Analysis
-
max time kernel
121s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-01-2024 12:11
Static task
static1
Behavioral task
behavioral1
Sample
58e3412bd4ae0202c6f42e6e5ac8fdd0.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
58e3412bd4ae0202c6f42e6e5ac8fdd0.html
Resource
win10v2004-20231215-en
General
-
Target
58e3412bd4ae0202c6f42e6e5ac8fdd0.html
-
Size
1KB
-
MD5
58e3412bd4ae0202c6f42e6e5ac8fdd0
-
SHA1
fa1c30cc75f97d51a710c66a30196bcc342a85d8
-
SHA256
a0c439e9186c2455f74720d4dc1472d7cb457fa0e83236e4f2618812320f47f1
-
SHA512
0d76d15fd550d282a15c31c8c43ef69d9b218bdcb3abf7a1bfcb3ed66d3cacdd103891ed2f20c4388657feae74c0acd59e12089483756b13692698edcb32f73f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70d049cb1946da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F6145781-B20C-11EE-B6E6-EE5B2FF970AA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c00000000020000000000106600000001000020000000c23bacdb70f060a15b9e1c843de42562e11771472d186ce8139731de5203c106000000000e8000000002000020000000bde62e77945f91bbe06207af0c8e125d17dbdcdaaa91674bf3d831368b60039d200000006825200c4c8d08bef151c75aae4d16f46697b97a5a206684252f7781e4acf20740000000626d182ad20057d9439680f1550dbfd7a3f0576cea93f763c46c9962c8ef28531d44a69a965f0331eb250bdab489b3847bd5b5706f6022a19adc8d11569078c2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411309795" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2452 3032 iexplore.exe 28 PID 3032 wrote to memory of 2452 3032 iexplore.exe 28 PID 3032 wrote to memory of 2452 3032 iexplore.exe 28 PID 3032 wrote to memory of 2452 3032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\58e3412bd4ae0202c6f42e6e5ac8fdd0.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57158f067d463350e3e9d5044b2b0d5a6
SHA1cf3bc1d8e2851051e8bc9aa8b734ae599227b10e
SHA25653e96c4655ddb8c03dd5cadd845aacef7b2f450464c1fbc606a01e3b56957c80
SHA512657e1c6ea5ffdfcd81b5e73454cd670c6eaf1aae4652697df231a2bbe092af6531c856b04d70386cb9a69cc00cbe4b6762030a2691cd3cdea47c26a0857d5dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec0047d99c8316b247bbd658d13bf822
SHA1fb06091750a894a3abd1fcec30421fe20a2e5801
SHA2566aebe10f879c99c5384a7ed8d72f9456b7b481c105a4606ab3cf5bcc1b3e46e7
SHA512e4f2579dad813cfd1a65fc03d0bff1f4fc6599253366e1da679eee2ba8325e5deb5f4dcf9e6c2ad0f744ab5f0e1ce11a311b8a743a1fef6874a95d652aa2a7d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0eefd96a1b0bca7c05eed75b6fa5e47
SHA135637eb6939f0f537bfa68e0114a9d3853640656
SHA256248231d18b20783fec6d4800ba652e248efd0afd47392fa5102d56571ea41c6c
SHA512ccbd1f272890e959febccc8f663ff7346d1818e68a9b6905aab3ed0bd35342b2ff4923d144900778dcbd3627817daf6dbad0713251c1172e25a6519b500d68d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567bbf7819bb7243280d3dc60b97fef90
SHA16ca0066bed81d5a44bad89fa07a98b439ffdd898
SHA256b220b06017b1fae82dc216d344e2f346995a578daf4d0478da5d82048836ec98
SHA512ae8df5cfeb21c33f43f33cf42d1c39b12ceb27daf81a5e2fa2e39c1feafaffc4d987b0b33ebcaedf515b47b44b7c67c8b5409f8eb2518ab5595ba236ba3fc5ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d74ac90d70f22390cadcfb26036c39f9
SHA14f87540646d9955588170c37604c9541a5ecd009
SHA2562bd1d87505c24ad168a514b2a965a9bdb0fedf909ae29e1704b38262cc2eee0c
SHA5127260a9db1a187f5f24e4908997bf88ad186648f169a8318efdecfa7ed1911e0903ff079fe82c8bc6351c49ebcbf27984d8d507fbbec4c770f1c6f66029dbfbb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e66dc3e65efeaa5cea45057ca31cb10
SHA11bd341be9ceaefd4cbed67a46b372c2316db8ce5
SHA256a3babb2977246227a3e10d447f92fd8e87519360631cfc2fca79fa54a09d4f40
SHA51216a41ec6d0514978ae5f8c703be09b3d89697642e02dd8bbfe8cf62335176e0f130686d5ebd52a4c79a7479df134f818cdfeff04dd1e82fb4d24e4c13a43cfc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cde764c8702584d92bb2e6888848725f
SHA1da1c38385ec6ccaa34634c86d4f8e791ae536a2c
SHA2568c69d670e3366c2e5ba1f49df06f74d519a138136292518ca87a33f8bbee050f
SHA51230007e4ae0ed8d37402fadcecd61dc3fe568c535a0d81c2e933aa3a4923893d5d9035f56fd14178944f01e5584581e6688af5d3d15c559dc4001909b27627744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5013fd7b546469050eb3565eb310ca045
SHA1014ff94d7dd497518bad1542a5ad992310a9daa4
SHA256ec64f03c16008c8a6eff9aad3fdb38942561aecd6c2fbe4d579a33ca021527ed
SHA512fbd42b6cf514dce9abff59a636b0f1cb895c30ed6cf2b916e37b0dea0cccf2d86b39002013fc8f2c6892c7479a744b6febc692b90483c28967015255fb8c4a5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7982ba67f5b3187f9ef42886fd5402c
SHA166dbdf4baf312deee207eb69d5fb76c18035f19e
SHA25621a3ff6f99dfd02673a5be32ccaac824bc9ebe68de232a04aa11fb9c6b30157a
SHA512e014950a9ce06e9979dea0a2fc7ef1c847dffbb6faeafb83b07727a011f1e275aa95ff4beef3cf887e2016315e71b5d7236e76300fece75de7a560a63daa4b8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ffb7a6f62c1540474159e78c33bdd0d
SHA1583d00e461233d1574bdcadb4a48a48e561c68a2
SHA25615d51b90ee39bb78be876e7ba1aa34996fb3c3b3db07525e966488e5dba2b0bd
SHA512f350dc8b051f784cab01f01c27e72c381854cccd5ce34aeedf7c7ee5793d231be227aaeba8026a6b9771e5a332a3966d6009287b724f78499ce1dfc3aa5c8d4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544f8503326357d5e472441be9e738654
SHA1df908367da5e63823dab295864884fb3b6f6d880
SHA256b7c360c375bfe08c4191b107f8b4f51f4e2062bd8df42cba0ac87977f3a0cc45
SHA5124ef6ce8a93d4f07e968d437f619f3270c445e7cbc87147d59312dda2f63737c28b4f533328e04abcee92c179bf3c8b9140ce27a2635d110986f6e8f26172249c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1cae9d6bdbb6b231d3612e4a9c00265
SHA1c27de7d707e395343c0d433be68a29c1f799b2bb
SHA256dc6b63fd83647b40b5ca9f6624ab493630b31e728640fec1d7f7550887ff4cca
SHA512d01b0258bc61218f8f251146eafc6b1166f77a91a07b6a5cc89f7bd6700427ae3158d4036188f70e836c8df8de02a66d3dd6d99ec8f437b257611c2e225b2572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5065733fc809fc5f5c6d79b042d764dd5
SHA178820b5cd39bcd83cca90a6fbb6579a4682b1d20
SHA256e7d098f0085abbe9486c0ded348ed90b7b147071992243220caf26998e18c15e
SHA5122ee7840afa4629347aa1822d0c230b85b29a4dd1859b6381932e9dd8dfe59d6c135f1e3f98ad0d66da54c0321016d1bc12360025bc645c2464b44196a57ac68b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5705a56810b167d760f6922f9d84829d0
SHA1d1ea0c94c9c9ad4fbb8f909dcdb00acaa9d43b75
SHA256340fc653885301aade7cb9a20ea4551497de4a2fca331d8698370c619466b7a6
SHA512d4fbfb3f5998dd860030a4e785e28e6e4d2fbf023dc4920c9a640e5aa51dd0cf35d3ce924cbe884e6a0252e9d2b1f94b2a366d365c31cba5b4432a4e7714f41e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5328f8180e9de967c9621fa9256dc83b8
SHA1bee3fa5a00d42f5aa624f37b2f8e6415e08d6670
SHA2561fb100618bd133e837ddf9e88ff2b0e5d1490954e628c6d81513534b432c0453
SHA512ae6ff25dadf998052e90dadc231f7be1dfc5ae254aa40e49d7d65e110033c14da982b5846648ba9ffb646c38f9bce0150cfea1a0395352920f0a53b86de484f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565364af9dedd0fdca37aa32fc5d7133b
SHA104f7582ef902d7cd5ee118a1ca5d462c3efc1a86
SHA25687d92782c0e8705384ebb77f6c9579158a233a486093f51bdd26f4cecf043936
SHA512e5c25dd52109962885183795198d9620125786e28981ee6670e7c121589d44b1062da0da3a3a29e3cbfa4c32fccfd7c4805e340146b2514f69d85c106775c80a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06