Analysis
-
max time kernel
122s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11-01-2024 18:05
Static task
static1
Behavioral task
behavioral1
Sample
5436b554b60f99340b4c557115ac71b1.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5436b554b60f99340b4c557115ac71b1.html
Resource
win10v2004-20231215-en
General
-
Target
5436b554b60f99340b4c557115ac71b1.html
-
Size
432B
-
MD5
5436b554b60f99340b4c557115ac71b1
-
SHA1
7885db668ee336016d6f866e8503eb217f8917d4
-
SHA256
5379011321c75e0aae9fc54f43bb0862d8a37c4e8012da98e694160166904b21
-
SHA512
8a3485ed6f4b15615d685690df1a742ba0b7a5a5352be3c39e182fcc829f2ccea92e3a2bea4f0f5c4d3f1740a12bb061828c9087004e32c6a5ff8b9174c926a6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411158234" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{119DDD31-B0AC-11EE-B160-56B3956C75C7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c193000000000020000000000106600000001000020000000c68b9d12422f2c016295843d04826c744eea5b48c5b5aa3868d6371114697ec1000000000e80000000020000200000006e16a219b9a785ffba5cea7a5a9b3b3c511fa95c0eb706b3e35fdb7fe722285c20000000dc00a0632250c7148d62fb2dee2de8a652e5febd1fb0b29b415caf3670375646400000004ae07bbff6e3f394c80682962400207b35e7c315457ff2d6abeab2bfe493cca93160d920aa01c2e2419f8b341e3adf396f34038dfee38fa44299db5d848b01c9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a079f3d7b844da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2652 2180 iexplore.exe 28 PID 2180 wrote to memory of 2652 2180 iexplore.exe 28 PID 2180 wrote to memory of 2652 2180 iexplore.exe 28 PID 2180 wrote to memory of 2652 2180 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5436b554b60f99340b4c557115ac71b1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52da7a835012977d3cf7e4c116f260a5d
SHA1333fa90c4002f7a82d7061c84664087508cf47e5
SHA256637eabc0b64bccc7c4a37a33f2399b825b2f043c3453f2c97841ccad73dbe4e3
SHA5128eb4bb6d32b8b8ad69b950485b1e3a6463024f53d5b9daaa73665396d2dafb7d68ed1eb7a601de0a09e475a135fc5251e915bfd02e4e5ab24ac4554c5d7422bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a7e94ccdae0aec31bf19cee7a5238ad
SHA10b553055d1994ec60181ed1ba1c96a928d45a4b3
SHA256cfead2f26b85a4ebe7e4aff8d0fed4441f42fe7e3f9b388d1d0acc1b378e5c26
SHA51293bd4ea3247efc23daef0686e7f2901d66420044c9b8ab39ff58283781ac7dcd818f124e229fc003daa24ea34a0d64a9f79c8cbb1c53299eb01fe53818bd588e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dd579b7abb5a456d836228622e58f0b
SHA1979f8bb326a5854ad3309248611ce77bac8a03d8
SHA256ed3663449a044c7890ccbc60728d821534f72f28ec9d831c349f05bc8f5c4547
SHA51213c1a42961bceaa3abd183e395734d45dfae025f02b52afc0bc8555d2c62d6892c92f596f9c94a872eea283f9d2021511ee99daa3c1cb6e250efb4f8c78e35a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b0c90cb97810c86e75eddbbd586c28c
SHA1deff16a961f71fc247a2c05e3b7191169e2bd535
SHA2569efb4626e8c155d98c8a6327c4df25b291cc297bf94940f347851fd43524e8c5
SHA5129a8f4edc418ed047697adb21c872f5f9ca7e1941fa0b67e4241ef6c8e821d338ab1b29ec4676dda5285081f5481d10b712e5df6140731acd0191d6e5b1f26d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c0d9c505d09984f670fa6a1c0e71eed
SHA1c3fd476623d63daf110f244976f7241f3b631073
SHA256428d85f9705f13c8e04cf271f708d9296c5db7ecd8a482c645fa06673d15f1c9
SHA5125ada553178ffad35ede49043c308c60760e5451d312b582477db269ccb2241fb5670935f963a77ca444c023c9252142ab9b299406f7b9633b79103f72e3a4dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c910d358d609f3978e6f6287360d2aac
SHA1768410468cf03488894c4f2a7b1755579ad28a4d
SHA256535241aeb4fc9805c7508b6eee5b1901a5196d01d78a3470df354223fbf249f4
SHA51229518e7818eaff039ca0ed64a6fdf4f94a55fac4debb41f6ad5baf9e19042f2ed8d2a0b1fed306e5b4352fe64882ee5b4c51b4f8ec7abc95ead6734f7677cf60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5903d536aa16eac7ea63cb08f7ebe1b49
SHA16a2ec3e194b2052946ac0d22841c0e668e6b6b83
SHA256449205810eca1e1e32f60cfc050b9673e24dd44374a8ad7bc6e4ff31e47ce424
SHA51225b36bde4910447f3d6619ce6ab3b72eabca6caa1e2b0b0d57941b2b099fabc6a9080372a58aa2e38d3fa910b6eb15ee8e613d6fdd821ecbfb8397388f165297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c7b68b292d1f7ee6be2d7db16a4d675
SHA1009ffe1565d8e56ee632b37116f903c4de928c4e
SHA2565770b902f52bfa1e09bc0b993cb75a7e4da9f3753dc72bc6593a6ab4c2a9dab1
SHA5123ec22af0be843b80cd7dac22c7a841de7dbf3ce84993fa0bc0e817faca8d449d4607b03afebd1eecbb2d83118f7fe9ccf8fef7f23fa7f666264fd89736ba7f39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3d83a8cf9811656ae7f9010c6abaecd
SHA1f6863b0e3b65fc2b181bc2082b698c35f722121f
SHA256cfabc2faced3b7edab16dd57a5129f9c3e9f2981a128cdf5c2a37969e31ba292
SHA512e43e3ece4852bbd5596bbe7885274e9ef16a8d17d4d2b3ed9408ea6a73a99ca464707076988c1d6e8412e334346e84d1916912af15a3983207903bf4981b11c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3f564ffd5213f7d426c3e986684b54d
SHA167ffd30d780b4abe7d81429df84cd5c686c7176f
SHA256f65bb8e569d12179d918ae03228fa755fea896f2457260b134f70f3d30fc29f9
SHA512db5c03ef2ea0e996677c5ab2513232605944ab154d69433cc8e67f3755e4cc630362c598610ad5ad3a32fb113687a6b517e5dcf5ac40106a6bf1a41de2c801a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c88a85e167b6b3a83884c0669e04e197
SHA1ee1913fd49ca93e600046d1a15057da98d76e25f
SHA25679ef2bf20d70c7253fa155f7f478317ebae07b162a4cb1c28f72fa81fee1f8c9
SHA5125de53412a0646fd18567f3d08c4ca6af68a3e55b0da1fa6afb0f6c9c3c79202f7fdcda2398b7fdb480284b39513be045cabbc0461eb0d9a32527f0e526e68e3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56183ad90f5af4e1626af24d235671b4a
SHA19816c3e8c5be339fa2dfce0bb6f928efef51f05f
SHA2567046edf048339353b711dcde454dc29b7922ef4460a38bf0de73c540b4158bd1
SHA512b9e57d004628676150dca55da11246e6446bd5d6af5a71804f270189f4777fdc8f531e6f0633bf7b1c67ffe0a71d6cadb913f28f09de4e94711fa7a7726dafa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5783a7738e9f2031b3d225a32785d3b7c
SHA1b16f8f8b06dcde052a73302ac7a4363ff00e3da3
SHA2561da51071dc321ea581c562c318e746cbcc51401ccee1dfc64691985f20f6d74a
SHA5124e9b30fe5e7083697279f92676bcad8c2c095d3941c3b59251cef671b8e377fa2e0372b17b8602810cc8eb95eae9966e62794ab32925c274a6eb457383ff7848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51319230f87bd9a2a7ecb66487a5e987c
SHA10e65fd4e9bce64b380a51ca294b771d514899084
SHA256f1a5a7a079379aeff031f451e061ef80ce1a49e5efbfd0c94729483d16367f07
SHA512d2d6dd81047e20fbc65f6219047aa65759a95a3cdb18ef835c9094e892c05e481ebabd357b466e991e40e82f99a47e3689751303cf1cd772e81381fb351c7342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae91be75a62fefd32c668331f4ba94ee
SHA1d2e69be070401eceb221d552edc7aebc4fb65ddc
SHA2567aa5f01638c7f992021366a44264566dad013d1817fd9e535f8de0e17bf7e314
SHA51235fa8a81f953c97fb03bf6f1803ba389018e1c62b2c88bc74cb4f49a83af85eb7ff03b815111f1b858a267fe498466ac6921436d563d3cb10ca54e803c73bfcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5883ffa46426d1a98967ef64836d5835f
SHA179ad208d2e8bcb588dd76b766f442051c6667510
SHA2564c5b43617e21d4658776dbd09aaa99509ebea01f28e78f50199baebdd9be0725
SHA5123abb0ba9e1dea9ea133964697bea70fadb6429170c867fb3a02fc3cd544e849f4d3ab3c5af0fb1d1ac41111748e9315a31aea3e7bc131caae43dbcf9061c9b7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdc641ad0a95a3ea79c4c0b1f430be42
SHA142323f14e90625032d53a7c812d1e50accc38bc8
SHA25686e8e26472e423ba8fad7f5cf3f8521ba47a18872ec6d5075580d7ff0e4a3389
SHA512d86dd9bf67a1fbbc9271f1ac0a61984d3e27de421e13e9afc4f29803374e4e33fd73ee81152cd9649c8165a7f5ffb8f82423c82272608a27211a464667d7e7e0
-
Filesize
1KB
MD55eef200c62d1bd60bfea23826d346f8d
SHA1064337ba1d47068991cb32cd19e3960ec677d859
SHA256baf9c9287047c6f51b4833f17bc2bb0ad8c0ae3fa75474e7cc7142a6b6e50cd7
SHA51258f015a9082fb3537ad68407ea8a2a3afcdd6a61d1e53780d804aedad243a85496514b4f86821f2edd64e0cdcf8122ac8ae9478c133c1c6af35c72ca38d08a80
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1YVWL6AI\favicon[1].ico
Filesize1KB
MD591abe01116ab422c598e9c8af72cf4da
SHA10f2815fe8e067d48537ad168225ab4674271fa27
SHA256b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc
SHA512a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06