Analysis
-
max time kernel
121s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14-01-2024 12:41
Static task
static1
Behavioral task
behavioral1
Sample
5b438ed871fa3999f1052635b95ec578.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5b438ed871fa3999f1052635b95ec578.html
Resource
win10v2004-20231215-en
General
-
Target
5b438ed871fa3999f1052635b95ec578.html
-
Size
6KB
-
MD5
5b438ed871fa3999f1052635b95ec578
-
SHA1
a70061aec1532f58cba5640ec6f444197227b026
-
SHA256
e7e8b57a03e667e199c8c104b92a58af5b0d78fba2593159957e1412e956610c
-
SHA512
1aa04c16332d503c312e2e6cd0bccd0774ca026eb68422664e7014dbc552f11d473e5618e52da565f3ba79b1d9ce9f00bf74476990fffdebc87d2a60774c72f2
-
SSDEEP
96:uzVs+ux7c3wLLY1k9o84d12ef7CSTUHN/6/NcEZ7ru7f:csz7c3wAYS/W4Nb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0408620e746da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f12000000000020000000000106600000001000020000000b461f30b0ede178f58aeecb4946ee88eb92c13fedbc47a162f5b05c654cbae6e000000000e800000000200002000000076e007e69bf6a3dcc2155e2d8648d8e36166b2b82149e51e3321ab9c7d8b567d20000000b527f25f79512fb4788786b33ab96d2178fd6e9f3e3ccb44a1a27534e886f6ba40000000789666cfda47e85d3f04c8fa72a7634560a366dbe5a4abe0b4bdf89f5cae981952370d3e433a3f7791400106ba8fb971b08da402ad657de1e3d8e624569df291 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{32FEBCD1-B2DA-11EE-B55C-66F723737CE2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411397947" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2280 1712 iexplore.exe 28 PID 1712 wrote to memory of 2280 1712 iexplore.exe 28 PID 1712 wrote to memory of 2280 1712 iexplore.exe 28 PID 1712 wrote to memory of 2280 1712 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5b438ed871fa3999f1052635b95ec578.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5e4a6cd241aa755ab0c79ce83fd770b29
SHA1767176c23437bedc3357b4a7f2a01b015dd35a31
SHA256076faa736829983bc73da5a6998dacec515c7033487331a409cb582a70a978eb
SHA5128916fb4e62bf66925e5d637a671c66379ce3b64d6c2cb0d8989ae5b9c5e130d7aa98789ecc6434658f802ba085358839adde3e678ff762e5ec13b4f5b21ad412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddbf98b49384917034ad8eb17a04d67e
SHA1d1e471a804b9f187c91d76c063be71b2b0a3e05d
SHA256661cb423244f78ca0926293c3dd1e67fcb295b9d8b629dadc2d2085ed41a0228
SHA5125b3f724bfa060968f82b403a6946ee777728e8f54b7d42b2bd6aa47b391d74796f95988da0eb7d8b51673ed5caafcf8fa31df3f048e945dc4685580a1f6afb0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52647b0199bdd3b0e9c80dfe1125a26f4
SHA1196123400ec534a2e03c4caac49b61e78e665880
SHA256f24a9c7c68b0ac742b21e8bc8d74e662810c4981912b558e71222962078311f9
SHA5126b9de60219a0392358146790125bbb00653d9d06a419a410ac1cd98d973d16193051d5923d0853defd2d9ee6c9691aabac666e908db96cb177e4f64b545d872e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be432f53911cd4e5b7ae15c6bd945607
SHA163474599cdc2095d04411bce217e4d94e83ba038
SHA256f7bcb10f3785144be3f45d8ab99cf517947f411fb6d084b14338c3e35e698ba6
SHA512a595e22bb17e3e966b32fab5d4534a30d6d8fd228b234ead0949a3ab416a724ef8d4a88cde4a789daeb8b4964472d492d68f321a43811adef8731a52e3d7f512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da9886b55d26cc1e41d97d670fec052e
SHA1d93242315ebe75501834b123cc1e6c06a3302bec
SHA2569babd8a610ec94b2e29303544a76d1c7bcd5c9ef198133f5d1586231f8d33171
SHA51232a9cd680e432559c907ed834e797471a914ca14038294aa48a685413d4299fed1bb31251c4422097db6d82771b988d39d23123ff88f87ce935d81b69d5793bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544d5aa61d286eac3dcd19510f1962320
SHA15377cdfc55f544e3269d66828922931ff11f3df3
SHA2567c6ac30880eb0410ade29310c8e9d1100e62fde91bca966fe45300d2cd727f33
SHA5120cb8ed3ae76fed8d87b633400667bc3501ef1c10be4fdead5ea5b99637fe099410c0465afcac76fcd7aa2f6637f27a477add7102f93880bbc1fb491289243591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54807c5fff3fffcd6345c34f61b2922f3
SHA14f6b17904d9c2f3587cfeed72df8d87f9b97270f
SHA25609e6ad5d2a93f8767dbdfb8ae4cf51ea3d290438f32931ddfc463e65c345105e
SHA51241c605f1da74e5ca5ada2f39e19d7f4d6ea644318b0b218e6e2ba5ca6eba38b615b8f08448d1c4ed60f9bd26ebf146f6993736467f5d5bfac7a2e120c0513698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d01297cafdd64f7dbbfb06fa4947d57
SHA1cf6c4a45c27b53b70fc1434a71530492ed6f2cef
SHA256e4d9a96da06bdc33132c2ae2f094cbe776ece9641004dce026370c3f87317e14
SHA5126575c1df23a78cbfbce252b5bc47f1d5967228622d87ae42a92071eb289e1f4ec7018c23d19cf7886c2d2c9b45d9891309ba0dd369867e4660eda2e081b7a22f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b3dc9ddeab7eda49a5fd621a0899694
SHA1a2c5de835a53a99056b150ab005656677d501943
SHA25604d5007b897e45f82f14da420ef829db6b9d5c31557f6db2a1225f8294338dd0
SHA5129cdd6766dc8118d23909e52d79588e30418b97510c9309d0a227b8c9621d96f0a6b04b4bf2a5508f31a7b1f0acadef5bbf8911292b1a6b737f69abb5ef5d8344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b37a0784bbbb1673ec5ebb14f6c54636
SHA1f151eea5e1860e6796ae5f22b9a8b4e503fd0c60
SHA256b90c522eaaabcbfb0229a712814b1fcdd9d10e358952b6df389826090789e512
SHA51262e468e144554348ae3f50528ac5ca30376c33769fa65db6154926d20b76739ca2f66d3af568865de11168263ef202ab2de14324ac7b38b6b77e323624e72ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d383529ba08e9e1bac524ed6059a2876
SHA1ba801644111fc49fc154a822608150a02deccf07
SHA256f04551a0639c823041fc4eaa8d9c3807a892a0d8d43ec1404cb90c9be264aa1f
SHA512ce27b8d1053f909cda4a6a4aa35a2326768704c258a2151c39a95d1689e9fc599be6b119889566b0c5cbe7cfab90bcf47c964fb4d13b02b14d155af13646fa49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7ce5bc5fde6e1f737760a11f83d0615
SHA1f6f574da59865f0a8e05f6e1f669c0e83cc2063f
SHA256966344e1090648ac24a516b08afd2b5d7a1cd1050d1d563afaa9d4b117777046
SHA51230ce407950842f79256a753a59372e0352baa23a0464f66c09623135ea4596582a902e2143f4b38d73a55c85ba411c314618d9f0354539a2a9655fffbc8c7be3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd09f2c49c3160eb8579af72f0d134c0
SHA1708f82902220a8b892a3e11cf7b40e0934e67883
SHA256939ca95d12cd3de262e93b62e4a1dac31d14e6d42f78b0cc0d08e7fc9d1670dd
SHA512e4d6434d4acbd44f6891949c45c3da2a9b2c6d0366ac9e000f5d6f918dca40dd821e3795221454099a8ec7f6a290a05e4cd480637e2f8f87f109a86f7495d211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c660cc837401cd241c9e50e8a71ca51a
SHA1dae2053ba5b69b8d10e136e5070be0ff4e654bec
SHA25611f3720aa7d6e66b70dc546446cdf6bc8a3c86c2d7a26bbc95e5904dc9405488
SHA5129a06da02ba33418909aa87cb2dbdf9f35750ba03a7f4fd504667acb8215b31633ec799adf6600230b9c23495fe59bb24ee2cc6a4683fee0c2d886018e9a5c608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06