Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
59292cb7e59b015f93100efcd857053b.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
59292cb7e59b015f93100efcd857053b.html
Resource
win10v2004-20231215-en
General
-
Target
59292cb7e59b015f93100efcd857053b.html
-
Size
254B
-
MD5
59292cb7e59b015f93100efcd857053b
-
SHA1
9b664707b0d3a43fe52e5366497d50ce72fbd8a1
-
SHA256
099b651de058552d5ba6cdfade8378bf90d0e483bcb023c7e3b910663e61d892
-
SHA512
3c9ffc7353b69440c67fbe6e42e4da06a8f0da09d7695ff6a889140c722cfbb2065fdf0c62de804eeb78c339c6f2ca9a8c999fbc6ce0b3a53a3fcfc641afe497
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 602b0f9e3b46da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f1200000000002000000000010660000000100002000000043857369ae79a3c7eefcbed7f2b15359bc84772aea21f1aec3e153d780c508c2000000000e800000000200002000000093292609da1759158a465bcd0199abce166ec089ccf8b158ccf812a2a958d34b20000000e774b67481a3fe2d850020dd69b18d49e718dedbcfb723349bf0b77095738c96400000004c34c21eb9fe8541f6a3cae8240b690a67918e28433db43b7969cba6c49f2942ce706cb9e470bf0ec0e14886cf54d6ce8db8c14ddaa54855fffaf7a7b7e343c2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411324321" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C96FFF01-B22E-11EE-8232-4E2C21FEB07B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2968 2088 iexplore.exe 28 PID 2088 wrote to memory of 2968 2088 iexplore.exe 28 PID 2088 wrote to memory of 2968 2088 iexplore.exe 28 PID 2088 wrote to memory of 2968 2088 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\59292cb7e59b015f93100efcd857053b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5c2e9561fc97f014e7f3ea4998b615cd4
SHA1272ac0c1d86003f9cd9d1371cc6cdaf61754a147
SHA2560d44a62ed6c7b8ec6f2fcb814269e00dde879c6bfb7dedf26d6a280db66c77de
SHA51282014e4bed08e5b96b02a04e56a6e87adb0a6641b4ac3335355399384e90445c8170cfc2548e227f8f1fceaae592f6bddf99bd578b7aa82635228d18cbf24a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3a077b72d5e6d11d545d1a6aa0ba75d
SHA1d70f4e7f28cfa569d3cc1176fd92c98a5cc33e30
SHA256d427a771228943881dda29baf754e21e909a47d5a4087e02080b08620a51cc4f
SHA5125713f24ba82e1156de71cc9ea39dbc134ec9fd7e7c07fafb4d88774a140530e941df0f9a7f6a9da2e62778bb8c1634d9cb3e52a7f5f9f3ee4220fee23276a464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8903eb6deaee984caba77a37fcba023
SHA12681282961298725c3ca611b5f2e2956710ee10e
SHA256e60fed58ae4263a1cfca1842babfe0cbbfaf2698db1f09da00419138eedbb2dd
SHA512d4878b689222412ca529ed71bc64705026fde39396fc05223e846c43c3c219ca3e0f512e128aea7aa6152907658bdf33d53535b043ba89ae625b2904aa428c92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a562791529475761147a247c22ba0018
SHA19ec815a87dd01b4ca0176eaccf4c7fd398579560
SHA256d6361d1a44a6c9863a488320bd3bfd2cc5f0e28c738bd32e9ffe7cf3f90f2082
SHA512197940e427f0a48d64e9bb2422e6aa427c725b31d5736f961dd9b428f1d92451ee9d92fbb9c62bbd60edddf969ff392f778f35cc2017b6c64a8ef1637bcce54d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe1d6d74845c7e70150bf69c4103ab13
SHA147858761954eaf3953fb7014fffa24cf6a8bf4c6
SHA2566978638cd207d4a8065c93d38026b79ca8ae8f403d61056db77a388490698dd7
SHA512c7fac5f84c582854453168c8e50c1fe7634722dabda7794da35e0b98b67ecd971e866520ebe64fc4fa8d6bfc347fd34a637cb3f94a60ae50c6b1b8f1d91a2411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e52a18fd2e810b461e737446afebc20
SHA1bab0bae3fc480ef662138a58e839d36e52150837
SHA25679102a30e29a15f010008ef53fcc488f6e747e727c3820f798995242ecc7cf12
SHA51239f10f4aeedae57f47feadc937de294a9b69c070cfab73a44b5d3f4087a5e4af842a80073a1ec7455cd5aa78887e295084254ab87f3a1620ec01e06fdbe19e90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533f5191cd40144f5fa033398db817f40
SHA1b8f03efe811b52a3061b087b7a17d8390a04f78d
SHA256bb97d017447bc4e3819481e32f4490a0518c161a1645c88907e2a065c5a8e012
SHA512c8ef71669285ccde40453f698431dcf9159231f74e3cd78bca55d0ef6765ad3d0d2453fa070c8ef2afd3ac0bbd93a3e118b7a39f8686cba83b3d71c3f4ffa9ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc5891c91a20473297ad55acd99f3e66
SHA1682b74867001e608db1590ed0ab9b99e1c0a7d15
SHA25699495a12d9ed4060a85e817a038b49b4bcfc2ba9cadf16569c9e33cbbe926087
SHA512400987a459b3e0d5d1682f67423af8929af8d47724a76933d8b38b035c763aba317a6e1b0cb30c877475ad2ac6a213a7ec334e77d25388443541f09e89d300c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a0dc9f7aef3fa29a57b2105e435af13
SHA1c930ffba39099083b16463ff3d422c3461fae6b6
SHA25626e61ba3924d20d0f5f8e4f0ec0fcbbcf6981c937ab7651350e7bcc9cb53380f
SHA512e5bb0080a67b11272390d2242c31e1c639aac994215fff48f9cb9ccf5dbc53f4229f28e2f24137030f068a3978adfc78cab4f43f00a78b20631061312772aab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50faec6427a361d1c66fac92dbea53c00
SHA135f0867cafcda213a51db9adaa950ed79f3fa1fa
SHA2568b3119dc6da8aba27a6fe881ce990bd16b0ca5a031ce9cfeb967d532c204916a
SHA512a57b939cf3a4a50c31e7fab8f9f5b47ca4fc5f5f97a6a10960c27417f78123f95584249c1e538dd415d3b64c1c7a37ae06876034bbc1582b531127c2131e53be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff17c412903ae50ae7a683234315ea35
SHA15fad0976b4ac0376470c87c59b99f3463ef010be
SHA256ecb2b2c0016861c26d91789def221454930b4d4a90c33db957828e3941671547
SHA512e442062464fc66858cb8a9cb1eba3ac1731c5d5164a7071104ad3798a59388d0588d786c2a252bf984264f8b3c4812d35204e68ce2459d3f46be8244e705fb9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522e1aa3a25debb3345efcafebbcf3be5
SHA141c915534eac1285e46fa827edbcb6e006a71ed3
SHA256f279f5cc70a0a769fff84fca0b07fc5d3a1723b0c4f2c87b2704e9b685afb268
SHA512b689b1b1773b5c733c90d1f31a453ebe2459ebbfac334d5ea55e5610a3257848da9734358bfa07d1df0c06f7bd8c6565d96eeefdaf59b06be575c13f053c8566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d8d622b32ed2bf960823a28a54229f3
SHA15ef0c0949fa22a7625dede2932ffe791cb3c65f7
SHA256b5bf1250075642c90c97de9044e74ed9cada9ad8e4f3550aee5fd8f144230d04
SHA512bddaffc7ec9976cc956f3b4d2da44c95a5beda4e18d6e3ad9160208139d87ebc1ebc99a98a88c73f3fcde5051c66bf6d21e0ca71204915ffa38f39047a7a64e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56897b7644fe2c729a09ca3fa6178b126
SHA1211e0b545cfbd9b303c5c65bacb3b08ec15243c0
SHA256e9207b2e07e21474fcaae8b5968e58889bea9f8187e0f036b919771f2cb08037
SHA51293a6cdb1922f9eb803f689001b8c1b4a87f40517acb03dcc8415e1734490b55a2f74f78ff8fd6c89f2364deddc7b159a2b2bf385182c05c9cfa5ca2f26aa62fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506e7f8f90632a43742823ba21fbcd226
SHA1e8563d79d24ddab5246ceeec986dcb3004ec1dcb
SHA256fe4abfdf36cd2b994f61cb581b23db641584a85e1dae14429d08f373af5e0098
SHA512f56acf93dcadac663bd2aa6e473dd71d11763cace54ade6a6e7abded884f0f429e029bb13a9bfc785ad8f9f3371d7cdfa37a5b8d085fada96c387020ad9f54c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD576f1c12a360f4ad18c4b8e3c6ff2646b
SHA16d91bef7c30f79edad686af30a003262c8320fca
SHA2562bf465864e54369644369caaf39c56846a637a1bdb0b51276a076f888d836c58
SHA512b0cd2eed067d07dff5983cb42ecc20f91b596b19e490d83c75a0f905a6e582c4b57067e7d7a202f73c98c9758fab01634b138dd6b7e733defd28d253398c5561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5346c836271fbba268efc72c45e1f451e
SHA143b917bd8d424e842f14452515f7ead33b934baf
SHA25698c482bb075702a4df19c62b341aad2152e88653471f25b04a4055e4dc08090b
SHA512521db388f0ead379b68118195d08ea64cbd9e10e64221ee78afb95d0226ae3964df6f8af70adf88325225aeb5332cbe930a8497bc4c4982b81129a3273d0983f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06