Analysis
-
max time kernel
122s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-01-2024 17:27
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20231222-en
General
-
Target
.html
-
Size
45KB
-
MD5
96790e0a263a32ce9c9e9a3402c15166
-
SHA1
6fc0dca5ac1c49c9133d21d518a0d6026b9be1a8
-
SHA256
df9eb29c897984020fedbbac3df6347d856d82fc987ac0847347ac8b7aee3f21
-
SHA512
3de9195fe282f4e0f1404aed684dcc8fc827995a9ca6f0da207f20096758b97438e248f22562a9203183244b9c61ab8ccffe4327524adcb8e7093065070ad33e
-
SSDEEP
768:SRVW5PoZJPyRaNLsRAbaOtijgod1IGE77lFH:SRVW5wZJqRaNITDAFH
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000006a2d82bee7625aafc082389b0df75cacb108d5963e5595ce2d9f4ccabd51e377000000000e800000000200002000000014a28f814732ed479380ab5d77892bc307b7b282b3855dc5ac6754917a1fbb41200000006a546508609d5de2ba533e9d42c7b5693a9b907d9b648bf1638101ea99bf0a6a4000000086aaa69b3e3a02327de1208c77a59d93699696b2bbef943212911b8d3af0cae7b94159ea43f6cf9eada6df453e0d76d91cfac745941634ec99d0c114c1400438 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411242315" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D8102131-B16F-11EE-AD08-DED0D00124D2} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06e54b27c45da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 3032 2644 iexplore.exe 28 PID 2644 wrote to memory of 3032 2644 iexplore.exe 28 PID 2644 wrote to memory of 3032 2644 iexplore.exe 28 PID 2644 wrote to memory of 3032 2644 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD596f79e618383f0af3804b1fda9c34ddb
SHA1078ecdde9c15114554ae40be06270caa9eb94453
SHA2566f4e96209674ebd215606e7d395caae13696d0c7f24ae167186a72071c44e6bd
SHA512f19c58835b6a0174e0a23d5a15e6f820a4f47f02b561ddc21fe3835d455a219d0b0a095c4c5c7dbc34e1109ca5e4d3cb7824c5868d36610ac23aca67791623a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b16389ec07574e8488c6989182a3a21e
SHA1038d7270f024704b1a46ea0cb249a8448d7eed87
SHA25605fa4ea65a179f805ccd2e501dc6917b80b24b562701f74c775f11da286998e2
SHA5122948ef4e6e70f3087e52ae986079d33acf00014091e0a383926c8a80d62fbc2d0d19b961eab964894bf9c80b24f4bbe9257fea2a07b8e15e01d74bb172235c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5184761ceb0d85e8e93e0078ec2466ef4
SHA1032cff418f6df1a58127ebf66c6e05cb605cc7e1
SHA2566ac50ba2db4f6badbd6278c862620fcfbda8e52f366a79b14cb9b2c2d57738a1
SHA512101006ff17c9a2ace51b69e1a731aea7d8116d369b9422b38024688d07c28c6b4abf649bad0e600ccc1a44a29c6485e87de8306de5ae3d873d6684d39bde8afb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af21baa130b521f130997ad9ec5b1865
SHA12a34319f61f340fae051b6644028c82e2e881058
SHA25695cd8d6567b1767189606d234c22b5ecf3d1aa71f08f4a413fe95ae065a910a6
SHA5127c8e5903575d05fa6cd07b93db5504f61907db252ae5565057895dacfdd26eca40e7c1a2ba748a1d66306e85391859aa26f0ab4b8bcc228af2f3cbaafca60e77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad8d0c9dc7b36f0857d28b430ed2b8f0
SHA176bc08f98cfe9e403e09d1e9f762c129b9d73585
SHA256f00a494c5e5a35d3b1c3e88967e8dc35ecb24dc0111402fec234cce3e49ee3e4
SHA5128ce37841d910ee95ca0cb764e4abd8fae5a3ae22490839b14d64dec4a0d18ed36d8b72f38ca6d5d1b4ba3f1056c442a547259ea1f41ef300c016b7566339079e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bc2cee1fef223dc291d6062cc18259b
SHA10d00ab454fb52207ab9b9574d74808b9c4a5489c
SHA256c373c8fab942b7f1841c48f4ad1b5899c8bb53135136d45fdd6eee7b697105e6
SHA51269968886dd552d42635b76c60ef08c4b9a44d7d363a9a43aa36a6279f0e1bc9e7209717dc57b42d40daa800c2425ed6a6e5b572cb01af9abba2337763c2694c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a59c9e1880737ebef19d51725c68f56
SHA1adfa23d3315ef21d36f771d409bc1a071567d41d
SHA25653c84b58da5ef723290febf830677a0462f11ea8339dabfb8ce89cbc23ccef13
SHA512af654ddfefa61d6161574670b83fa3a4d4958b5226d7ff5bcc122d17aa2daa0fc0612675df6652c60abe2a9e456ee87f25327c1452d6bca974a0adfd24efba54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55adef9746577802a0151c84876c6e34f
SHA139bdcf8528c1e11813268b9f562d24dc1cbff9e0
SHA25609beabf87d03e9a6eac24d68d52f3395cbcff62da7b0ae62039d1c2b8adc7143
SHA51231558519edb18271241a32d07be2b7e3f5c17034f44a103530da70161610c7179da1f1de98152cf7ee47445baa1678e52470343561f73d7900a176650be6dfd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d5e34824a18784ea2bc77064e8048be
SHA1bc5e1ac642c86fe69339d1ffad2b95b6d1890d59
SHA256fa12fffbd418f1619407257b0b34ae59ada4515302b66e4673aba095c4266081
SHA512ac8a3ff53e4d7d422cd02c358b69554d04e5c393bc93dbdd29193b032cddbbc38e5a7ea1bfaa58ee684419a96141a9d53f202feebfcc8a9fb9ce328a36859634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e9faf4c852ac2282c5bd8ef577d6f86
SHA18f339bb6e718ba69aed1b5730bdc65df8c426471
SHA256713a1367e63a3ea9cfca1fe5855371fb5bb3aa1445bf216baeb694f6c952c3a6
SHA51295ba203449e5c9bc975872a10d8966f277354236cad285e567be05b2c6e810c14461fd0083348e1183870104a1c0dc825568a05a600bab4d8b5bdeefc91f87b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c340cbe915d568baf32dfd05c3edb21
SHA133f8a5ff65d391c1ec9a296e002787e71bd9a268
SHA256e9f75aade40c7d15fccaaa8519b937bf5dcb65540c07c8d51017f3064c82e889
SHA51207dd7760ec80a58e008f1bdf1c61972404424e7afb8c6c28c8f6a880f177c7965e7cc6855dde75fe136859bf8aa40589c43f4fc45bbc28a73ae226ce7d2f2a6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d6584b22e919c588c5e982dafa40297
SHA1c8da26c771aaed2837ad2eaf03e5ba61eb60dc40
SHA2569e6128677b45ce916beb9eeacbd24293729c99bca8bafc5fda37142fadef8aed
SHA5126e2feb540a1a7f501b6a57eefd95402f7652f359c1bb8140629ba01669df6bb92176e577fdcc6ab45a369656c46b74f877690c5134f8f6bb82b49c24e358dcd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ffd6a1858922f8160031c9d8421e062
SHA1f444895d5ca2f8ba15482517e6dfe119e55d2d0b
SHA256ea3c7cd9597c3ea02749672e1ad4ba42e8ff5366aef0df3770a6bd4626dda455
SHA5127cb05c30538b98a3987218a6458ce81345fad8771606efa21009c340c441c1ed469f25035d8289388ba4359acc0e73c41bac8613a3eec005cf5dc2031d2f7ebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc07612759a8d469793be86d34def281
SHA198e771ced10a34c861d7a58f60560a020ec493fb
SHA256e0e24deacd81563b37e3b311eafba085b9b7a824c76d07544a99567c99da2398
SHA5128d0c65ca75de2b399c8f301e54ac6a012c3d08c52de2b6a11d161a7ceeb62a7c4412a79fff331b82aa67a2062087436ab1db8011b483afaaf20f593cacd01a47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54454517f0f49a4e85cc0f9b8636eae8d
SHA1bbb69129788adf6d385c21f4940163c54a8649fd
SHA2562870f917d920410bf02b4a887c8797be1c55124487f3249fedfbb52401dfb00e
SHA512aaf598e3618ad0db91315e111f5111454f4fc62d831482baff6246d06040553092c26b4699d02c98a29d4a5317fed8e347fc409ecd69472f0f546b833a1bd612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a50d8b53d1ec5f3c94454a5a9371061
SHA1e498eff741b9939e9dcdf59c4b997439483d29e5
SHA2564d8f181ffa882788a779461b4674e5bc89609d464a65147bea0f578f1dacc796
SHA51290cc56fa91c0fe998bfb375f0a70fa60963ef82b4456a6d2fa542cc2631bbe52be89975784374d52f6bc921a4099b1c1a0ca85c523a53d503eb923f4b23ec7a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa36666dc733338426616c64083242b7
SHA16156456e4b2517bd4d61f24c5dabbc9ae11a5098
SHA2564a1388beb8c47a84bc0674777ffca7b200a029b151cad798023e65292ac836bf
SHA512b708f0210a0172d43421168b7921715f82bb0d6b50fcd1baa175155e9cbc372f1d31fc3fc39f56c35910c3d0f8cdf902f0404d3382a8b30a0bd11310f53f6785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571d0651aa0850dd06710c4136017049b
SHA1f00413eb619c435af1417d7e41e217bfff257ad8
SHA256a22b56148320aaadb4541f229d4b3e25bd9ca9feb8f2e13969deb631bdf3fc71
SHA512eabe103f10993f98556eeaef691be1e910b0b8c180d494524c1eee59e8317745059eee1ca49d5f99de8a115c9f4d95298a9749f84ceb502b722dc19ddfa672a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD58a26d1ebd4697dfb89e443146b382ac6
SHA12416407d151f6c63a71b34393739ea31dd2cb9de
SHA256beb6980658dc36b296441734d232542dc461f0a0cdd86d841a0830e24c1d8cea
SHA5125a93963dd365b2f9dad082c8ea62f7d8b5bcae4feb79a04b7b1841f159d3436a171e27c0ab2bacbc8f465c33017001b123a70c17d4b1b025fd45c23346a07fad
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06