Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-01-2024 15:26
Static task
static1
Behavioral task
behavioral1
Sample
56d301ff016d8487275a31e56b0955d5.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56d301ff016d8487275a31e56b0955d5.html
Resource
win10v2004-20231215-en
General
-
Target
56d301ff016d8487275a31e56b0955d5.html
-
Size
2KB
-
MD5
56d301ff016d8487275a31e56b0955d5
-
SHA1
ea4276eef6b28af2e6b5a7c4bd64bd7c36ca5dd8
-
SHA256
d56a7537ea5bbfd959b05aba58b18c4dca802425d74b05ab538a9d44a0caacd2
-
SHA512
40eda0e8529b50608480c4884af074a58bb7725834f49eccfcba613d6cc919a2c5bbef84c7936879c752e2a814e39e0158adc35a6eba033df3f4e4c4479447aa
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d300000000002000000000010660000000100002000000076d6f0ea1fd096ae575cf30dbc9bbc76fc65e00e9f287f1d12cc60ba1414e56d000000000e80000000020000200000002538a8d569beaddf4d727e5edb7a1f0662cbc4752b6a02596aaeed568a1f1598200000007f50501562d47a7a7978efca5815b3996cf9f2ce0215f34da84e9aaf17ec9d07400000006a726d9f6cc0df70a3922cefeed2fff0046b5dd24e574ba7fc79e6dd17f07c809b35a48deafb5108f93f117dc2b6adf21a29dcf73625e77358fcc9575e444ba7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411235094" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0A002071-B15F-11EE-AF44-76D8C56D161B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 907164df6b45da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 iexplore.exe 3016 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2660 3016 iexplore.exe 28 PID 3016 wrote to memory of 2660 3016 iexplore.exe 28 PID 3016 wrote to memory of 2660 3016 iexplore.exe 28 PID 3016 wrote to memory of 2660 3016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\56d301ff016d8487275a31e56b0955d5.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511263b0c0ac4fadcd843aa0381554148
SHA1f6adcf7fa3f0aa95a7b850370b6cd4e71cd20c52
SHA256b0dc559ed8bc3356e0ed39586c540feb7ffcde357f643c79a1ffc54ac5a26f17
SHA5125202f7cee3c8264bd0f12e3bcafa22d9a0e72eb3d26ffdc24985989ea714345fbbd9bb4f6e35f5ddbf8063adc460c91ef417561caf80819b3e2cf484527bc431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d3b29dee0035baec71835b011122e41
SHA1297157babf7028c00c6b6db5e7d41076c88a60eb
SHA25699f46f79867682f0c81fe61ea258cddad3f5bfbd71d3facabdf1eb3a75d0f014
SHA51285c241d3b812369bfd5c9dae0e561707d3637dd4fca3b852ee635dec5da71b1022e7dd7cb3e276c8e63962fd83e905253d212498fb90a2341bb19683158cc5ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b88bde9a9b1da2b4569ab92991bea469
SHA1531f194ecc9c1b620d9dea2ea78b173e1c18b344
SHA2563857610894cf0e1daec2ca039e2435ef7cabeffda4f07236138b1dd19eb46ea2
SHA512f863a6b72ac961c51bf5be62acb655c6145812f82e58cc7443127f243ede8b1c6bd3ad989f680f4313135616fe2c449febaca890c268fdf078905f64379903d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5377218a645542dabbe89172ed9f645c8
SHA1d643c0cca527e89f37017f02ef44a1fedd9702f1
SHA25629ebfc0cb789a72bd9a02c1fe263149900b86a5f1a3cc1eb241a317460bb5012
SHA512e1e44a8792af38943b807ba181b2cba422ffb99adb84d071afe955f75322e0526a3f32d53651fa2c47196bdf88344a611a34857acce36a0feaf39bb3f4bae9c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b20be4304f2e99d2bf341d24a5e1bb2
SHA19961b27a4ba8672d00847fb8f67ac129ea46bffd
SHA25662b4917de161269447d5ffd88af05dc56d5ddb84168b60c0445e41ab1a52030c
SHA512d3d7fab77ac633cb7aaa05146e24bd9bd52da743f3fdd80e9d0d2a28c0137762dd55357d8893c144beba328d13d9fb67e3ccadeae100c5a927a588545919415b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd8d6d565041c9055981db13b8c1e2ad
SHA1455f3f70cc423970242bba87451b6a6bd4a6daf5
SHA256874f6d92d7bd99b85bf0f0f001ddc7db52b8cea3be8957f5970671e61fad64a5
SHA5129f9d643c3c380eb9b3ef3d1d49645a76f6058831112ae19f622118af2346b9b9af1a9c4c9d20d46a84cf9c8ed06cbe78bfb9616ab92a0ef515b99c4583061673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f2b133dfdd6eb5ca4354f382f4bf9c2
SHA16b8e47071e28de5b08165ab6bf3a98b17bad3063
SHA256557d99fcd2b1abcc3ea0ade207fb28dd8a10ef9dc65aab2a86ac316373b78d97
SHA5120a4ffaf014fcec57a959816f51976428dc10042afb94c0d07eea95728b9648483afe1ebe96460a56d2af48b6fcde08fa304d65c99b5196c649a76d16635bdb4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591210c218badc3bc0eb52744874544e2
SHA17348a0fa5942491f216bfb8388634ecb821b4cab
SHA2565f490ea18856a1a6737540acd70eb76c2e86ebecadedd72638e3c4c083da062b
SHA5124b97682c665685d6c6ffe44182440a2e9b1632e52495cfd740c88b95477773741282d4002189ead2ce34fd51bacb1057eaa14db0021ace78c060f5bd5d761092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515b6231bafdc16330ab4c0b5b5f11844
SHA1234095394462250081c5faa03ef3639662e9e961
SHA256332ec8eb2556f570481782dc271e8df26ed53e50bed17e2c0ca00dfec4850223
SHA512c440c64f6ba3bf480e48bdb8750c23758a888f7b624fdead249cef50a6091c082b5b284dbdc7e32114460c4cf0e9ecdaea5a7ba8b3a61536f302d03897138675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9e6adc510ff2ad549d98b916cc4084c
SHA18672b7977f2a96ed5417275050db9cbeabec81ca
SHA256fcbcc892bcee91ecdfef7cd8c71a0c884518db3d7d56339b436330a170f98b03
SHA512a47f30a82972adba896e231a48a0d9d0a0e436e5aa5454fa0fd9176cbe13ad53bce8616d966c16cdd6e3589e903aab93d74e157b97ba14e41b4c8f86efe99a48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1aa9b234ed343eb23af4781dc873335
SHA1ee74d46999614f754756d710fbf6dc54a551ada7
SHA256a111c2ca6c9c9c8958b4213c5a8351abbe843f0c966f6fcc902cea3d682e1bc8
SHA512701128ab7c77350396589605b49cf12e5d4dfc8e9313bc3028757e9119394ac43a30c0141a36039f005a9d2e8a8d5538a3a7ea916ebcb353b672225df2275d43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f007d7c4f6e5db8ca1aa39cf5bbc42b
SHA1cdeaf162319ce8b96ad43e6db9731bc267486a25
SHA256c4e9ff08c8b345660b4ed539ec92b03c9ed975be2a6d3e59b91d477423f7e4b9
SHA5126f83cbc668d0271f5c910c22e289fdf2d3b6a4f438b5da5f48939ed7c4081cc1063c073d41e0b28bb8b4e1151681168038e3892cb046bfa3e20c7eef91899c60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf98d155cd4ad546afad59055d199d99
SHA1089a3fb6b48b7ea0aeaa0ac20e7d7bde8262f70b
SHA25629600bf6bea7a02bd16fdb9220bbd6b0ffb25952c1fb39547bace0f038f54e16
SHA51224f03d568b3f577162b95bb98839aafa6e569eae59f98f498242ed76c53f192b181c0e413d1a300a91805931308a0a52b2ec8de2ad9cd3add4a3aa36f6449d9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527c93e4f704ae36c7aab9dba289f3758
SHA140986fc2c5dc9973f1db5d56ea0388b21b0ad12e
SHA25691a157d2caf55e16f3f71db7fdc8dc6756a819a12d104d48d03dfd8fc3e0c48f
SHA512d88c3839ff4e1070d95b5ae69448813d9392ab187e13e2e7547130b1444e603932715d9504c0d0b307ee1e1936d7e5468129e2f204eb33e41e54567a3e288df9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5971cb91eee7aec717354b61cf4898875
SHA10658b7b74250330260d914dcd9d6f523feb0649b
SHA256c4fd1f954c5713942e1ff5d1a590eead95da3af94173cef0195af43caa3ed342
SHA512a1b3ac28d7935abaec9bf67496e7685f09806498271e15b4294fb050ab18eaf910247953786d5da819e6d619863263a6623f03383fc9c272f63675c45979c845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57eb46959a323c7f38ce378dbf8c1ac3d
SHA1bbf4a87fa06eaffc491e26aad0734c44b84fbd1d
SHA2563ef12272c509d115c24d211b2abd02ec398b86bc7ea192acaf672ecac6fd5986
SHA512fa8b8bd2294f32c8e642381c9fa0fdadfdf3daaea9f323816f42e10b23f7630bd27f50bce241d70938eb2a1bdbc4d2199c2285cf4251686de1d29bcb568a6ea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ba2cefcbdfdf315327b5f98b90fae5d
SHA112443dc7367b2008359247fed1157495e6c6ad21
SHA256d17930594c4ff2ffa83f1a1db4ee99028f1b86d72c8e33db6e2379c8df94a061
SHA5123843b96a8cdf0ad05bcc8cb10ff94de1a318e7838d9a9441062caafee5f0bcd9a5eb522189561c676041c8077ff2c15c1b6f4d1199914a529a7f980536f65ddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bebffc400504c940577413971e937bce
SHA1bd0165fb0126675d42a05c9e380d81c8bcd17ffe
SHA25653745e6f3916322941dabc10a6b13f5b09b2d07c0928b246c5c18eb1235b4b5d
SHA512a31227bca2fd735a352edf6ebab66933ad9e3aa9156f786058e23f0e3b058ebcebe9f8a149412c50601ab1403bfc38c7646d6c6f5a0710bea567efd2f7bc7038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507443d5782b7fb36a5e5d7ef3298f769
SHA107472e6cecf925256b5e2d85cc94e6464ad6b212
SHA25659e17b44c5fe0768bab1d8b4079c7f6207c5ce656fdd91075c7e952509d2cc66
SHA512d1d23feb8b03a4cabd2f5b0e67ed2cbc9f437afcef4e1c1494bae6c7019a3725afe29e4a04ed87fb73b8854daafb5b2ca23f215f51c5f3e57d863c1c99e6d29d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06