Analysis
-
max time kernel
120s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 10:44
Static task
static1
Behavioral task
behavioral1
Sample
563cc1567894d9134689b4b22b4aa977.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
563cc1567894d9134689b4b22b4aa977.html
Resource
win10v2004-20231222-en
General
-
Target
563cc1567894d9134689b4b22b4aa977.html
-
Size
2KB
-
MD5
563cc1567894d9134689b4b22b4aa977
-
SHA1
f098d1319382828fcc8e7b1e58efe3e0e1d0c71f
-
SHA256
2ae8cd426d831c67fa544403bd5343c645464f1f68c466487da70cb0071fb335
-
SHA512
ab32149437f477716f5c182319ed90198f906e49a1caa00800dbf8061719630d45027f195d655c25a15a4efc89e3ffcb112d3c995ddb537746e709199ed094a7
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b4d7614445da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411218134" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8D2B5141-B137-11EE-9139-CE9B5D0C5DE4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c193000000000020000000000106600000001000020000000632368b8ca6c762d385c42c7bf54044c055a5c495da834f12eabcca62f3f2a7f000000000e8000000002000020000000026bef13cc677a5cf5a3ac8a8e4f8a8ab4d607e46388d93efa0cda4e9321e579200000002b1411aa48d1f2c6be8b55863fd32837e7c2e1a0e68a8a3ac7fb4e88825a09314000000009da7067e94904575e3841a99c008664fcdb43c12b34c996667046188dddacb58f80b90c64a566ed58352783f0650918cdc5e86e363ae10eae5d9713d5dda064 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1388 iexplore.exe 1388 iexplore.exe 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1388 wrote to memory of 2324 1388 iexplore.exe 28 PID 1388 wrote to memory of 2324 1388 iexplore.exe 28 PID 1388 wrote to memory of 2324 1388 iexplore.exe 28 PID 1388 wrote to memory of 2324 1388 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\563cc1567894d9134689b4b22b4aa977.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1388 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5426233786f740a1a895d21863cf5a2f7
SHA113a5407dc3e78a1fdbcfed39d2f64aa5a1fd0a71
SHA2560e0bdd286f883eb35b20385f4172bb88082effd5623e8c787795e5c17939b99d
SHA512fc0c8e3faab2ea0da5cfc05b5f9002ce5283a55042b7d2b6036280d3caae6f0346edacf6e588234ba3529c84e85a62835b07796b31f1e44d86ff1c5d4dd9b930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e09d2f8f5a34fbf4dc979b42d4b69e30
SHA1c9b5e45adf3ee63c5d293c80d80e79db26a5eea6
SHA25689e8491bcb6f347ade4ba07078f4b4aaeeaf2f791d29b7c1994e92191cbbe459
SHA51282f8c84e37feac15b28982a9ddefad9ef3c2af80580fe21ba79db2462396c9f26191d0efff611e1a0c74c8c824166498c0f78baeb4096c1afda4db9f7d03d98a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5703502790fd202350a16ba20cfc895c4
SHA17d2e58f78febe285163117810032af27aa186871
SHA2564b9b75a0e30f9f7abc1738dfd15c5fbb0555f924bba58b2111f22d11002d226f
SHA51250f8d8d09886e885c2e8d1ed81289c11c786f82907ddf9c90744d6d34c4d443ceb82982c435d7579ae0d686b9afa9acc83096c652d991b8260fa181250df6871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9efd36dab7aeaf3683d7ff4f0b8ca7e
SHA111a92cac3a34be19f4cc32b9f06850f384b6de97
SHA256b1487c345cd61337ec19b5db139f880e5bb634df7206caa82b8aa20427aa3c27
SHA51248af2f0e170fd71a7972f30203fdc74bd2be784f3315dfaf8ce2e2a240f7a86fedd65e147244e886f96f8f141a2d7d27f0aa7aaf3fc405bcede8c53c9c718c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c0e78f961da486f089077d1e703cfb7
SHA11ca16c320e82f2e6d0c526765b97937415502219
SHA256ecc4debdc95a8afa0a6a5c403eef6be914a8c887150c23bb60ea5b43c19459ba
SHA5121abc96674d9c6cd1903fd0dbd35cf5c215aedf9cc3ead58c56bfc5889fc126229d3168d094e5eab047eb6e10a0a6d469206d0c6b2b0c2824dca47804d906d594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d54b1c8be090405f95a50938d3366a06
SHA1074b6f4579745f8b82a829505b34c8e3ed9cf76a
SHA256cacde18a4e051b4cc62039f56b3aa54cc74979ef8c4bc9c32ef85691c2414fd6
SHA51262531650b14576cd43bd13717a5eefee88c14360bf3283848950b2ba4807524bb7b9686d0c5d8634b70402dd331b85ca10c4c533531766c138b0e548b4d6869e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527374a110c24d33f20c2787c5855266f
SHA19b9bba0485821848d3c60eb89bca7c61e1623f78
SHA256e4cd0c69379272fe50f6fe785111a119dcf4c05a418b7366a3789d3b22701b04
SHA5128ee984a7da298e0b88d9f0c723bbc0e906cf7ab744c352e05f91c59969aec14b961b27364544e2d515b952b68ad6442ef085630870dc424307ad1b6820542213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf3698cb7fe8fd542957430c68c72764
SHA1471fb8c2bce1f9ed7d1a7fe3e797360cbf9b1f72
SHA256658bc38570699dfb4da408310462ff8d41bbeeb5f700328466ca4258ac43e0a4
SHA51216bafb62730a6539957db09b8dfd80d9778f031aa11d4c44525f718c686faf120f1dbbabf21e6672a81a6749667690f8ae455ce656236774117f81cde4e7cb61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5a6fb81cf22e33b8cd8a6e15afcca8e
SHA1d9b1bc32bd9387ae0d7ad84669a051330d8bb707
SHA2561f95c0b15459e5e6c28ccbc38904da66cc80ba5a05cf1640776d21dcb994c9a5
SHA512d972f019e550960395a148d15368adf3bec511014a42b26ed5edb14c0e556f56d7f884108c762eb6f45b9efedca995e95bb0f68afc464ed841700dfb3e567d8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b42140e7775134a40af57024c82e948
SHA15ed9aef884dffce12220f3f24d15257d785d2b13
SHA256a52920171f8f7793a1d12a56ddf8d7f35c8d0f45a2b229d62665ecc8d2f407d4
SHA5120f18ce7cdea2e444ad1ecbbc26d4db1dda0601b2e912ccd296cc6445131746f07ae6ed85d15ab922b49594bafeea2d8be64d5f6f249f5eae814a47f08a8476c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557e2d40da2bed27954096a7f11e14741
SHA1a24bfab37e63906085e7fe5bcd6779b59a157478
SHA2562ee51e016ead8c02a70ced859e445cba9dcc96998b3263f87f5049a9d92a7f5e
SHA5121b343f530c21b33e7de784bed2164246d66cdeded0549c3961dcd8cc3cb5b715963fc8300b5281e0049d6bc659f256ab52c0b4e90d988c0d18622298f30bef77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ee22cb6332c6f13b18cfe96ab819686
SHA16062b63de18051328070933cc84e8432a7b044a4
SHA256affe3dfaba632074b3cebda509960c3ddff08aa40ac4caa3b987f38c7b4d4b08
SHA5126699a41882ec25d3df12dabf27baa1ddcc5082fae4e321eb8fd877b9a5fd5f8bb31b786874b65fea12e93095777fe69add8cb3a409d6f17760c800232db33009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e6e35322304349a8e5c13bbfb24ad34
SHA168a4b38c31c6200cdd3be3a6c86e030ff8af9a0b
SHA256677210fcba457676eea9864b118e6fcfffc8e6b2ff0563924c4db0d7cad00cb0
SHA51277d7ecfc1464d7a63b800d6e79f9c2eca158d32b1e1cf470c2a0bc9964bd8dfaf0a1e296572990da9d2fe9f40fa59c6bc2c3e2b22a2649d74463a6ca0c4bf830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0d8c54e81482b9be869f688bec75ec4
SHA1d6eff0fb7a0d6221bbc764a975fa648c3783c589
SHA256a91e2bbc24bfabf3a2b8f1a1331efcbed7e4e0a4d3bf9624568564ba2f82525e
SHA512346a181cdeb1a17382be3c152ca5cc71e2c51a7cfc8fbc7784628d8ea89439883afaea1c9bb5f1fb3a93174e1e4f8f7f0679f2213a5379ad318e7aa4a13a1e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d791d512e62c53bd828175110c8bfb6
SHA192d52731f066111605ffbb02894730afe655e6b6
SHA256c6e392634b29a7e2cd2662e2ae2694a94f2471a68749b9484ad2849b2cbc9586
SHA512979560c94c7223e470765562b919129d5f919b2593149a46954f587af9fa0434af6f53f0957e6bf59ee17f5b908f1a2ebca51ed911a6509802970f1c989972ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5799297e6a6bc9cbb82a4750d76148a14
SHA19b0602de111dbfd9b47352172e881b993e366697
SHA256244843ef9c6cb40b0dfc775f2a024379bb6f05a9dea8f4632c96ff213e08b0aa
SHA5128ba1537537335314ab28af765d3efd9faa1e4ad48d288f91e4ff402ff1f3a4cb3f610d49570b364026628f8d4c4458791b09dbae5810e68592c796bf0202269c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c13c37e353533087d62a1401facc161e
SHA11689138d3e3e557f4537d43276b9dcd844dabf3c
SHA256961197b16a1b27fc5337a99016957d37331774ecc8dae2f91c49ceea6041d4e2
SHA5129595565476acd96f39a1212bcce8a87b634389bf1e7aef8c74dd1b61a9742142094a4d8e4d52273e144ecea20765954a138e172107f117a9e187c7d89b69ae6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5751c8ca3b53fe6ff06d1ea95921aec12
SHA1a7a6bc32ea5a10eedd8d652d9dbd2033624b5e9b
SHA25680b11ed55473556b4983be101770c1949bae484c441c0b9f147a0fad01f3b211
SHA512d7aac1f114b69c9db6acb741df35adfa65716fc12df094cdc2610ec80271f949e6317147112f1dcdee06c9acb39b92b3674ba0bb7f543598995d76bd14719b63
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06