Analysis
-
max time kernel
147s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09-01-2024 22:29
Static task
static1
Behavioral task
behavioral1
Sample
FW_ ShareFile Activity Notification !.eml
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
FW_ ShareFile Activity Notification !.eml
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
email-html-2.html
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
email-html-2.html
Resource
win10v2004-20231215-en
General
-
Target
email-html-2.html
-
Size
16KB
-
MD5
2b6a29baac55998a0ad0f31c88bd595f
-
SHA1
968d1993772a0b62936154687eb2e29cdafec11b
-
SHA256
c108f40a75937d0cc87764eea3807cf62041e071d21a2c382865d010de5065de
-
SHA512
a7453fbe985f55d972769ff462a2ce6191d965c0e47d548b5fe190df7643c780e4c71c029a46bfd195a497ad537fc048ff99bbb42b14d3919d6a66aa96549f6f
-
SSDEEP
384:yO9ty9r9qfQoMnAzdtahU5YoINnVEwU5IWxSVSEAr3S991mAiz:Oolm/UEALdp
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411001247" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8CFFDE21-AF3E-11EE-8C96-56B3956C75C7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 303609624b43da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e917866400000000020000000000106600000001000020000000d1d5bbca3a6919eed82d4599a5bd3c153d0d46d98b042d9ce565bbe0f2b8cbd2000000000e8000000002000020000000a837570e8b2b073aca1ddf66f24ddea1155222283b2ba8ddae2cc6b0244a480f90000000f284a05821f4c71c5e77a4e34824557da00fa95714411878e2ef48e59985fe0f1c5bdb2f14a67030d20cfebec026eac0eb8c425acd73ae953c3b7f33c0d0384686a604913ec46ca7d0b128b99147ead84121c009eb37c33c78760f25b6d0d66750e3c2c96f200927ffe92cb12d174317c834567839f5a641ab7758983bdf67337ff5efa3d2e295cf287b13a2e46b2742400000007383ac814111e6bccd72856154604da15c1ce8380633fd11c62c23aa8ceb34e6cb112cfe6f1c1d7fd8e8968a138e09f6a2f0c5680407e975ac09ce9e8ff2fca7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e91786640000000002000000000010660000000100002000000040416619a93ff2c630aa08ba169b2005b5f2c78cf0f4a3b7ef2c57a52c17173a000000000e80000000020000200000001ff9ffed72ec412612f0ba43de1c6e73d0fd03d8c3b3492ec770b2ca19d93e4820000000662ea7ac30ec4631ed48b79eb4a12255c187fc1db326bf9cefc237fdd1b77c2140000000b8a777d09d6837878337e1d1329e5f0f7b3eeebffe4b35ff0b7a777738a25f9665cb51bdac0dad48b5dc1c49f44dd1ea29fedee064a6c78158dd882ce1398399 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2260 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2260 iexplore.exe 2260 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2728 2260 iexplore.exe 28 PID 2260 wrote to memory of 2728 2260 iexplore.exe 28 PID 2260 wrote to memory of 2728 2260 iexplore.exe 28 PID 2260 wrote to memory of 2728 2260 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\email-html-2.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2260 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a20a70d067fa9311306df89187c8d20
SHA1d36c1fac6f7f0f549c8807683333f22d68b972d8
SHA25684bea998580cbce540f2359adaba27e3c146020e5320aa9062dca3cd012ad251
SHA512f5b85204e95c1fb303a01461fe8308bfaa9493bb6d40347b5c41bf3480a9b35021f83adb1e7fd966719102449d56e5769857791d2ed9d8b3d5edbfc7658190d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540422072dd9edc30fdcf83a5c576322a
SHA1cf84e0ded4bad6b6514f0e08f312638222004204
SHA25619fff73d5c8f94ad6e2c5a5215f1347175b7bbedb7ef6b992c6e576e3ff9aff2
SHA5127a4ece5302a72aec63b46008645c1da5a4a2f8b72fbb6703458c6d386aa1a934ece6f67bc0c7a700c6bb244d401d52bb181404f8695c5ffa71c6ae72e270084d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b8214c44a9f24d5669c23aacacbf53c
SHA1b486a21914844f78d6abf48ad804a0845f517375
SHA256cb058b45dd7b655ce8928409e5639e73fca2cd8aa6359fe27ce9eb033a9a01a3
SHA512417e903a06fdcf3056e47afccaa3bae4418da3075a45c9cc45180ca157cb650ebf52c51b5df8d8d2a83802ba8c9145fb620a20b76bd7fe1c10057d1ab428a26f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3c69abfa2fe059b3c21f2aeea2f8ad4
SHA1ceecfaa3e8ed1583a05cf2a2768d89295eb1fc59
SHA256c23a53b5f30c1124a474977ea29b2ebd76b893a40fd78e58be2cf6c740487a4b
SHA512726db8389b0e2f31320715ed0b6aa127e632cd1853bcd25e49e7354d64cf40f807f91b40c6027698252cb0309583387776508e0872708a5ad9c783c092bd466e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e9bb164b146c19816ac495f855016b7
SHA1b40b2a834964ddbb60c2f4bf2846e4359cb7b92c
SHA25680a4805ad9852c7d437a7ed43ce0b9ff4ea113af30227fea01726ad46256724b
SHA5129ad49b2171a4e8c0c8edc6187ee983025a1e19a83261dec6d7cef5980409c5cd3be5170a20bda6be8b3234aa33760a893bd7b43e017ad96d25c7fefc41ff5412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d6cde335a2300a1492935e289f8b3bc
SHA188c0378c4fd3614c63ecc01479a02c0d563d8b9f
SHA25661a2b430649627a251239335d2cbbfc160ae5ea7a3c5375524ae948e66ae0415
SHA51208e4e6e36fe5c10a89cf55915e6d8c1b4d6277c443d883438d09a92c4b2e83f404328bd0b2cbe15bcf53861227766590b95743531b35e08b673f247e7d09a1b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aedc32bf6e71cdbbc7ab5571af801997
SHA11fbc096df0a1afc01cdc95889fc5ffaa84610f1c
SHA2563d3f39f805a91d3abc79222c15ec57b0e7e1077162c799c02c36926c5ff1da61
SHA512a7f13f395ff376966f18297ce6a24320738f0352b220a48e0c3b5589fad1e1088c960d40fefc61001bd5132dad07a7df3e4d652f043fc672b3e3048826aab391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571a4c84b58c5d38fd4b2268ede436d8c
SHA124c3fdc064606c543540774f87f18d88ecdf2017
SHA256ae527aade5b89265d93b58b4e1decf5398e047414d82bc14c091e00ecadece7c
SHA51216e776f4cd4bbdeccb458e4fad3a03321e3b6188d69f23f1ece04162292e2bb43c360c156d80de635bdf5ba54f8650ac597ff934061ebec0aaf8b053be3c47d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1bc1b5ef920d643f5d2f95ca5b1ce85
SHA194a7daa012af6f90ee444d0713ebbd39f29b0c19
SHA256c80937bb5c04dceef0652bf950f81d93b15865e0166e329c37a03cde1e26918e
SHA5128c05c7de154675c4d71dba8ae980ea7b450e8a5bd32685f53e6f189ac330fd6b87099dda7a97b5993b3056a82491948157989a5f7a2eacaf088382c07ac1d977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de31438a4cbef038e25fd6dd68b2dbbd
SHA1d51bebbbc7ef10e023ca2947f5fa3030fca0d45b
SHA2564bc63633ba966d9f34b76cf877562fbc293d05ae8c34d3a3bdd1958da9eabf8e
SHA512066f69017618b8671f42b823d0ffdf105627812205d918b7d7a77a88e3e87e462f5c30540df588e48aa5ac8eef6addb78b81d2abf0caae9edb6285594a0b35bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce84c3c81cd7172e94de8dd9be96adf5
SHA16c148d68fb3b2b3ed83577a2e64998665d65181b
SHA2562f6a8a484cd4dab9370a8a2fa55c19e13759c263c1f59f9ffe7815127ab78ebb
SHA5128c383003c4b772998fb64d3e478242696bc1dff4d7f3bd12f49859dc8d6319809708546a16e68b404cf291271d7f29e7d291443f0677bfafbbedcdb3ced09fb5
-
Filesize
263KB
MD582d9b343653df88727fd27126a8b39ab
SHA1ceaa9fe7512910c99760f548c9b81567ab152d79
SHA2567bbecae1b656b8592246bcb39d13f4ff55d4d638e885f6cb2a7d1441d389790f
SHA51239519e16a33fb0c41287776d78c1728dc557e2d427b79956fa15dadd54b2f6ce6785069bd1422aad6f96349126a1d05db3acd77151aad3f29cc2e6fec9fa2129
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YV6H14B0\favicon[1].ico
Filesize263KB
MD5d87946516474a72c0d993d7b7fc21cf4
SHA1119b5417a6c1ca7d25ae9326dd2596c1320d24a4
SHA2563001b5f993f5e990f156679f209d67dbb0f19845ed9e706c8987c32a638fcca2
SHA512ca7cc0ab29b434bf42e046bff7a35083f9b710d26bf733cfbb38b9c55685947b8bc6963ee444228049c85a77725db514e96de55d4b6dba304bc1264345cd42c9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06