Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 09:01
Static task
static1
Behavioral task
behavioral1
Sample
56086f655ad9124a62bd5bc11f490177.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56086f655ad9124a62bd5bc11f490177.html
Resource
win10v2004-20231222-en
General
-
Target
56086f655ad9124a62bd5bc11f490177.html
-
Size
36KB
-
MD5
56086f655ad9124a62bd5bc11f490177
-
SHA1
10bdeadb6cfd7579eb720493ce65c5facaadb29d
-
SHA256
e572ba1527b71ad4bd745fa3b1898715a0e3805c7dffd3fd257dafa725a14de7
-
SHA512
3e8741ccbb8c58be234cc0241bfa3b789c05d6b5111acd1f0fe05b58b52253c8dcdd6875da7353f1f09c6573fad535e5af752cf653205b00db9dbe0fb97140e8
-
SSDEEP
768:Qt5c9yYDxcjB2AQotpfut5M39pbut5M3fdRqBycaS:QrcAoejB2ARtpfut5M39pbut5M3fdRqP
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70229ff93545da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411211965" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{30AC1ED1-B129-11EE-BF73-CEEF1DCBEAFA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d3000000000020000000000106600000001000020000000f20ae1691645995a65f19ff6329ed4697d8373aa0ceccf669c6409a43acccbe7000000000e8000000002000020000000dfd737457e3b26ab2853b5225163747a50c8cc9c49372f6ff3481f87e5ddec20200000008b471ccb8a4186f7b5f2fc0ebf204bcbc3b6cc3ef893231f3599d3ddd963a51b40000000c9883884aea6665a94f7e43fee71caeb743133b12970dda8e1f03fb21ec4a4567229b96c2a5f0f6331142f7327d400b8386d140ebe572f3fe9a26f4b0560e7dc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d30000000000200000000001066000000010000200000003f5cac3407c6cd054cea6d022af56d5550cf9be2b8512608fdb7559f9ddfd760000000000e800000000200002000000073e15a635647d16165a16a55e6c18509575b86031cee57014a81466ff5052b3d90000000559bac45b9bdc4a29efff2ae828270021a86aac0d7ab53bd6e2c9a8bc041ddc66145accdf2f77439b8c109bd20f7e0911101c8a32df53f319b8b83d7fe673cb3259891cbe25d932b7ca0aef0d4d00cb61d7a7ceceeba78f86396ec6ca371581be3ac4dde22716760da1dd8da781a02a766735cb26147cf6ca48a0edea1078afe2d4920b8afeea88605fecc72f17d95b94000000079fd9c233214b28455e4206f937d1a9efdfea043b24db1bd202b7951c6bd5e276d71d5e15b4cf8c7636acd9c9f004e1ef4cd4179e6faa474aa869f059ead5a45 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1424 iexplore.exe 1424 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1424 wrote to memory of 2680 1424 iexplore.exe 28 PID 1424 wrote to memory of 2680 1424 iexplore.exe 28 PID 1424 wrote to memory of 2680 1424 iexplore.exe 28 PID 1424 wrote to memory of 2680 1424 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\56086f655ad9124a62bd5bc11f490177.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5991ba21c9735213cf931d7f1c29dfcc2
SHA17d56566046f32fd9f403c14b37a763f75633cdb0
SHA25623cfd71c499ccfd889a9036485240ae8a5f9b98afc7b59df3eb4f2b1f0a0bd9f
SHA5127b3e7a935b116c4b6400978901be35774f721c893a39599d10aff32a00160ccd282821970e364b981f6c9d76b3615d73a317f2c2f2f87bdf3bb3af70eaf4d35b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c3684af1c3070240b3a2ea0bc53c64f
SHA14afccd3b517c8ab7b17adf2e7c826c27ca699487
SHA2567d88f97a28101c9848600fb824d7fe0c6eca8cd9cc4db3034791a2ee83035ed6
SHA5129bee1bbcaab23de198bdc01efec4f3bcbdfc05e02a4ed30efbfab65e8344ef4aaed60472c03a6ae87330dde631c2e42f0ba9980470341f79bc3ba33bd53c15dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c72315cee3996704d3b3486d352ace92
SHA1e27e49be62639763940cd40743214b779984de9a
SHA256af22cd11c1ad8ab36f55cb8762255c9c1972d9b1a002660070a3299c7314b5cd
SHA512c706d8c93912ed9b6c09b81ef6075c35036d2a47789bb6328dae6258be9754d00a23c4b7a9bb8c2bdda19173b0164eec86e274d0335a5ab804bf8cfd2aab5ad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2d0aea5091b21081e77f082935b202c
SHA143e21cd2489d166c5a4713542c5e88479193ee43
SHA256513bc9cd6079df07015676ac38442b3db7a99f5093c0bd204923abe07e3c9edd
SHA5125acf037c9742739dbb77d1d67ff86923011a9ed801598c0533f9683d12c8dfe2c1342c3d2b5f503b014b0dd55e990ac2c3e6fdfc28e98064a33621c387f66295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5080c1e6813a04d36c46bd6458a89d853
SHA11540412cb1684f89e2ff9fa43025df53ac01eaff
SHA256c694897c7be090ed8cd8114e3fa9a2533cc29862199a870fdfbcc8d1ae23e984
SHA512d3a69209d6510a950ed8e46950f2e6215be955151db67eba0ed412211e8d94f967fb1215218868d26a6ac0a0772d844fc000e060c3986715c385a34f82fb6cc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5f4decec9dab4a2429deb023da5a538
SHA138be312f130f555dec0be6eaa06184e1de0f1147
SHA256f02ceacc9ecf48713d7a1c41f88fd6675a7a0a8a6f7e23180448074632c4c099
SHA512f49da531f56cf503acc301412037ffe52866f96a8d2fd5d56470edfc69e69e653cc24ca89346f2cd782bdd72d7e077bbb423c67887f29296d61bfb5d70568b9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514857b98c1b7f6f35d2b3c9b7d57aa29
SHA17712d67b3193788bceaf7745a66e41728350e4f5
SHA256e268e43f6eee919595bbca9d7b30997ae8f2ee9afea023c4b934261e57452a3f
SHA512264939dd29b83480ce016fbb10d1c437230a7f3f388969799716acd6afcefc70c5f5e0a0725cee1930dd747a747272175a555e62379d15c19bd9121265689a34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3f33cafe65824424aa41dfdcdcaf894
SHA173153f3c0dd6173327d3b617ffd1026df5732c7c
SHA25612111cdfd55be9c083b56ea5e7fa2f2f545c560f65fddb4160bb219303aacc76
SHA512f49f214638fb1465f89fd46b0b5095d2bd8fd83652929c4e8ecb73d15118eaf05e8f1096df8cc8e802dbdc188d3644ad26587af28b42e7585eac2fce7fb57ab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5ceda105da8bed8bf5bab0acb16c8fd
SHA1210fc983828e8ed882276f4b4fd5bcda788da5e2
SHA2567029d22d2355b952edd4b01024d3e8263f45ab262b2806d8982ddb900a4ce5c5
SHA512877f2bd6c9da3e254aed4306bd6460b3a6ffde8beeffc100a7389495bafad749e68bf7d841cdff3bced5c0549c1d69090eb94608a7981a5da83a9959b92299ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514c7ed5115b0fa24f29136bbd525b381
SHA130e0d9dab03e43e6129a50ca3f14edca34759e61
SHA256ae748ca973746da37ea9b23b726d8e0b919750045d5122940768b41caffd68b6
SHA5127880374da707394300a73e548a3c5dd8839c77a2bbc640c5002b6f7fd5a8047d7ca30303f51868e3ee938511582ad37b36828de27d3836c5a5c3de52eae731e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d51289923871c68fae4f6234bb4bc20f
SHA155201103b0e46c8d13cefff1d1bc0528556abd87
SHA256a39767bacfde8e33c422b6e13310310915c81b7388cf2ab812660bb38bd752d5
SHA512dc20f1be34fba3596fd8b96480f2376d23b80645141597911f235e5d4254a008d13af26c90eb4272e4efc91ba470a50f3cd30702453bd60a3c6d20cf6761270d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c150315c84324652c50fe9cb97da9ff1
SHA1666ebc23e59f6b47fb8f0b99ce8d92006d1fac35
SHA25650c2497407f65a57174cd98c472021108837118a4acb206dcb895eb93d08d4ca
SHA5121bb13fd481cf6a88a953cd171c5121a6af66294b72c39f08751d4b89d387b8cdb5951ba7f2f3ef47fc8a9721e167e0b266ee193378baf65da95056d0e8ceb37c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6338bdc232f2e5a239bbe9d3ca175eb
SHA1bbf64a5b8ddee6aaddaa8fda31775daefc673ce1
SHA256eeda8dfe83e306ac63e2f9b55268c69453cbb8f158090e981464cecda9fcb3f3
SHA512706a506d9074e5c168a1521079368c85e84ef83373e55163c0980262e4cd0c516a8d6dcc2b714d391ced62c3033fffc91cbd27c15859802ead7f43dd74e95414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5086d335d2632d63dffcc7c6931a5c543
SHA133dce75fafaf0e23ce688c1461dfcc9f5b610e05
SHA25691a0ed1392bf2c88bad42d21c90ed77858f7537ca57abb2c9190722373b1c739
SHA512e23da9c0b0c0d5b2f7eff35135ea103648d912ee76d3f3db79b50189f60d7ae23a83e86be8034594e73ff39560c8f4bb05a071ab15a026f1310cb2fd452ba30f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5315658c25061c7f579dda044c0f06984
SHA153f4b7f783f3d881e1225a1a5c96c2ee41c61edc
SHA2562940ec56355be483daed80ac8ceaa1551caa2f96d5bc8b00f6f79685b70e537c
SHA512ae9b78ea6a4b296f3c6305a5732f5d10f6a020a0f712e8caed7cf8611ae70ae4bc5cb77be4f9e2799052bb3f4a9062b280069ab2f3834a2c2ad56c739e53853f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52aad515243bc7eb997fa646f64922781
SHA1e7b5493bee54e66bb4a82ccbe0ec56df105e4ce2
SHA2562d784a09c8ee46e61fcf19a1c9142c4c795866d5da284ec7ad4fdd93d6aab72a
SHA512169e78cc83a6021fa4d08a7622d84b1a004eff015fc3212d187f417697f2479c74966d538b75ed50ff7703261e127b8b397273f733d8e3b76f21df6d50528dcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5faadeb0cdbe317efef78ae266791b2cb
SHA192f05386738028e7d5d501ca82208a94624d6063
SHA256b9f487c16e298254a5d6d15cee54e30b43cd7caf9d5d0772736b337f5ae54a82
SHA5128afd0bb0e78a3d91a1e4d4b43de3e02a8c11f65c093b945bb6bb63b63b85472540ef5dcb1bae6c326c47dcfdd5ac10a0debb53f1bbc581f0bd30a9dd931133d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c24be3dd2e4709a6785a3a7397cf471c
SHA17caa121343698eb8d17fc94e21d7d6a59425f8c5
SHA256f0e28e97fc3ce097e53cd9c234b271ce6f97734686653e9adc911169d1a92d27
SHA5121b5da61f145b2c77579e32341c8e0966ac8516cffaa7dc04cc96e0caf7b42cd08df2fa9b1f335092a5b698825d56b9a6ddcde0be80e306094ec23680d8cdc057
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06