Analysis
-
max time kernel
119s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/01/2024, 11:18
Static task
static1
Behavioral task
behavioral1
Sample
5b1ad5e1e3a51c5f9bf342413c92f25a.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5b1ad5e1e3a51c5f9bf342413c92f25a.html
Resource
win10v2004-20231215-en
General
-
Target
5b1ad5e1e3a51c5f9bf342413c92f25a.html
-
Size
38KB
-
MD5
5b1ad5e1e3a51c5f9bf342413c92f25a
-
SHA1
4fa54b3c5d2568a9a6a97e9605724088af292bdd
-
SHA256
c15739f50be26bcd83ab7196df695127a055a730878b356cc59fa5b23ffeb3d7
-
SHA512
c041da6d870aa7879328db59ee381e48a5981069db7ba19fa378f15a4979f28e0caa84fe5dfa027541bdd4526368c1638db25ddecc2af73eb9c57c5312c01314
-
SSDEEP
768:PhPqjp08PIyLr9TXorThpVlGnsEmYt/mTnQ:P2p08PRLr9T4tmtOTQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A5EC25E1-B2CE-11EE-91A2-464D43A133DD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c000000000200000000001066000000010000200000006dd9a66a16ef9f1866dafa3c88f3bbfc9d0fd2b6ee6c83aa97e39051f7b35719000000000e80000000020000200000001a67b6bf80796751eeafdcbe0ab065325a359250366531d9e421730fafcee7342000000034974fe9e99aa143367e07210208314c489440d3ef00086e0a6c8ec328e1169540000000faa82598fc456238a8b7e1172bd29f60ac550627dbddaa2f5ecc934f0f46318b6495133c0f503a0f41490a6297e970a031603235011e204fc998d826b0146908 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2065dd7bdb46da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411392987" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2080 2324 iexplore.exe 28 PID 2324 wrote to memory of 2080 2324 iexplore.exe 28 PID 2324 wrote to memory of 2080 2324 iexplore.exe 28 PID 2324 wrote to memory of 2080 2324 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5b1ad5e1e3a51c5f9bf342413c92f25a.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5297404dd833e6787975f684922eb7799
SHA195438ac292fa285c6100c2deb9071c95e5a8bc4f
SHA2561ed247ba33ce0a83378bd2a802e78d77a39b477b97d44e018fd24135ac7404d4
SHA512a8bcee2cd367179b6abea72a49512da67a8dcb3d43194b00748b0dcbcdafbf82fa693fb8cca67c74522c4ee56e69c93dc66d549aaa46718e57d631f43bc36052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c569a2e751b0717ed07b77711c6a854
SHA155788f79abd7911021d70bc2a9f5febf23ea2188
SHA2564616ba2cd62e887c904bd31a0dfc98a5d3c1e70b9cb7014d754a81d317264a95
SHA5120683ef230d26a78dc6997b1833444a1fe1d89a2e1467568b930561af11819822b9e3e9718328bf27f2ac1e14eb7a5b7c0698860af1ccdd7bb705906970e3dd0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504c020918359d7a29c52e66489dffbe4
SHA1aa18bbc8140dced670d54dcea3004ad60d8bc94d
SHA2566a28d5e3786de9d02a4f64af6b1d6c17d6b0e80e760ff3524c285f28560d6c00
SHA512049c01a254f190ed57d0b9709b944869024119122c284a74a9d38851b0c0dc399de4355abff8aac0a3a8f1ef116b84a1e546f39422582623a087cab9e1a6eef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e26db01d8e70aef14b21344a11c106d
SHA1bc2393efddafb175cdb401feb498fb983aa9b1aa
SHA2563925e866cc22e4182e02da2a5e248689172f447bdc587ac39ad81a79b0fa8857
SHA51256480387a3a34e0bb2460cb8181988899ffe9b4f94661886bc7cb2ddaa0ae0b620c97a16bf701e143d7fe8a783d590b362a01ed7b9a2f2bfe9fa9a200edf58a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed50e2bab8363e54c82d6a4aeac3c111
SHA1bbd5a5b881241ab0729e753197bdae6f3221da45
SHA25610de6a4f7c6054eab40294b4cc8f19a662f63d86866d282a0df0a6d028937f7d
SHA51279c3cb66199c297b9f14ca670708fc641493f784a3c0d9af5c3d703b4afcf1b326cbd979bfdcf35404a742599889343eef37ab4dceab2ffd6a65cac40e5dec93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd4de3bd2741aabc22a8ce258da47c48
SHA19d44f360f808bf85f6bb5959c1943a0785568d41
SHA2567addb64b3787ce0f6f68b4380422e35a074e61a9d8bc273720c81be0929e9f32
SHA512b37a708e855cb8745b2593eb27cf37b0dc3cc1833b135014079414c2db779379e62ccd6342fb888094bddb07a5b4886e02050e6eba639b645f12f1328a4a9083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cc06e3860caad6966ede7f3dc2e2538
SHA1eb545dd3a5d8df212c9aec7710b3fdf6349df4e6
SHA2567d760a4250e5abeaef0793f207437363cee8a6b12847b230ca2aa1e0cbad7c72
SHA5125ed7b2482986b92cca52e7bd9af64f40583c783a2cc2971af9c7e0af55ed7979108b34a2ad4d91fef5b1d5ab3a583f2c151dd002ccda8fa71b3c4ef49acbb16a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54007222a67b9e39473a8b4bc0045c980
SHA1f63e8c997d7c7822cf6a945303d637e8b41df1d7
SHA25666af43d2b4e66547b1f9bf2420af6b38950b58a7f63444f1fa67624f1c647ffa
SHA512c24389c470f73500ad6256f77c7ed7b1667ba69da5974b8e8599a69eef0c8487fad2ce33b5433009a8bf14dbe1195b3e16bac8927f1f74bac918d54d95e46f76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b0a911e9c97aa38358e826c90247f7a
SHA1c38fd7226277745f1b491e67884e1e47a96bb5fc
SHA256be9a80609617618348dff4b8e099626d9e28afdc4cd6c2250f0267c79a02cc72
SHA512cccba79aad7774fef1a2abe68689ca0e95075c8156307083f776758b0f0b8a849e2304a7ba8b0d96827edca35bc06db44bb70b31a066be549a06363f67ff85fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596406bad019fda1df90ce616a4996dbb
SHA1eb8516679af3c9669fe94082a173451c148f2c2d
SHA25622e180b517699e26849dc91d83e91b142f2556f020c3439243fe87897465e89f
SHA5129e3d91fdd8ae57cc274b3c3bdc41085421e2988079e34440a2b164ca8c890d5859334d679ca55f55cc6028475f8e92edb11a47d972ab4adc1bab72262ef2c2b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588ce255d7b2001079bd4453c630feb70
SHA149d3293ddf560674e997fbeba343155e190e77fa
SHA2561110e4db81196f1bacef2ef4614bb8654384765d76960c80a81ddb4d2d14f3b8
SHA5126c8cc8f518ad309c9b25000c59ed3a9ee1fb55d1e6d6e9b864742cd36a7d935a34a3469bb1e57bca664ee2b0b06a2dd4ccb37ade2a88f36115557e8b1388b2f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1993cf4c961ad86ae0bbf971b355ca4
SHA15f5fd24b2edf008c61884f7863c36228fa53a75f
SHA256e0026c1c419288d94ea06e20cd35324d98bdaa45926f75b0549d2ff6fcccc409
SHA512183038fd95f200f7af57d28a65eef40b9bd8cce6eee81f569648c596066b0f09249d9d3c9fde692fbcbd175ae13cb09e81c0015919a81388597f92b288e760ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c1f1759f793cc6a4c2815a6f4dd5eac
SHA114268e6e71800f537c70b4b69f6282efcbd813cb
SHA256c4e7e6cd9b384d645beca0dbd136292df6b542c715772b25ae6725b1b6179fe7
SHA512e6152b54feb5d45f1a0ab0be8cc290cea745fb6edb740d815c79e25363d2b84709a044a90d831d29110a3a03292f7ae7dd9936afd9f94f4bf217780a27190624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5138245c845a4702d8096b14f8a420292
SHA1fef270974e48d41ac2248c69d69c3e52625c2b72
SHA2568fd3e67877d3abfda715925ada6395e4a57992cd66c1b24ca5e4e6694f8242e1
SHA512e1111bcfec80276d77729140ebf7107ee045cc4c6104ac3eee8a819daf793aceaa929f6756f411eeead7a4bb4b7e7036036dd2620c984c6edc7ae3023184cfef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b4110941bcabf194ab1ffd8bb4a938f
SHA18eaca7437fb2187b20032221d690dd8dc4f887bd
SHA2569377308f172feb0a078e4bf1aad451a111088b04983aa9b97a37f2d18a1b2aeb
SHA512d3db9a4fde020c4f7092803a56a4195bc2069272e33123bb19a1f376766bc1a22c77c3e09dd2b65fd4a9ba9727e2843aacbc5134237d56a842d22bbcb0a2696b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD58442eaf000442ced22feb7e3b38879ed
SHA12428f6f8f658191d744e375a1e003b29a3d80fb1
SHA2566d8b40bcb2662d2bf5e682b704a221e14d41b1e00ed694f83ef7150d239ed943
SHA512bbe93624353cb9a281fdd3e7207655041da1568b61c6add5ae495f6bfcfd93b3c348e078b2f20f3472766aeecd9bb05b470b830c443f504047b74981a3511514
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06