Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 20:17
Static task
static1
Behavioral task
behavioral1
Sample
5766c75380807983529cd22fd36cfda3.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5766c75380807983529cd22fd36cfda3.html
Resource
win10v2004-20231215-en
General
-
Target
5766c75380807983529cd22fd36cfda3.html
-
Size
33KB
-
MD5
5766c75380807983529cd22fd36cfda3
-
SHA1
acc96c38e0b46481db02df4752029d684cc372fc
-
SHA256
64e0b3280bb7afd53e58249997737de1edf8e307464bcfed079f16e196fe9368
-
SHA512
c8668b4ed4392d7d7dc5eb0e7ae779d5dbe8dd6f5555efc07fd8aed908cd8c3b0a8f9b49980f69c11ebdb0f6a26cb2720c16f41d4c30c03ee1252eeccfd384ae
-
SSDEEP
768:OfRWkpPvWGWevfqJWTWvN8fmIfWFqqHaTss+HoC2+RMzTU:OfRWKvWSUWTWvN8fmUPC2++/U
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411252522" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10835c739445da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{98F4E681-B187-11EE-BF8F-CE253106968E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000c558089ab5b4020b24d55606a85d09d461371253aed6a2e3bd93dc8462b1577c000000000e80000000020000200000007354489a0f44d1d22b03a145aac1604528a672144ab09cb4b221d45d36af3ece2000000025ae651025d29dea9cb5aa6afe472b9c3d9bffe9d2c7536df1f808b59e61f29740000000e1edbe437a175de3a773813772fca468de384edf8efa30f38c10951825366fb761a8b1391d04f29dce787186140b0e7b48b5d99aca21ca40b357986e90a40698 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2040 iexplore.exe 2040 iexplore.exe 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2608 2040 iexplore.exe 28 PID 2040 wrote to memory of 2608 2040 iexplore.exe 28 PID 2040 wrote to memory of 2608 2040 iexplore.exe 28 PID 2040 wrote to memory of 2608 2040 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5766c75380807983529cd22fd36cfda3.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
Filesize
867B
MD5c5dfb849ca051355ee2dba1ac33eb028
SHA1d69b561148f01c77c54578c10926df5b856976ad
SHA256cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b
SHA51288289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5a1aae422638c01c6ed3db3655154c977
SHA1109d37aa0d9fc96c475ef6977d79c42d2673a9a0
SHA25698feca72366e413c0bbb3523f971e38dd907f6e96d556fcac097728e1674fcfc
SHA51209e4ee8c2b496578a6476be2b50f682f46a1dbdc699ebcffdfe2fdcb6404ac9e25c971c3172e3741ec59e4b9d9eeb2a42d94a57650dd1970676bb4df0d04f39c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2d6501fa31d47b70a9208ba0f0b42ee
SHA1ad1c0e5f24b4f0649091653007126c619864347c
SHA25668734ab4d80464b02300a0b0bc7c2da9c89fb6abe3bbf125d590d1849d005a36
SHA51226915f3d70972dfc85892096cf7e040193bd84fdb2fd8db249fbf9d2bce3d717f935ee5e110d97d31ce9a94b13bfdb6b0551f6e2700af21756ca82492c9dd43d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5291faeb80aab86db599298d397d821e0
SHA11a40e197ab7a0b06da3ec42b4c8f7749d676b410
SHA256865500e88df0547dafbaf8eae33b35a9667be3d9ec40a6942e76a6fe4942be83
SHA512bf74809c8e6552490e2d77be891d844bc0a2b037b594df1cbc7d0d261a18836393fd262e185ca95a45b0c6786aa4500cb5f16f20f757162d0dec9ccd0539514e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554e3090c0be78b18a6b51d22a9951d3b
SHA1bdce82b60621173d3df7dedf49437cf4433c5fb9
SHA2560c04f069e30d28e92200326d432a2c4d388f846d6aadab233d0de3f9ff86313f
SHA512978317a6427a26eb9c198b394ac7d33b54e810d9004ef50ab2d43b096866826063ab39795b1501f06d95e25a4b53102aafc5cdb3eab378f64cb8f258f32b27b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f494d09006bfccaa30b481019437fab
SHA1b168d71cd1ab82e2a16a36c563a2661d22929847
SHA2560a8a7ec6cc593bf0c1b0b9eb75137d5dab177ef83afb7c40a5cc8e3df6094f46
SHA5126af92474638c31d1237b959cd2cb3de65c10727b00bbde2e235b7caa497e7fd9fc3d1b11380639593208df5425b8992635caf8d9ddd148abbe5d21676d8ab268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c11a8f25c5d27e066cc8fbc621c79ba9
SHA1885f0411690c3c4518bb08061a32e5257ea5f681
SHA256ccab2bb2c01c77e2e9caf5c60f9b2210809e7ef75e8959328370e829d7dc1246
SHA512550ba58f58b38c1f9473a8ee761194e8e5806802afca5e16faa47c85a44386046cd4e2e6df034811f1c01c8c90e8598c5d118fc4c878d0cf8b7faa58c8619121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533d801757096bbcc205e317ade266863
SHA1b7da7bff895228cd6a3b2f5d159ee8715067de0f
SHA25628bf0d9f4a29a332c9d94a257ccc0000a66cefc206fa299efc8a8698a4279bd3
SHA5124a20e82c73bb341d487c2e8e2b894867182f87a3fb8d25c67fee887ab1c002707c81617a7e50a8cb3a5f7bfee2be8b572450a5876cb3aad3040fd12075af8406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d95a0d36f937667f55692b6f8908248f
SHA1850298ca12f264d404436d11d77f1759b6f098a1
SHA256bd4c28ae7b0eeb425ce69c488cafc5b1f08ba80432c4f29a4dff5232c98ef28d
SHA512f5c58a876695ac1872434f0b6470e75fffd6853c7ac911acd30c147b85fc0771fe7c7b95e027f92a9bd7b5448ebab9cd97095ec8dbdc9000848b130909ed5627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55036ea601c210b3c9fdbc2412e85f214
SHA13671a9a1ab39c24f1d74614c0d49653befc0a2ae
SHA2560fe6e683be11f4451e63800d3b0e0d84a9029db887b64928195ad9134711837a
SHA51203b3f03677c4a3e7c2818dbc951413a5fdc91015fb8c7051422a860d8dc4e7b6e7c378d4cbedce760d212e089bd8cb4841d8b3feb540e22006b42e36404e1158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546265a931a95d198ee065082d1104609
SHA107626da5a73f50228ec8cbd197d00a738a904b43
SHA256958fed003987ad6d3efa061c14bb4dd271ea2688b4ea568771dbf1826dd4257c
SHA51292593606f201171d0f7810cf259f91644a85612b4d92b2971730f82c13202eed41bfa2478e688694ae34084ab9e2c63d3b7d47677e0396459590d5587e11f964
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555d15a906fb2d4c97b141d16c170ba9d
SHA1692f6e5d9731430c14c4e8f266fb5e5dcea28a2d
SHA256eeae26de913387f60e643e6c16ea9728a86f2880416e9f97761913ede5ade262
SHA512d893cf5dec431b07e021483606931e46f512d57935dd84846f2da82802a453219d870084fb1f09217749ec5bc060fa99a6608d61bf4d42294e2e161442aca288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5935b9e714a19eb65b68055ebc5e4bc79
SHA11aaa21e2e985897ec6e6aa96cecc3e356f59bb96
SHA2565425710fafc69f35799836fe8ec48e8634dac7aecff2ad7caa39dd85919d21af
SHA51230672cb2f794e4ce445bfc9abe2ee3b13a8ae2f4cef834c9f40a18528382770d6a83a9b75b639c2daefbcc82725b7a69d569380fc95d569bc220d2291f90948a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad60603f6684d5471fd0635ef3536430
SHA1da2a022b7a88eee7d21adda29474ea7657b7ce42
SHA256637645560489b30eb1d4cc1e67f92d5a9e412d0658d4e226a22780d3292eb6b7
SHA5120f48702c7b3f1091c9ffe10c7bc833f17e57ecd6989af3bfbebf00544281ddbd0015d1f541bb2c9096374f89e24ad6a1cd9e71f42baa4e0e253d36771a9830a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568f84bb9a3ad3f8a4f394c01d1b0a8a2
SHA12ac5b1b1912d7dda3a0b58fe730c2e1d4475eea8
SHA256bf21d337a8c17db2e0d56cb12fc144335e8b9651c59b1e1d6f70c5032d4d7636
SHA51298661e10fc01a63df57769377f030273b0bb755656c477c7efb4e905b38b822ac64276d44d9ac0d7f40e9047d3d55bce78913bb72b1345c03a3b82876408bc01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d1529a94716f02e10fc4fdbb644cd57c
SHA193daf3e083d4a05a36243e7cbb50f4a3cfd21e5e
SHA256a8b5f59b1d64db28da6abd392c773deab9a1275e7f33dafbffa3b399d602b6d4
SHA5123fd193ed307b53172d0af26368b1f65e89beb9abe628368f4c1ccea072883c6b7a98a86f6f31b0b753aede65dde1b578ad7977bb8a0e6968ea3a7a44f780bb91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1
Filesize242B
MD58c68ca8ade5053ad44f0e06346776a4a
SHA11ff597c395df949274fe24743b501f93a7e8892f
SHA256775369ad25d898639279ae424e564e18dc24b1312bb4ca3124bd924ebf57ddfb
SHA512112316b45d926e6c063e6174d34e05f25c62ba5226b67b9208d8b4cb684276609916c14d26517dd970eb156059f0ebd825bf1d4b1225bdb06dd97abc527c1bd1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06