Analysis
-
max time kernel
119s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11-01-2024 00:29
Static task
static1
Behavioral task
behavioral1
Sample
520c3ad570a6dc162f9dccc3238460e4.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
520c3ad570a6dc162f9dccc3238460e4.html
Resource
win10v2004-20231215-en
General
-
Target
520c3ad570a6dc162f9dccc3238460e4.html
-
Size
25KB
-
MD5
520c3ad570a6dc162f9dccc3238460e4
-
SHA1
68c8d06d7eb7a058b3f62497aa10789b23ea71cc
-
SHA256
a3ab5da353b6d974650233d41e1320b883b7eb2ac6efe9b1d9c47ff1fdfe51ec
-
SHA512
a3946b131fa88bf6c317e5448e8c01b41b9a08eced0109b7b05cd78ddf7a1b3c1efb8d2a69c5398acc57db51c63c5777931d978c51e64192de80d6038eed56e6
-
SSDEEP
768:ck/QpKcSyM8nD1F/zG+8M6nIrFoj9iHl8mFs/iArPWJOCIs21as9RSl17wf1/oeZ:ck/QpKcSyM8nD1F/zG+8M6nIrFoj9iHW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{77F0A7A1-B018-11EE-A7D5-D2C28B9FE739} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f1200000000002000000000010660000000100002000000020f73a56df4fcb98c2238bc5773a809afa1b0546c461d33141a00f3448b9dcf5000000000e800000000200002000000069d3ff7e8e5bb4cd2489f27d04df1d14fd1f6b2685843e89b4938628dd3fc990200000000e5d0f8e78b5568b7a0558e412322101098cc14802106541d11b89e43be0abbe40000000f9a70b1b36e44d6876dd335d6f4305e25ace92128b2ea3ea72e7d4144ddb659e65e44aa3ea760a8ef0b8f0465b1d13be739b8e09c0f6c403a07d77421f706962 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90edc5532544da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411094839" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 1084 IEXPLORE.EXE 1084 IEXPLORE.EXE 1084 IEXPLORE.EXE 1084 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1084 2156 iexplore.exe 28 PID 2156 wrote to memory of 1084 2156 iexplore.exe 28 PID 2156 wrote to memory of 1084 2156 iexplore.exe 28 PID 2156 wrote to memory of 1084 2156 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\520c3ad570a6dc162f9dccc3238460e4.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5e9272686823122d1a8a0a16ffe264258
SHA1cdfb8e12f878d8636ba2a8e0ad9da1011a99fe2a
SHA2563b3e106cda6b7d5052da8a2fb3b4a30d2153d5150ff2b8f9639c8810442e7b37
SHA512bc891733b0e90fe49338c401f905ac38d61f84756bc659d17b409b444cc158ea52aab947a0320c189cfefe6f418cb6695b5e10a24927d05933093751e2dc6939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59348ac18583d1f74dac70515a9e372ea
SHA139a0613654eb438ab15e8a4f7c249dfd954bbc63
SHA256af618fbcf7242ef88e2329fd580c818d86954bb173c3d8e1d846064d83f2f5cb
SHA512dd8e861ea4932ea30951b91bbd020c0a4bb7d46733b0bb3f33ec51ca12a52f63e2794033fe31b02a2841d2a18017fa5ca98e5868a54d98010bb95485c6a5f978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb2453530bd12b7c5377793c1a744819
SHA1542c3abdcd38f48661027c3571a8af645a8721c6
SHA256d78d4d278047fab2d26c5e5f2d99f82b34f9a9d000032e20aa80886e35611bcb
SHA512008ca2254dde4d1063c5d1c35530c87f0cdf3914e8ab56ebd1d3a95aad809a36ba888814f991d06356014fc2bfcf6766b9a3902ef0763e64f987624d15f701f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee475866b2e5e127040af1c5f5decace
SHA1d6ca95743535e80df0526239a6f2f35fa8615224
SHA256e439b11feccd592221db0fa6b7d3c13e9d67a41b72070e78f7075989ab2f9ddd
SHA5122b9032b0274ab8fb87b73aea2ad23fe104bd85e35101ebb422dc26e0443b68fc51ad2be496f55e2d7b3fb22d93948d65eb9c975d358ae69a8b5be96ad3e38f12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fd5e53f1795855caf486dcb8fbb0df2
SHA1545181659b3d02f6e5742e12ca3edf62dcad6073
SHA256645f68adcb7d087da012dc0ae88b57514d8466313d5a18e82ac524a26f9bf8b9
SHA512a8c15aa4616c6cf663dfc09bcea59821cc264b5f5d78bedcc2aab6e5b86c27d525aa5eb647234c624319218b4a16e4ac08aab14af06b59918b9d6e83d66ab0b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5348762300d66d25d4c26e73e13f7ef17
SHA1433766a5c340ab9ff91fd7139d1644ff1495d4bf
SHA256036a19e58470220fce642160288d699820f5b13a9a9dd139eb0e8afa59c5c2be
SHA5129d73c1c6ea05ef6db651d4524a5397cd1907a1eaebbb7ba2f4028892b1f7065fe40b77cbac132b6c3cb37fd344143d097c316e27f7693671620cb28484ef0559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd522051a3b8d1e98bffbd371c7b7120
SHA14d56bf945b4af34772f50e4091274c69c229430d
SHA25665ffbca09a5525c9ca5a62e2f3efeb4774686caab5d76d054999c176927c4084
SHA51278b2552871ce4ced4697512188d7458bff8e945095aa819f34b500216af2962245e47d99e8eb69047a077656c52dd01a86cb023dbdef7e589a8f878d40b90c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5548f67f8212ba7a624d5873e4e327632
SHA10dc4ac8ce8591cb436b3ff9be9e3573b4f1c5045
SHA256aeb6c45a61d31851aa3d226f15a1500da98d96d8db4f9f530efd9d1c58c41fdc
SHA51273f8a0acf0e6a651bac5c309c34d0cc341ba76818c817c86e17e0b615f8c3ef116d8481f26e37dac9d750b0639409041509c3844b75e1b77c9e0541922a507b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d611db8da4293e05a6310fba3b5ffb3
SHA1a4839309ca81192a516972a2ecc7f2aee49bdb14
SHA2561ec6019ecef6bb6693f8e4c411c3ebc202a2b319ee47dd61e4db33b4ce5c35f9
SHA5126961357a4cd177d56f0e17edcfbd05af5b01b3c3e55e56be5e3a213939b697e31e10e3072480c64aaa70d318e28292d784b0c3f2b3c85c212768809aa3c87f62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ad61a12e54a8f15eb6b31e4fd9b9926
SHA17a8143c01f31064156e5d167aef1bb5d4d9cff16
SHA2560a9b99f66f892a8e94764a2df235b7799c62155f0ad67928c4707bec01044540
SHA51247ef8101955a85d170a1193f4ff0029ff238c870561316793ec2f6972d9314e37210e33e159748251076b25e99820a0ec1f5af38f8682817e740bd85c996127a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac4f4fba25a4662a854fb48aa2971879
SHA1dd5ee81597034940a2a339f164ba72e1f60eaf4b
SHA2565694199de397a0724423858a22e9cf8262544c1746a08be048052ffc798ca4cb
SHA512776dcc4aff18e657111e7f8c2a542e939033e95f589a63b156af54c143c57f78e1d7ea6f5df0ce9f8f46eca04785332325591b6b0b6ae618e27b6ffeab72abe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5782f811dd0521d896822410ae03cbc83
SHA1c5777f40ddde5d05cdbb876c4663bc188867f4f2
SHA25692c74e7926283ac5a01ccfba041bfe2d2fafbb55c59540b771b439b001ddff87
SHA512ab062aae9f21db96dfb62631d7a4176b4c420bf4e169cc6b0507a103bca1923b9c2d545e828e1bca085eed1ace7aba4cf311359b27be156131168bc3159601e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ba3aac3b1bb43efbe2e52bc216297e9
SHA1d1b48d89ef28682ea2d9d0d0d152e69996286c68
SHA256deb3847cb2b03b125a6b8c1a2afc07290d4e9c99b6aa8341ddf22ca53d0b2f2f
SHA5127c0c6148477fee5f05ccf218f0125c9a7c27bb2b981a6d1df95abb2ae46ac5dc7989fef5c97fa637da0dcf783977412ea4305c2f75b0f3b420dfda504340ce8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0fbf00bc1dc14165bb502b2382fdcb9
SHA1c268e33fcda3d7263915a02aaed740ff7ce40e91
SHA25644d11fa823c8c277128838e7dad353f8beb988d53fe8700afcb200e1aa5c1321
SHA512a0cb30dcb95910e1916989b5e473a29fb05eddc0009e7904fb9e689a587310e2d1b06d927eb7902180d9801ee544bb74dea3a569ff6eabc9dede53865944641d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD55928937bfb40c7235b851d1b7c5920e5
SHA195d8cae15791175e52d073ea69c9a91998497561
SHA256412c5e87997ef803e7076e084ddd7b77fda51ecb67de980019bebc5d8f6b4db9
SHA512b4e167cb9731499f2fbd673dcb61d7c49835e001baa37635f543e02974a15e0db82d25dbabd0d5f76956f60c7eab4c639bd8657907ca75b108659d121e617ef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06