Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
PO.AAF.232150FMS-signed.7z.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
PO.AAF.232150FMS-signed.7z.html
Resource
win10v2004-20231215-en
General
-
Target
PO.AAF.232150FMS-signed.7z.html
-
Size
6KB
-
MD5
cf2a1ab7f9713f968a0a80f065a88a80
-
SHA1
c64e38e50a2e5f13dc87f44c6e79dd376b731e5a
-
SHA256
c7a872aad884af56e7914c5c30e4bbbf34c4608c093027f3a6d074ab57ddc6ee
-
SHA512
a5dd2997ae9fb4e61b43190527a450375da42442cefa17583263e5a41cd21e14b1d174b3bad3f1eedd916a0162c3b90de645ec3051a90e2b3478fc7d489e4bbc
-
SSDEEP
192:koNzgvLoq/wlWpvsgRn4zRhk00CJLi1qpqzOXARWMdThqxDFtQ2dqR:K/wlWpvB4zXk0RJLAqpq6XARWMFhqxpA
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000000cf35b34d29840fad353e971386b955b62d79ca0a476e4339ddabfd00af80d85000000000e8000000002000020000000e855a7b5d80404b3198eb293353fb0f874a6a34f2e74f3d35c4afac66a9703f52000000029295a71229dc051f80082260b20f1ea7ca9f3ebaef7b55100606c622bf9a4e74000000094046ca51bac14849dd48157aae4ce4dc482ef996213a487eb2c51492823479f495981b416e9cc2fae0048fc9e848de043ddc2f17ee976d90bcbb68a99215100 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1F5E8841-AEA2-11EE-995E-62DD1C0ECF51} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40bc9ff5ae42da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410934053" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2496 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2496 iexplore.exe 2496 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2752 2496 iexplore.exe 28 PID 2496 wrote to memory of 2752 2496 iexplore.exe 28 PID 2496 wrote to memory of 2752 2496 iexplore.exe 28 PID 2496 wrote to memory of 2752 2496 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\PO.AAF.232150FMS-signed.7z.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525a765fe94be621775897e132f20e4c3
SHA13b4ffc81828733b2fab5f9dc1e2d012bd466891e
SHA256e1d3d78dda0df5bd7ea10681c0abe4ae9ce609216b433ca0da875007d797bde8
SHA51234527bb990516741c2d3b814a6995daab9ea66b74e71c114ded2f18eb39074a0fbfb33d608aca26c07274ba98196e9c78eb1e9506b95e77883dc55da33cc622a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e8059565ead2e6c95a418c59cd07bc0
SHA110a734b036facca4e040c8c30e1cba102b95cbca
SHA256eb04cef17962dcbed30eb789b3042049c8e7faae4f786d73c9857df5c9388eeb
SHA512d8dd4240c5c7e5956eda60364f9ca90958a4b6f22c768bcf3259d536eaaae458217b91239cfaebd420d4f22890b1c2e2a2bf84cd39d9083da0fe4829a208f802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527aeeccf9efd4991dfa0be06d23d3bed
SHA1249a14adbd1f8f915dcbf36072cf21195ca4250d
SHA256e3d11734f3133177f04879134b6d49a8bf195b06d1342b25c38fa535243943ae
SHA512cce71c06b80d68da57713049d5bf8ffdeecd2a6d6ff4bb3c3387ba0e566eadd57109358e3d3475b5d6d20201194c2a0fb5c0c4957852b58e7115940951da6641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545b664f1079b76e883abc626c88e652c
SHA11d964de8015e19125828c346901ccf36bb5f8f6c
SHA2568c0a7d08523262a36d6da3fe9763d74a0a1eef9fc420db250142e0d2d83918f9
SHA512d299bd277c2575e04a8f06efee610ee1f3f5eb34aad7096acfe433c59a1d65740b367bc3a8d39d2b67bbfc514cb90409aa1326cbb900b83eb25c6faa02ad3580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a499aa729b07af5ddc61f3e1bf40803e
SHA1e37c527d91de6c592650d40185ba5af0deca52c2
SHA256257c330103cdb950d8a134ccf884df7835ed1423f4ffde06f564c436deafeb8e
SHA51248e292884754fa7605db19fc199d2e34119a5c7b8e7a658ac8007a7e57e434117f55360c5cd1feba1eb684fabdc7a08c573fc56257af616e01d65b479cbeb20e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554c80e9fc5d62c24ef65f890c6d51084
SHA17ac0e577d7c9fc9f73ef42d67049b87c232f1c95
SHA256c95b074067b768abde502a80e6c4cd1f85c79bbbe3547d924f63c7f470355ba4
SHA512b7f69a65cf23c52946933688515b319c743582697a19ed1e6c1c90420370edfa355b1d526cae192d9a44c6eef53c9006a79184a5d7bc202ba76b55cfd33ceab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b9ced7102214c75153c06701627ca5c
SHA1c92bcb782520db223218635dc0fdbee18c1d6c48
SHA256c7a994ce32ef2227f2215e9aa7882a71fe42afb3dcd541cf8794e62cb5cd5c40
SHA5122ee00de1258daeb4274aa9658af731cc9216e3cd5d81b8a2f0b8cfb8c69d45e5e1e8dafe3eb4309a624ab1ea93baa3347149d137b4cacd8756c4b3de2488b0bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598b96b65f6ac45e97db3ea2682d1096a
SHA15adfad29c42973fe6601eadee2d4d3d9e3a23c67
SHA2560e9f6274b0bdd0150513a707118154a06f9a1ce29132158ff845fd9f1e869df0
SHA51297faf7dfd6615e5ab005618ab676030df93c5b8ed47d4adfa3611085e2badd64952a45f69e0775184ec0592addfd000211764d346b798097af24d03f85527a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4312aabac2f7ef46688b30e226181c3
SHA12b8ab90314ac0768800fdb89897bfe08a006e67c
SHA25653c0815cf9005c8e649c122bbd6315b0a816cfe6a6b80d41dd0671282abd8b22
SHA512c886fb55b660d6f88073a29f1c3eb05dfb6eb6ae75152404781fa85b12b3f298451b56631974c586cf48d385bff9ef8445bda700da1a1c8e5e5a07212495f2ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5786a5562cbbc0786c510516f09dfbffa
SHA1a029228d6adc8bd63e6e2f252c6ccba9ddc1a417
SHA256fbdbdd538f77b3aba2a133b0ed89c7081672bbf32898d940f79ea625668ad5c7
SHA512af92ca87f31c9763a9aa98dc0845555fb164d216056bbe53675b4aaf9ae8c8b290e9f0decbe37d188dfec5fcfa1405824d51cbc2f7b417079f7c1f60fa264e48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c05a8d663c783ce7b177a97aa44c5b4
SHA1f4d7aef2f8a5efe64d9d102cc73f552cc65c4c51
SHA2568a5973fe6f7ab8487dbc2f5b948a7f7b28bb88b7615739d4ebb02a358e5ab0cb
SHA5129c75a9da19423da51590178fe0d8e458c3de9fb47cf0cfa3a2c871f5a79f52f9580f9d7ac1e062d4c0cb92604c8fb43f3f4332578a69ab22a52a396a80f59e8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cbbc01352f294c12e5d0df56963a27d
SHA1d1dad03f916fbddf9679383845ae4bdd937ba8e8
SHA2560a5ca6412849804ff975bae3f506606471013c6d18cb75603d1e305fd28dccf4
SHA512b017bdb8b0bc538f1a4e0031dae6bafca76b766d1f8a150240b79d8786ee4f665c0b1914c4fbe89cc8cf79c28f09639b8aa179846a4adb625da23e50ea50e162
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b119977cb4fffd11c3d697c8703808f6
SHA1e2456b02550b2d06ec247f62692bc6a6fd7cd815
SHA256766efd4b5e83905bb2f271e978ca54f57294fdc3f630e299ea56283bc0147b37
SHA512ed8b41e008ecc901fed13c26812e116b31649f98642d382ffeb5c25eb747091909a04ec07af767024ae6f681e9c177dcce61566e4e715e4bac58b8a62c007616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559f07861bc917a586d51895f58412ae3
SHA18ac9230dfcc5b955ddf990106cd601c5110e02e6
SHA2567bbb1b20ce32a53f0a7959513a847d2b40accbc15d9a0db33a059fbdc1793215
SHA51238b95154b1d3045c3a83075bd701113eb170040cb06dfceafe5064f6cbfe2b511b2afca8119a48967df7ff5a7fde6057f667363aa049f27cc02fa637755a2e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ece4435ab3a3520cd7baa0d01add4c38
SHA1c09bd6022baccfcb539b4b633926fe3d6663b96c
SHA25643379c22b40c41758eeef4bf8b2377025e8f97e3f0f120901e2eeee3c79fe044
SHA512bd2f6d5583b4cbd280806d0f12b7f6b90266f8e4d9d85cbd72bac7e44567b60c4d8ac2a1ccbd5402189d72a5603b99385677bcb1f4b9a8707c0916f14cbda5e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56382ebfdf24e3543914996be55f6a215
SHA16457518dfd72f9863ce0c92ec56676c2e1cd6301
SHA2560809f3eec495716f7618f4f2b64cab029e0fa09a53b350e960b139e5d5c88f1a
SHA512d933b0c7fdde06780eb10cd683f224ce5d0be2d668015138a1fcc350382e0d401f5bfccf836fb93a8ca98ff3193d7905124ec855188e02b1e8c6f0bbb60ffd0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b4bc8359d5fe3cba79fc18a6b3efe52
SHA193f42c2d166139532690e574d9803bc910433b74
SHA256462f18a5752ec03bf02bf346207342c20078e0ebc30065279f1bc92dcd12d5c6
SHA5125036fa49361f03c9619d0a741dafb1142722e5c87c56e7cdbd6f1296c73b7ad0d3ba4df80cc8ddafb65d2eac3745a565e92c7d42fd9a06a9b2e5feaab9e32845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c5f4d50ca552416c7f9292108ccbe05
SHA198554d74ddceefdb7930beaa26b5c49ef966ffa4
SHA256d6efc9ddf2a9b8012080219a59683aa22242f5dc4d119b03d946fbc212b3580e
SHA512c5196a758ebee566825da6818d8e0a7663ef437832da0eccb585595d6f515330efca30a6326fdeb05182e001bb4586eff52439cfddfaf792c04f4e776ad008e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbf7f211d2cca5527da82018afb333d9
SHA1f33078a26bea14f3b3d2a21c8a02369506817199
SHA2563d4d636ee0f01ada83c48d5c68d08e86411798cac644c17afe16c9ac3d8accec
SHA512c16e1ab74d8337dc6b74b5839d2dea758d9387ca11f9dbadb2d0d7c45f081933fe56cb96d61db8d28f77cd0a5e0c969943e05f46448ef6fe88d66d6a9f40fb98
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06