Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
17/01/2024, 23:37
Static task
static1
Behavioral task
behavioral1
Sample
63e9036272eea805740c9e117222224c.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
63e9036272eea805740c9e117222224c.html
Resource
win10v2004-20231215-en
General
-
Target
63e9036272eea805740c9e117222224c.html
-
Size
58KB
-
MD5
63e9036272eea805740c9e117222224c
-
SHA1
d162d4f5090d8336136f733cb674811fb94bb980
-
SHA256
e2d40d0d9b2dde81a3c7019ea537b10d4d76f41648dcca9e739bb54480c42066
-
SHA512
287e1e868bef9969da8bf5c2a30c6dc65d95c50ee521836e9df058b1396d83be29d596e5efb495e0e10c114879212c8e924cf58566a8605af5a1444843463176
-
SSDEEP
1536:gQZBCCOdG0IxC/BDEfefIf5f1fEfCfOfWfwf0fnfPftfefSf8fbfBf7fnfifHfoh:gk2s0IxJGgB9caWeI8/3VGKkTJDvqvAh
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0fb33409e49da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411696494" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa00000000020000000000106600000001000020000000ada51927d19559d824868e3d5a743a7aa947e7ecb69add873d52cec9d4df9aa4000000000e80000000020000200000003b1176f77418b3b72bd62f52ce486347d076980412e76c94149db2e49430e7c320000000929681aeb78efb549c005d920a028f5a4f57bad5b0ae2a4769f790196dd2d0c54000000024fb61fdf725cbc9e60329f9b0b9945b6fda56cf99c0be664fb74b14ae752684f55aeb82c1684a49e22d49f2632374c7e4cbb9e67fb01c8250249b0e4906a4be iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5252E611-B591-11EE-B16C-EE5B2FF970AA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 3008 2172 iexplore.exe 28 PID 2172 wrote to memory of 3008 2172 iexplore.exe 28 PID 2172 wrote to memory of 3008 2172 iexplore.exe 28 PID 2172 wrote to memory of 3008 2172 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63e9036272eea805740c9e117222224c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e2ba3e15c7aa04cf524cc6a9801d1d8
SHA13125c2874a50ad9ebbd5084df40214c71e244ce8
SHA25645734816735a3ae7bb72c9906c8064ca13e856253c64d92d8f1368944b01aded
SHA51277dd8f00364a5b988af1af6c0fc97b7881aa1e8a3b69f69adc9d47ae4525425fce9e6296a330afceff0660974b2cb4fa393f20487d12b0285efa58334246705f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c661b40aaa1c4036db967264526a572
SHA10f43a2932cd802d447516e2682ffcfdeef4a3b53
SHA2560e08bfc56a7e74c97f3f0eb91aa72bbb5c2f1689598397deb055224d17cdd4c5
SHA51210aad77924a253401a84b39b5ae30afebb91022a63f12cca6fff9cc1a90114e07514714c749df266ee5aeb040eca6b513deda8d4eebbebcf29c3a2fcd39a66f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5303ebbc5c7d74a69c774284cecb7eaa3
SHA1ed2d8608e8c89be28296eab86c9592d06bb8c029
SHA256cb93a299fb1cc033fbbfeef4d3a9c1728359b0967e10486b22a58623eb1c1fe2
SHA512028ba53f32e5c423c02ee19c31634f26c0a7b6c43e24e646230e69e344099e50913236fc7250390fbebe44ab1098fd1de3c5cd3ca78302bdddb3e8fb0f936d43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d4681e8ac73e1707481926a3dbfe1b7
SHA18c664dee21da2a8421f27b804f5ff5b67969fa62
SHA256abf23dea11f0469edf0c2e6fd98ca308b32f59959ef4c061053b31604cc3d53e
SHA5125d487bcdacc663212cbf7617bea1b888c6a2d42cee3c0153adf1507c3e0f20e6a7120df16dec7e2fcb6e7d657a6ddc612ee731d30a80e7b5a968f4d209df2eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd6388cb084b9467298b9e672e7a8952
SHA1e8acc0c09f15fc426fff755e9b44a5e6f22ff253
SHA256781d8489681e36b7d6d0535235fc53c2f13f2e17ff94227f955c8e768cbb7f51
SHA512e176b05d45d743f546f713e8ee6f65442a99c663eaafaf226677b6986c4350b1619c7981b904f47dd5f45bc8633688a72f54057e6bc6e7aa6d3ea0bbe6df87cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501f940b3a4c1a068c1066a3f0988bb34
SHA1b84005c6974797aa9ec40552cf821520486b5b80
SHA256e21d58acb49742fe632bbdb6c13454dc6c602543fe19ea0ab62550785aab547b
SHA51206bf7b91639606106a258becc19757e288d1ca07a234b98da8e7aac45a1e9ecc1299b945bc2aa6d4d6eb96c4a428b55a53158c1b6d0a61e87125b26e9f90b96a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e5eff2c1d6d9756302a9593345919c2
SHA1d906bbd9faa2252e9fc0dfd904e1bce55cdfce51
SHA2563001b3dabd6e227fa421c53ea8d1996ebe48f0dbadafde98721dab22ccc7a13c
SHA512d3f7f69c2b8ae2711fdf3d07655703cdc38b28a9d1bdfd5a6320f5a5c99ed8dfaea8383fc9437bf816b2cf7c4fa47344ee82fe619bd603d717eae6cb2b3cbf86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524112ec412dc5c1d5869d95ac00b9165
SHA1f984a206e6906e5c060461b556362b208ef39628
SHA256627fee126c188f6f4ae7a2dfd8d777e65387a7fafb4fa2b8be0adceb08ea5273
SHA512ef9c2ad9c7f8c624c3f5c0c660a528527d8be93494451afc3d3838869ecd37effa4046a753685d3fc68becca65d9c9e55fbd291e719b02ac79f223cca17bbf7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bffc608eda78dce0d2faaad25d67491
SHA1f0a1a71f3a871032898721c0f72e99d2b20c6507
SHA2567c9967f0decdc191dd09c2e57e40f1d8120304091f8427274e69d81a5350d462
SHA512e472691d60e333c61a4df21a220b7f2d3b343e27e8d1db29375ede27f6cfbda49d50866acb84e35d14a556823acdfe9550113ad99a4882781164e547629e7b2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50961281d324fc7d2982912fbe724ec15
SHA1e1fa48753ea2fc7fecfce48a0a1d493e3e3c766e
SHA256409f99df6c0fb32806cfa5c69d5221b4e01dc867f2fe6aba012054c17a252c02
SHA51260d0a0230e437fb047b00e26f3582743348cbb05b0d0fab09fb1d69a987d8da6b1560a31d13e2a49252010cfe803e40ae8374a6a92a0f2f21dfec68400a8e62b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582cec985621cb25085951d3f074ddcaa
SHA174d5cfdc1096c38e3f93b6bcabca1e604dcf1c4e
SHA256bd8c13811bb27afdf9fce81d3ce16c055099ae3a27f7e5e88fe445c9632cbfb5
SHA512aa987181c2d2ce10d81a5a57a726d2cf10697e9e2a2aa79ba47367d3cce09fba59a13c9ce4ae9a35a3b83ea165e059503290a5c88e88d0a55f73f1f621f18930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f401363be91433283dd6ff43a9229653
SHA14d40bb85f70adfc19d1c0750afa09cd92bc41e7d
SHA256d82edf08b0e28ac03bad3683de268eec8bed1ed8490f18ec332a1e3bbb937625
SHA51206ab42af5f15416fae5465c1bc435b6a9e015311c27e9fa8a9907a2f9698be82e44da213c2a56cab3bd8e1ce6a1201e32fe5473680ef65d8ccb42095ce959c20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545701bef9afc9a560123f91a59709420
SHA111b543c89bab237eff602d2eb1c9896c203d60bd
SHA256562e70d93e63d728d8741d63d143e00bb4f15a8de75f7dbdf248b58dc11283e5
SHA5125875114961120ebf1ce38bf6d5a58ae60f1286c021dff5482f212b75dbd6ff29a90c68c73515c146d2fef3cfc17e998f1733f12c3cf92d5c67238c010bb5f9aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d5bfc677ddac776ede97f252a26d79e
SHA1de6cdbc60ac433940ac40a6cebe386102cca7bd6
SHA2562605dc46fc8440088aec1180892fac1aa2d2e9ede7fbac32d863e0c1fda36452
SHA5127411957ca65e457b6b14401d648b40168d4d95d47c147dde46c1db7b5137a3f6c99c1c8863ff163d1b89a7660da2f4da2f2f1dd161cb61a1e36f549af12a4cea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5312cda0f6529732c7a9be2e893c84810
SHA15f24239b733269c6790bdc2726dd6f197d692ba9
SHA2560c634f4e61493e49b37a98d023ea67d2306c6045c2f49b596750d01628e7fc6d
SHA51227c5b0e398e932339b0ce1684bda5ef03fa167917715def7baf41458bb6e3361059b476f55572e9533acad4c00c91240f91d7dafdc05911002c7c5d518d190fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5178966ba8a113d44bfbfe4b2085e7f89
SHA129fa3afad2327797dec576b8b42c3615afdbde38
SHA2561ee352639057faca76b89d3eff3938a8553f0e85b799a321ad6700579bfa1464
SHA512efeaf46618b487ed8b88d08d08440ab6de1adc1c9104580b23fb459a71ffa2713d70812b028ad414ff91fd4c8e7436b214bf760e45c44e86b29fc131bf747658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e712ebc79faeda6f71c5f9fe1221cfec
SHA12d12ca9d0a70015e83ba41b8d76ada28ef25d39a
SHA2566f9381580f303db524e02080f6568095ac69249a225f874c4a016769ac5b85dd
SHA512e4f8dfd22b3c06f8273c5b3cde6b13ef0ad10ff8b60e372e6367f52343c93fc55c9a7f364669c902eab27d23d406e0f7b5bbf25b1b90c93ea04d4891ecd4fe42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b8eb7a9d482d35cc6c0e7188060c419
SHA19aec3a61926a8632155e73d0413401a31d5d94c9
SHA2562b5bc61c57cedc6356ff0f06e4fd2fe0b83b768294f64e19589712538e97e458
SHA5123b1cc3af0b9b9f7c8b468e4e22cd611290add5f44646ce412a44f20cbe5f1907ce845a52eb4c4c9b892ae120c0b26710ddabed0f6e0da398796d62e7d5100dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a642ce71854316c7649d57f026455a14
SHA19c995a4c9b1503d808aabc2398fe3a3dd4ba08e1
SHA2568ec338a97b4371f30af025ee2d734ac0c60cbdda607856fe0ce87e0ad5476c13
SHA512460cea255c4c4ee85d8304cb92db883e74f4aebc6e70ff465fc888b6e0cda692e96fb08c5494b265d7749c60ff81e18c425ce94ea4d26a7cc2dc080a1b3b34c5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06