Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 04:43
Static task
static1
Behavioral task
behavioral1
Sample
5584ee7ca096b9c7351a3c110866ba25.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5584ee7ca096b9c7351a3c110866ba25.html
Resource
win10v2004-20231215-en
General
-
Target
5584ee7ca096b9c7351a3c110866ba25.html
-
Size
1KB
-
MD5
5584ee7ca096b9c7351a3c110866ba25
-
SHA1
a905e99c94182bd5b1d81452b2f96f824dc24fd9
-
SHA256
9caa78b19b413b8ef2b01d3f005567d6af503b285fd9b4403e7b8d4c0f7855b5
-
SHA512
8bbce27dfaed25d3d0f2865b08d93dfdf6a409ac4d9787227b233aad32cc563d1cabcbdad86729e45cafcecbcda1fd199e7b05ac5032ac8969f8aad7e3ed0f79
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{122B4311-B105-11EE-851B-E6629DF8543F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0cbabe61145da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411196451" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a000000000200000000001066000000010000200000007d2a29cfc0035ee33224b451021fb7acaf422e265333500071df44f088ce1d73000000000e8000000002000020000000bd6553e8d85b4a81e14a2b606c1ed7bd534de45a49e14824403061e85f4e029120000000435a43f0eb45e9e2d6f4d0c99a5f3dbd44db173a8251d4ce1a9c94cbd3cad79f40000000197e22f78dce4851005071aa8534dba6648afd85e062f71503985823d9724c817dceb6edde22ee2371e72a3a4627ccbdf37f82c4d82f14d42065ed6d67a6a570 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2016 iexplore.exe 2016 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2660 2016 iexplore.exe 28 PID 2016 wrote to memory of 2660 2016 iexplore.exe 28 PID 2016 wrote to memory of 2660 2016 iexplore.exe 28 PID 2016 wrote to memory of 2660 2016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5584ee7ca096b9c7351a3c110866ba25.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56aaeeaf85893cf3bd87a467046de51db
SHA127c16cddb13fbe0adc893d699f9e3d55826d0cee
SHA25674ff423508056cd25f07549cb5734dd36553d877cb42968f733dd851b3b49f4e
SHA512181a3663670926cd5efa82ae17c76d155a13dcdfe0fc5271a70eabb411de2031973aaee64574231255f0b407c89b5c51bd055054ef9c153583e652907db71eff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520248b21501f7197bac42b60c8712463
SHA187a74e438e248ee78ff2d72fe5c5e9ff8f04e62d
SHA256daf1ecd6fd5fb883c3c54f070318e86249a3cb6f8282d99a969516bc28070ac1
SHA5129af4db91d30f0f502dda5b330252061bd6dc4578b2d8fe13a37afced6b3fd1a77b19760f0df7900404228487e50838754be06f05c4539800d8e79ffd08267530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad3eda939873b2c8dbfb6a4aa5cbb3d8
SHA1f32265e3fce760b17b45ab5e52c8b3422733e320
SHA256db3444cb433472954cbef2f2e8ca41535db025e78776ef07af9455f01219e174
SHA5125fa2956bfe5db6ac65586dd616a9098db55cd524be698b0d988269cca520a0687b9e09d48869447b6a38241501086aa13f7b68b09510e244de2e61fb5b5a6e35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d11aa83dbd3d5fca8d083243931834b9
SHA13a6934188ed4c95c1513699a914bf5644cf45b14
SHA2564f2c00df628803c0845d81c689465ee697e75761ba47eb29a1433af331c4c128
SHA512ddf3dd7af3da58fed1baa385e933585032059e1dc4ed05cd1de4800e90b31415e97f6d369a59b2e1f81d10bba8ec460c6b58e87566b56791f387ef13af23a585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594f93ea1bd9324d504c3aa2553778ae8
SHA16e9a47f522ed82768af5d9aa98aded000b1135c9
SHA256356f9ce72f37e0bc6404ad8a6f61fd57648d482cb9eed48a9b41dfc13a23aa81
SHA51215cd5fe701a1f04cfaeaa35772a9bd5a13b20b2d9752824240800bfa373d63ab5768c09da87e4974725620771f599d2bc246bf2928c16baec617d991d95715a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55300c656d4dffb8330bab7c8bd9ed668
SHA1d283d83a4f38d6279c6e2cbc9baebb0f1e1be573
SHA256dc5632958357195e449f9b629361c6e30f5b5d4b3d49bfe959a05fd41d88dc12
SHA5126a9249129575b9cb007d5b61436c4282ca9fd84cd3bc64e03879b4bdc638d5fe6c0c10d3a248a668185469aef8cda10195d9e15b128d6fdc61c71784ff625d98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbc74a077999bf74c2c91153e1f0555a
SHA113c404b7e67fa2abc461250317c916fb6e0166ff
SHA2569d1cba593226a916fafb7e3326fff8629e4dc80b1ada6d1d94d29a8307591aa2
SHA512a39a51a4a5eabff6aa86da606a4292e31f0148d2d6467a7551ab2f7bf3ac5e6ac39f46927a4fc064ae9e5246d7763aac60e161f26fad64e589961b717ed79029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570f844a7fd8698b458fb3c745cdad81c
SHA1ae3f5a95503826671c48650c16234be022f5bf8b
SHA2565744bcb2d24645f9f02a5a8ebeeefc3e29f8d0e6b91bc5e48ed2dffbea50e7dd
SHA5125c651f81c84ff21c97622134976dfa7aa44ef8a564ba9d2d4b8f9004da0e7579bf67db184fc369db06f57d3349e6185eab780c7365301aa23d93929f719cb616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa1011b6c40939ff92cc33475e4ab15e
SHA1e3bd15bdb1ca45e4bfdfee432dd20152cdf2fdfe
SHA2566fe6cbe43b57f72ff9dd524bf0c3749791944511e3fef9f8c91db248e4cc361d
SHA5126a2f22c35ec3de708b57cfde39210398d2b032218e70a5f6cffbe94bbb1bbaea39304be4e870da1638ebcced49a56f065c8fb654e23046b20171400bb1230973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57954119a1e7ea69d722cd6789e3eb512
SHA117dfc885fc5f3bd7baa1364099834a66fdd5ac14
SHA256c6bee267724eac7cd2161a848c4f615eedb55c2a8e8c569756eaadc618bcbe56
SHA512ce0d04b5f15815c6d0cb9c23faf534b185b96f1aed333144ad47c1ced72dd86dd57325de5d4bd101a4ed5ce0d8bd9734efbdbdbfdfa687a0f04b762fb5163e9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d535fb018ce3f81fd9b16aee7718e5f8
SHA182b6b4c38cbbd16262a480ba24fedd24724cd994
SHA256ea2918999ac7b4abd7708656de5b1dcc7c65063c23add2b335163b4e6c89aaa0
SHA512e4b6354e544b2aec5767e0958c50ceb18e3209c5522d8c322b8a71051bb1e1c499032ade00673f24fc57c16fff2dfdd4d1360f2e42e591e0f033c0846fcce710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599c1cd064ec62a29a564a45dfc40f166
SHA13f5cf13c0d36a3702c391efb53c5cf8e4340232b
SHA256904c32654fc2b0ac84e02ec6a66ce1c16ac8841e70070d2a12b6068ead43a16c
SHA512efa4605df23e928cd5dd2b642e9947e8bcffe133698ac6381414fb8947c87cebfe6b55b3543b8f5141d2044caf74c87659c47fb5d8386ee0f24e06a3bbe92aba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ecacbc58ab14b83983fe09473cd286a
SHA1579225d4b39ec89fc69d09b1cef6fd795ece3762
SHA2567ce1a7981cf8dc5ec10cac6e6050c63d135f0e8df4480f9ab9b6d9848da99fc5
SHA512f8c2f359bb98892acaad7ef5eacea5d673cd4f1cbcb5d0fc39e64e06e68a22e377b3b96df72f65acf2a7b27e76c0a8f20615cd607a6870a7e348864fcbf533e5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06