410e85366fe9
SHA169bb69e25ca7d5ef0935317584e6153f3fd9a88c
SHA25605b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
SHA5120d40bccaa59fedecf7243d63b33c42592541d0330fefc78ec81a4c6b9689922d5b211011ca4be23ae22621cce4c658f52a1552c92d7ac3615241eb640f8514db
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
136KB
MD561b7682e703377c60d2522d8472ec424
SHA1205fa2191042f4986eb7d2d930d81070f4777a05
SHA2568068db10134871dd7f3fc5fff4638410a902bad7822622eeb933dd7e70dc80b7
SHA51216ad4bfa04927d716b9f64938966c803da8599694c2b0304d34cf57fea4eec03004ca60929930879879f012a73ffed89f7c7f181bb2ce9ed0db3988af00b4ec4