Analysis
-
max time kernel
120s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08-01-2024 11:25
Static task
static1
Behavioral task
behavioral1
Sample
4b4e99e7e45285a7e40206e4cb48dee7.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4b4e99e7e45285a7e40206e4cb48dee7.html
Resource
win10v2004-20231215-en
General
-
Target
4b4e99e7e45285a7e40206e4cb48dee7.html
-
Size
1KB
-
MD5
4b4e99e7e45285a7e40206e4cb48dee7
-
SHA1
ced1cab8edf73599860189ba8d90c13315ffed68
-
SHA256
b7be6bb142812fbde11ee96d3e9654a7499fc1d044e8b4b819cc4a4de28da7d2
-
SHA512
cab4e6f33aaa8bd6bb483f4e46a2e2d6c99e928aa2fcae376a8b410bf5d3ff51ca4a71c138f2abdd4ed1e23aa395099b944295935f8cfe760391c03522b9feaf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410875034" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0a7e7872542da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000006a23e61591e966a40c5f6d258219cc1c247cd659f772f089c61ffb8df6a72a4a000000000e8000000002000020000000b7378f283ad56ccf6d9425bbecb5f38a8b54456cad6cc9e390aac144a40f50d79000000055bdb4096156ca5764a666927896637db72d31222844dfd8efdeb65dc7117cbcc6c70b7eb66511412b071f75ec01a14ef46afab6e60a975d53134b26dabfc1180567feb4582ff4856fa162aaab2c264017cf9462bbf476f5dfa6e3918009454c5ba184806a57c0a57fcf1615107908f8389d09251c0bbc829e8e6908c1fc61c7f88b856a74c27583beb5dcb790a794c340000000aabac2390d3a68e312f8987cf4d876f7f370ef41b9b8e1829424e3ebffdffa20cd1027d45e322d003141b102aad6f2c0b4e34076c91fd71668eda97faedb9055 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B268D941-AE18-11EE-A2F4-4AE60EE50717} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000bf1d78006a15816065610464e8abf2c4b8c530f0cfb10d5f2224f9894af220f2000000000e8000000002000020000000e240c4bde073a3865edc33c0746d902ca84130dad19c2cef2d21d71687cadd2b200000004e4d76a72d14aea1a99aa27a798c07acae069c1f4f8029a92f17ae7dca3731c540000000d2aa1f1ae03500a932dd07337c99a6f32f40f1129eb7798f1232a032bad781d30f5cfcd08d25ded10d65d48b285ebb7b94918e1825a7aeb25fb2d016d88f7f94 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2772 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2772 iexplore.exe 2772 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2740 2772 iexplore.exe 28 PID 2772 wrote to memory of 2740 2772 iexplore.exe 28 PID 2772 wrote to memory of 2740 2772 iexplore.exe 28 PID 2772 wrote to memory of 2740 2772 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4b4e99e7e45285a7e40206e4cb48dee7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8a1fe175818d6c23e522aa6795e8bf5
SHA1ec3a0ec50b73ae70ace862689a72546f90b8457d
SHA2561ce786f9f22ad906a5ad5a1fb7ff660e792a39872282f880b5644e9ed43cc586
SHA5126d9fb07d1c0d36d69143f119d23d278e204473c0854ecb8fb72f2503e9f74cd0d4457271573393b24abd1ea3f042ec69ac5c2c0bbdc402555ae2bc6579b8838b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53119982b2f357c4dd1fcf54ba7393d87
SHA1774e5f8c5bc9a369dcb039fd0d49841bd23273ae
SHA25601e213198fc5c5a7a15e2f145ed88d0c0f5d6139e9c18623539c33938cb9b5fb
SHA512eff5b7b8e11d39519afc30f3f5b3f93c073135dd01a40a9e9cbf63553363fbb122cdccb0650c8d6fc6fa78c446fda40b104cd4f2fbe443ee6fd66c5660948945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed6e089ea5714a1481b4d40e27059597
SHA11bdf42161a17b16b0a8047db124d08c45d71c935
SHA25665acd5e0f173c4084cf78f6a65b61d060b1a269d8ed55f7ea79cb406b3945b56
SHA512866f5096a50a803086d48893dfcf232d169d6eac77624ddc990e8283e921699ed82127c4c30928653ad002f68a1757e9405d58bdce53b933aeb430d1482485d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564385c9032e7e6d9cfda450440ff9656
SHA1017d4d258e5ed00f682b3e9b743619b106ec2c4c
SHA256e82ec15cd1e653b201b3bbf1833fed3728ebe7867624e4e51b16bbe9d6c19cc9
SHA51287875cab7bd136ad9b86c24eb5515e1424507045aab159e04841a48464b5423f374f6d6fe3ed6c97d725ad093f241506c70a1d9d2bef8f24dcc4e7b68bd77ff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a06b94b0bff3cd4e84c5ca9d95b0323e
SHA1f35ef37009df9a54e351cccdfe3c0e547b6c2bf4
SHA25698b6fee079ccfcd8a6252bef1b1ef9a18052b67f19eba2ddffcdf311b46d720b
SHA512a10afff7fa4bf9a0f1aa821cc4c2a741f74165c8ab894f69294279959fe2de248460c8f5d4f7f9bf46fedef163582a3ec5ae3e39f7dc860c16c2cefd6ee454cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9113efeb843fe1d42504df70b716aa3
SHA1a307137778fc27d876bdd09511ec386ff52a8ba2
SHA2567a198e815461bfb767878419299dcf6f9b5a07273d13a998078ac363889c5544
SHA512a0c184a95d225904ae60dda89eff207885cba6e819a222dfb16603e0cbab494215881cf0a0f4efd861a4a4083141ff8deb1527801b61f21abfa7dfc4b1495521
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cefbb871d87a71d94bb0e44468ba118a
SHA163c425ff3d8bfb5ed9672a799e4c37ba20591cb8
SHA25641f45b5b6a7016fda386e98d1e1473323b0a15f9cfb41097249b53bbb8a2e83b
SHA512d68363008f773b590ef4c574cc06cf85524510a4b55b31421650fd8a10d0ecc4ea671ad3c855970f29585a96519c8a1f795b7bea089c3088a18939a0d5877636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c13adb187619b255a0456b11e8ec076a
SHA195f0d3169541081bcbf1c87bb12f54479440877e
SHA2560965eda275fe18f248101abf81f44b774bfe70ba06bb901aee925dfe0a982935
SHA5127ea6d06b4cfa505e42fefcedd3872f2896fe409365e1ebf95117b134290569f170c3ea3e232689298c3c7475650e35986aa5a67d1647ed0c4a09c3c279c6c8fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f424b5872df99dab62be3aac827bcca1
SHA189544f809cf21dfdd051bf7660d1657687fd999b
SHA256130b3045e95af3efcada5a65453cb4040a9a14ece5d09af76e03b796846ea082
SHA51245dc8f1f3309561e21adf5ddc6d2762d00654b14a2e2ff3debccdf4b6dd14e69a03b53e3d98e17b87798dc49bb2ae55a2ec613b15da5650ca0ebb74f0e843a8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5880e7079c9e32729dbb0ae247fd1085e
SHA1115e848655d7a8e340d5c2a3b7e3b410711d76c8
SHA2565787e8f5e1a7e58aa977965766816ccfd7a55fa16ea808de7dc69292416950cd
SHA512acec7bfb0ab4ec58d2f7adf27d0dba742e21c1d0142255beceac22c8582876313adf0003b8250c2409e53631556b4e3e15156b093a4b8f94f28b99163706d29e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06