Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 03:12
Static task
static1
Behavioral task
behavioral1
Sample
52611bf0b001c020b03242d9aee98b01.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
52611bf0b001c020b03242d9aee98b01.html
Resource
win10v2004-20231215-en
General
-
Target
52611bf0b001c020b03242d9aee98b01.html
-
Size
79KB
-
MD5
52611bf0b001c020b03242d9aee98b01
-
SHA1
35cb120f80d9220c22f5204e8363113b07518adb
-
SHA256
dcb994f40531e37d2a05c2567f1d02f81b33da334f77b52e7b44381c1b27840e
-
SHA512
f21b64942322b43ce90508738f2dcf27270641656f1cc7b5b851ac08ad43890f549f08185851152c26f9c928f6a6583c2f3e9e064aa8336c9c39e77ad62c56ba
-
SSDEEP
1536:X8TppMJnjw28sDYDXi9WzjKDMLubNwspIjWtpK29uJiq:X5c28sDYDXi9Wz2YPWtpK29uJiq
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c193000000000020000000000106600000001000020000000e192abf48cb76ef8fca99a7463df21abf355d7d83df32ce2b5e46dc8a873f72a000000000e80000000020000200000001c0741a00644235cd2908c803265a82dc25cf06d9544b40d304bf96bce36777d20000000faf40083b8559e4d6eade50a230f2657487efb2e9c3218adb2aa175e450ed8ba400000002f2853c00ae87fd3299ec793e427a54d1758b44c5c55383fc4552ffa509c20435ade9a3aa99e8121153be760d79ea40832dc9d57a8108d72f5e48652433588fd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0d9ed2d3c44da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411104651" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5506A391-B02F-11EE-A018-CE253106968E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2504 iexplore.exe 2504 iexplore.exe 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2108 2504 iexplore.exe 28 PID 2504 wrote to memory of 2108 2504 iexplore.exe 28 PID 2504 wrote to memory of 2108 2504 iexplore.exe 28 PID 2504 wrote to memory of 2108 2504 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\52611bf0b001c020b03242d9aee98b01.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2504 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d88548cb317b73917650aee9966490a0
SHA104a38ee371ce738e1f44e5ac871c7dbac0329001
SHA256d103c78e8e21d076bd954f5480a9508ea867703e63eed952e5ebb2c538f07e8d
SHA51244e2617dbf0e60cb2d8b8965b28e0069c1624cce50a7d655f5df2fb4224ae9ee0fe0da44ac59579776c5d1efa7dcb2702655da313984ffc1a6bb68b0b2bb3bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54156862e2f980ac2607fd1d93ad29487
SHA1e6c7c9fceec31670ef3dd4ffe3c2b370d15c8997
SHA2562833478fa9ad8b80d432134da848b1ffdf62e7df884e74928b30a0adc558a07e
SHA5127a5686da8860fa22d92f4568a533221c46a28175f1dc92b6055133ce5af550476c44d2e78d5db6cd44fa1b8f00de1d7db8980519643fc0f0b211c96c15b8f694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8aef8631daf845a0d0479b1af081b38
SHA1c49fa1bfa4de90b31525f7d60ccf0cf1e2424223
SHA25600f8fb18d5b974f876dcbf2fbdf32c43c4342a1575e34442180a2b5059f02a86
SHA51234b87b9dac67a9da650248a1a61de738f5f1b96453ecd7939a0752860e564b0ffbb9d94d7e9dba597414275aa0e4bbe757b3c21fadb78c41a87d04014b61e85f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d248bc6d1c53de288c20033b83953af
SHA1f24ccede585e79c0c0a54fcf0a2589a001a2cd46
SHA256877edf4fec88e9ba53b1930caaf81cca6ce2a87b085662243e95f434df492daf
SHA512776b82d0611b68bd35c4de9f2543960e7bbddfd43fabf231480544f5fa12883b0ca9f74771f9f4f1801f1984ac408c0c6e6811128c06ce68b1f6afea14bf71f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db0d2c8262a62053e16c1eca4deff898
SHA19de8a1ab782b0ac1ffce35032c7618d0b83e9217
SHA2566499fa2617e4ddca4a176cc1a9ca18aa9e409c454081591fc78bf674d1a45121
SHA51218f9c188d2d7a5aa7527c975297c02abb481891d801b6fe08d5451d21683d00b27bc4af674c2a6e31ea225c8a882f038e6e7607197df5baed94e32419afeef72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff66bd54a83f84ed8b34bf8360fab787
SHA1bd2fa44e1700bb9d43317e1666e4e5c72e20166e
SHA25632b51a42ed5dad7f58b3e246d7ed527bac2e68df02f38bda0e10cd5af7899be6
SHA512e61812a52d4ca391eeb44d0b696f49e225da1689f35f47babacede77c7e4fdafc11762527241d1f17f1827e52b5436f703126376f265c98872307dfeeadb3d42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5132a55229d8a6522beb135b223bccd74
SHA1cadcc5cfe51e4e899954985edd4cfdabe7fcdfad
SHA2560d7e0010224cfb4e34ccf63ebc45ac47e59c25c6cca59732cbeb8b97cc8ec870
SHA512bf66205d6ba1a32ca3d9d148f817a73b246c6502afa73073a0202dd69df3cafba47571abb035eaff615a168cd05b4a2b772c21ae5ce9a3eca4e39b52aef57001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c452ccd53aa8cdacfc2a50bd668cdbb
SHA1fb71fbf837a92c7886dd9aef353c922a42169ce5
SHA256a25020082681d6cd087c09d32ca87021365e1f4514926ef69a7b0f466918ddf6
SHA51235cdf3d210b0d2f43050d712b64f768ea24502d97909d98032406abde34e0ae375104c42f8f28d3f0ed787e90d40921c451b6358889268b64caa49ee225362ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0fa310cc30072905ba42b7b61365244
SHA1a5cae481e630b6353da895f22e84f3dc18902b01
SHA256d9619727df015e0259b3707a3961e131b97edf638ffa97ebf72c691f305b59e3
SHA512c9e528bdf526ae4b027ae412beac5b631ffc3687dad42d292686a7e58ccc2f3f5381eee5a09ba8af19461a5d45b9f71e73a9f1fa2bb92b8a5faa3c7796132efb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520be4dcc0738f7ae6792e86a23b3a479
SHA102cc19686d9c2d5e55e3c3dedb7aefa37f4ee0ee
SHA2566fcc57ce935c27dcddc706e6cf052fe7156eaaebd8c616d16f7ca4269a92d019
SHA512dd6dcdc9470d5061cd354d0e042d31e921ec82f70593827afaa436e865bf59fa59d6314ae0134a87e1fe15726a4a7409938855ee88a4fc7e6135627074d4ee9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5216b59ab5239773afc630b70e83546a8
SHA160983091e93fafa90d93908d7491976a4f431c8c
SHA256e52987ab705763e09f0e6f7faf9f52f4bda4486b45fb49fef17a8222545424a3
SHA5121e384f9cae42df678db13419f371aac4468a38c385c8b744e6c0861097f5c2ab2e594878ff4c28e6fc3d03967b1318441bb3ff84026a4d9c08ea0b2a478fc0a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5c51e4a9bda3323739ed2495e3652a4
SHA1f7df31c31a2b041ab775991bade08d0b8dbb5975
SHA2568cf766cfb46149c0bd75222870c1a19772c9d0fc0bac82f00d55461636b20782
SHA512253d1ec9bb08bc78984dfbe523366f72c218db51ed9785fb60b5b8a6115f4872528a8143bf223c0b69623504bc2a3e7585bf63214f3010035874402861bfbd31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eef23c1792bfa573cf6aed26dc2e5019
SHA1fd967acb84a1c1a82b763e8e8136e9edc2aa2bb0
SHA256ae5f1efe44d5a874fbc2c446e0bd2c8ede963b40797d8737f8275919a4305082
SHA5129c7fa120f2faf2d3718e6060e3803b344c8d18b7231232dc3b14eb582d3ba952f59773cdded927a2ec12bce5bfa427cf932ebd31e6252acb197e30492d9a107c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593678112b88fb4eed098cf83e3319c3f
SHA1a769963b797c01283c12c8c9172adc2555c30f5a
SHA256c46a95528d66cdd27d2380f7d24da47ca67bf882bce09a1d0b69dd9506edc360
SHA512aa88be0515785fc4a9ec49ad6fd2301068621136c4cd84f4f9274655844f2f2dae730edc3556a1a65fdaaeee59612aa28ab7b08696854e2f45a869972d554577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551ed30206e1ac1ff19fd813844d9ccca
SHA1c48f401443f79de6188a743aef7eb7b8b04e9229
SHA25614e1c2f764fbf970187a6766b9a7aee9663e7563e2c5c4c2d279d1bf33be2dab
SHA5126d3178faec63b79fa5c169af553e939123657f548eadadcbaa801742dc8d05910a81900de60aad796bbe4054295a6d1177c5b7fbbad37694b6f48ce83c934e42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af3442d2ca6413fd223feb978f0d62e4
SHA179c2a06bfda36e21d51a67ebfb0d6568763ab8de
SHA256177faa6c64db1de1ed129b58af70d2940930c58846b76d37da84efe9b3e86bb7
SHA5124748d1cca0d6199c8234ef984a4b5d658f187e3305415b5a7bfab436284721ab9502bcc9b9377a5ae767baf53b6a2e6c3a218cb95618373af9f693cb240219a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e237b3ef4a3d6aae4f5897f9f4ff4db1
SHA113dfe7b2de66c8380a3dff7fe5eabea4ddb57e70
SHA256b26a95aa9ae06844833b80c17ddeebae26cb2b9c285ec0e36d59240d105d44a0
SHA512d983bcea983a1ca83003356e62e4a2fbd7d420e0c4781d94df871c3ba737aaec1f1cf675db2b4f967cf748abc6497523d3c50a0d2d4b49da47100ed2f35b53ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ad3bc41814aa544b6948eb0cc2d481c
SHA1fcb884bc817a0118b4432ffa4f57d76aa7a23287
SHA25677dfc3fff318d5224101e8318872083cba07531b9918b31f9a79c80f4ee61ad0
SHA5126d419da023f1b9d44f3d892416ead4b14ff50d729b414fce2dfdb5e1dfdc3d179ece72492ee2fd97ce57c97eed6d0ec3e1267c1de5e50438d034606ba1fdb2ba
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06