Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 07:04
Static task
static1
Behavioral task
behavioral1
Sample
4fe5eba355b423c9cef2290bfda4f3eb.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4fe5eba355b423c9cef2290bfda4f3eb.html
Resource
win10v2004-20231215-en
General
-
Target
4fe5eba355b423c9cef2290bfda4f3eb.html
-
Size
120KB
-
MD5
4fe5eba355b423c9cef2290bfda4f3eb
-
SHA1
9eed957f4b3921592100a02367cc96baa23e12a0
-
SHA256
e26514633c7aa9baa0f23cc9b7b8fe823a77da43fdfc56c52b705e73a5bcdf45
-
SHA512
42ef0aeb3b7cda24409ac30d7639fafd5fd27e6faf597fa4705db33ee31e4a3e9370e6a25b1dfb604c1516a7253226aa9a6d3bd9952bc25c93d673c7d583e523
-
SSDEEP
1536:kaSYy+IpK1ttU4BSPtPgP8rSHakkmO/82KvDKyfVEZdAyfrB+Bi/40MLv1D6lf3L:kaSYwjSURhUzbbIh1/rWHM/+aGFqr/d
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F979D121-AF87-11EE-A586-F2B23B8A8DD7} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411032783" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000155122d8536658923d267fb07a84ef5b8dd2adc543854f7d002adfa5a76b5c38000000000e800000000200002000000033d26ec07da981c10cddc145a7e99e79558684f6b0a953b362233bcfc913563320000000bb1da921578d4165d34e9bdeed79dd790e11ff8a9f084cd2d5c3f9bef8349c80400000009c71a4d75450426d544f9aee383be5543412d6225e22eb91b16cdf59128a717f3b8043ff88064ef32648c56e10e63e606097519bd2d3fe15dd28242e19aa116d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0edc9ef9443da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2264 iexplore.exe 2264 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2080 2264 iexplore.exe 17 PID 2264 wrote to memory of 2080 2264 iexplore.exe 17 PID 2264 wrote to memory of 2080 2264 iexplore.exe 17 PID 2264 wrote to memory of 2080 2264 iexplore.exe 17
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4fe5eba355b423c9cef2290bfda4f3eb.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2264 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dba5f2dfe371596db2724e4965ac0b96
SHA18e47308be798063e099d83582a810d7424fa10d5
SHA2568401649cf3cc78806957a9cba17cbf899de5d8aff9ce43895b67eb99dd92679f
SHA512cd39344b7a2de680956fcf54f4f4bfc6a52d037df12c4a93279ad149c86a0c7501e9f9ad05de2d8035b24c45c4d498ccd2ae1d465251b1c5198d60d802dff61a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51120701feb3380d065bc720df23657a7
SHA1a9a6d1ac531c5aa1b16ccc67eaf383661e8cdee0
SHA25617cb858eb95ebbac446bfd8b3eac14cfb1d8549f77782a67c4ea30e81d9aa4a7
SHA512b4147959407f70a9dba47023b4257c660c9daf86035ad8681af6998a8d2f804e0a420ef1b27d552340ef0f03d9f53259ef153acfb39ab6e6c3cd6be33e2b2dc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccc55aa7cb3c1d67b8818dfce66eb0c4
SHA192c7da0dc054b02e807270634afca1b844d1c325
SHA25686430c84a93838dbab9156a1a6d3c0b9e6d397b06561dc17b512b96993d91a4e
SHA5124f4b149c33ccda5ee0ad5fe70e1bfc30508218d97d3f00e0262425952c5525c7691bdaaebecc32667a464560355382212dffeabd95484fc36badff4df6cf8809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55361494453e13c5b89fd8ca78b6c02c5
SHA13c1a4d4653d6236f6ed09ef5597c31c6c3707cf8
SHA2560ff2ec27151bf2998d94a1ec0cc57d12b97d1a624863ce69a54f73fa41503ac5
SHA5125c8d4dc287ea6347e14d3e4cc74501eabadd594283ab7cbc59b18b1f06439cb34f17dae2d2ad33b179e798f36044e1eddd48810e33862677612011f3daff969e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed0394dbce7097c9dad87f28a40e8e83
SHA11617f59c96fac95ab856b3c823efe6b3517e3102
SHA25691a08fd8fed7131d749ce6c6acc12ead8ce9cd0cbdcc1e85c5dee3b6f1093cf5
SHA51224d0b03059081f00463fc2fcfe4332ed64fd50abc9f69409f781131280da298ee380122e4dddfd201488833175739a5f3ab43609738d5241dfaf123c244172d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d2e3fdb3010619a91473460603aee6f
SHA18303b0613259e1f520f6fddf5598a308f7dd9139
SHA256c4e96ad25d6b0fed3d157bd7ada8274bc815f493d76c31302f2fc44e5a745a77
SHA51264b87b1b3fa2ff852628b778fbf7bd0c19cb5decec6042169b3305d2fe7c651c4b87cfc143c7860c1ec86865031dcb64a39dd2bf3c57db62778c285522cb84e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52df46d1de4bc44b6a42d2cdee151ec0c
SHA1dcfeb17a009549790f6c9a41be69edc83986bffc
SHA256c6697d549d490eb1b0127727974dc5aaefcc6ec79733d9b06057b9f87e4de932
SHA5122bee9131b85497c8b23aa0e02900e4eacd71c1efd571246c32522fc1f978f6750962db55ba81351de8d2a8777e54b9de8f85203f2d964a16cc385779a9df0880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510cd32136b380aa227ea943ca7c9c99b
SHA100355be87eafd4fd35a4d14b6ab3d010594abb16
SHA2562f357d6b387bf45522d96c5aad516bea3ba55621a4929460f224015143f466a5
SHA512a6a22bcde766b2ca47b6ceff7cb6eb9c67db0fa5c0d6bf2c7b484012f20c4f69794c42f7d6e01ee14a6e7a547bf08f9ef11be95464bd56d717e3c9c919e06676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d23534f14c5f6550224447a1b87e4fff
SHA1f82985a539c794b46901b230dad2bf5708265bb7
SHA2569c5964b843a328071893c9485b371c2afea38de08dba9ceb697e15d97cc414bc
SHA512194f9ec061267bce83de6654cd573645fdb024a15847eeff633bb7ef3627931ee326b6a36ce9d347d3cb15f022f6bd90f036e736091ad629a23d700b3c569b9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550aa24dbcf4579e8c79d914e373924f1
SHA1f4e571aa7c6c96d74713379eace5063ca94d58fa
SHA256902da17c1eac84130bb568ccd4f3c69d16e8c599f77f0b6534a01d6feb9c89cf
SHA512501e6f6999ad9e3a71ff0074f11b94e3288f437df85111f60c8b8e6ff2bad3262ade98255b98ce439d1dcc4d5f6e97aff031dc37e2abc610906196bba187493b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c397f5c4caf294beef985a8f7112d393
SHA164243d198f17a7b8cfe6e74971e05c40c0d861f7
SHA256d958a86feb25f59760fb4144e838284c2188c74cf5725b6300e660c7035f0e30
SHA5121618c5e8358951aeb943bcaf2e707fbb7a55d321c5348864e3e872a9a4bcbc334b04490fa51b0adea916baa9e4d5beed1d37875b51689e3225b1b67ccced0d77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ef66e23e51101a30e077e61a2ddef58
SHA1a100f55efb878c68ff98fdbfa05cda61aff4882a
SHA2567aa5536f3293dcef333daf8bc327d3f3645c6b12249e72ddcaf5eeebc9c052a6
SHA51218ca8763b645376271e3f7eb4368e22195fc36c21805d02d297d894786eebaedc7d9b83f8f39de67820537f4a0202979a852b8c158d48386b5270f84100e88cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52317271deaa082c2c3f3924395aacdee
SHA108efc7df648df23d466d3bca8a91856890f740be
SHA25604a59fd9d00a69f272816eafe118c04956852b6c55f7e789a41f455ae9e73091
SHA5128d12a446347543cf04f0fa6eeeec02dcb4b3b24a4de484cec53f982fef46580b6be84409317947a168f2ae906225e2dcec4391d664c6142a184417c869677791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5403634e7a82859c2a49b3d6d1c39dc18
SHA1a515ec1003559c19763b224e7118e0f8ae50c214
SHA256891ec02f8280c97ac34b143307057852e20e81cda1006dd0cf4a941956af0b65
SHA5126c479f50dea47dab4024a244e915f99a5e49ce27365462c3d16ed9c2ea0a6450525e44b83872856c25c6aa57bc888df59b5d8d65dc7ce14f4ad83f2b11efc589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb32da9275e93c9cce09046fd7c693c9
SHA13b14c85c01056038983c8673cd5b6f32475493ea
SHA25680e97696f431cf75a0d56b05d9ac0c96db857486110fa3d40182d0b3af7327b5
SHA5125fc9c75466df32aacac00e9a51b12a6ea8ba0a1467c125b656b040ea06745aceb62e376ea2d383193a7eadc90639ebc2e03e8b46c2b8bbf389e3219e288effb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559ea9bd8425a5b1324e03f907b6542cd
SHA14ab630709cd910e161d5e78aa4efa19bf163ce87
SHA256fd44b06e494382ff1263e8ef24e2f2c9dae96352e228b0b9120b62796afa8b2b
SHA512f2e3568ba9591a480d0042ea22238bbd789bc02c25cd0f31eadba5b8b95d243b8c54c8ed720a010896543352229e22ad212dc7c36a4227c0dcf73b5ea3217cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535d64d3d88373d3bc439947d566e7654
SHA1fc89596a5950457729e7ea370ebf5a1762c340ff
SHA2563534137724334d44e0f6bad994ddcd1c2b183b7769b9427314c7c4a3637ca07d
SHA5126653bdee0b9a6be01725f3986c1e93392cd25f7e336787f86fba3cb0dd2f576b73ee125880680ee61d8822328b00aafc9eee8e5d80af1dc88477189b08efb66e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5059c784c5e63b3315fc3b755a53d71
SHA19939d41ebf9698ed43e02c946d73c0d12f5859d8
SHA256c2116285d2b963f026f2d64b97fc88e4ff6dd2f0d724b56dd11ce8154a855eb0
SHA512294188fae521e1f56beb9428b96d03ea24cbd82fa6ece7debf487a38af09e18d75c9b4136ac0df039403a39a35afd7f7fd3d14bf22bd9d43d6d3594d0b2fd846
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HVBRC7A9\vbulletin_important[1].css
Filesize5B
MD5fda44910deb1a460be4ac5d56d61d837
SHA1f6d0c643351580307b2eaa6a7560e76965496bc7
SHA256933b971c6388d594a23fa1559825db5bec8ade2db1240aa8fc9d0c684949e8c9
SHA51257dda9aa7c29f960cd7948a4e4567844d3289fa729e9e388e7f4edcbdf16bf6a94536598b4f9ff8942849f1f96bd3c00bc24a75e748a36fbf2a145f63bf904c1
-
Filesize
45KB
MD5dc38d629e51926a750b443772d7c8c65
SHA12868765523e76b2e6706f18ecb665f4631a00d00
SHA25621a98ea45d4ca76fc03cd769b01345da379395b41295e1506644149d0a378883
SHA512beb8198332e8771a0475a925a4b31a8a80df9a04dc889442d1a4e024b1b66709acc3e347d50af1868d5d0c351d489cd454fc2523f752ea9dec56b9a9d6048ef4
-
Filesize
39KB
MD51c80555d12269305c3fb0018cf8155f7
SHA197d0b2035ba45c1fea71fd3842186d9247ce6f0b
SHA256d066547a61f0ec9b378a93fe25e6ef7725d7d27041693ff27045bf8031bdd8fb
SHA5122f5a6d556a5f012ceec4a97bbb09c1fcdbc20e557af749ca2f389a944164ce7f7082ed3f71f70382a458fc2fd36c504818619e529ecb8a0e0df6e684e65593ad