Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 16:12
Static task
static1
Behavioral task
behavioral1
Sample
6576ed58cc6dd0ce732ea4e62594f595.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6576ed58cc6dd0ce732ea4e62594f595.html
Resource
win10v2004-20231215-en
General
-
Target
6576ed58cc6dd0ce732ea4e62594f595.html
-
Size
254B
-
MD5
6576ed58cc6dd0ce732ea4e62594f595
-
SHA1
1e9cc67d83c259921ff7c524d73e04be9c6ccf61
-
SHA256
ef76f2cfb6b093537e2d398d54d6b7c156deaff04c22efc1bd5f87882030587a
-
SHA512
0097289afc07b7f2dfacaea960152fa72a30e43f72df3766a1a2b1a5ef14fa3b42fbc4eec085f79eb48b588c564540fa2a46c12bb4b73228c6e3f1e2d4bc86a6
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000865802e5a396306960f64e62f75e14a74500baf312e4a5e1d24c54b164dc4756000000000e80000000020000200000008dee5c0ee0298e59d7828f637cf351bfb6eb1533fc6a8a7387cd58f5a705964620000000c1a340e52d62f05d2fb4397f32ed00c30bb4809b5c6c8464afa61e411d6170fa40000000cea6093bda9879dda6431ea082ee1f4265caaa5d4e897cac1805fa4102a152c6d8ece5278a5141bf9da9d54a08de27149dbbfaef5d218b38eabeb67175ec4b97 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{53006391-B61C-11EE-B5B4-DED0D00124D2} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411756195" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 601f8c27294ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1848 iexplore.exe 1848 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2476 1848 iexplore.exe 28 PID 1848 wrote to memory of 2476 1848 iexplore.exe 28 PID 1848 wrote to memory of 2476 1848 iexplore.exe 28 PID 1848 wrote to memory of 2476 1848 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6576ed58cc6dd0ce732ea4e62594f595.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1848 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a579efc2264258ef216fb168eec2f8a
SHA14fd954f64af566c8fb5064f8959d5e8447c5fb4c
SHA2561f916d69c5e3967ce37067aa0b7786ec17b20a38198ae20071175a34c3ebbe4d
SHA5124b837b667aa54dd05b084c9b7e071a3acf7fdc8e90c617fba19298f1e939e7c19dae31af10815172b9adc7952f828d7b985343129cc738511302ec8e7f3c1ae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a30a4df42faac4617ce3a26b903a37a3
SHA101e248ec9f681eab1a2150a0587a607f873b42f4
SHA256770ee4931e98b2c3aa76d26bb85da883c94b9ad0f16bab0c6d1323d938d3a515
SHA5123cb0ec907168c5a91555a650a602e260cf311e7d6f30a0da9075d62ee0b7fcd6b282390edb8425d48b6c7f23e5128494a52de79b1d0b0f2d998cbf766bff75a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56012a52d3bed65696c6a03b2bd42b549
SHA1c07f92a05ef072940063f87ae4af00d7ef62b480
SHA256300ce009c582ce096030bb07ff3f3da3bee464cd97a6ce753bdf7af122e1b322
SHA51287f269b919e002a4f0c01e0e6627f3111b17d152e344b0fd2e14cc587a65a0402f52fb160c00b1950134cd9b9001093d2cafef86e2c7c7e62d5957c308119d40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf6daf9248fe1eaf5d5fb2b21f58debf
SHA168a1009318e499de86ec28ebf6e4d19903002ace
SHA2564aa7ef21c40230da1fe212cba553f9e17f5cd62092c912c13dae7aefcc5db995
SHA51236f6c4dd1be1271b8c193e26ec8c1a50c7438844a8b4b385e76f4cf17ab969e123b4c524b00c9c7ee7b8717aab1e978f40ec538a5b30ca6b899a04f2f4db9108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eec1b9cd585b1bc279f99a02e1421eb3
SHA1745b97067c606858976573ac2eb4b33f4a303c8c
SHA256454cfad1393c1c24d203ddf11ef05cb0acefa9f111365c6efdcd21b09857fcec
SHA512de818c7e91ff16ba9177a8a8e1230b364f46d22dbc5bc80adf90fe57a19c436f6a2d348bb7ad448d6f86284982d603b3dff7e79542cb760415fb231b560cf606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52430d4626cb2e3bfb5df9b77ad6e9e6f
SHA1e42ddfcafb6c2ab4b570024eaddd8c52a783d039
SHA2566a60843d957fce55427d910addc3d32a11a824f3a0addafca23ee83939f5e362
SHA512ef6b64721ac1a07ceb1c95fc67dfab94e7412604b5d23c7fdac396321cb62b114c128b4b27661d4cd6fc082993b0c799961db86231702626a977d44ad50a9df9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5976552cf421875998eb195dc374fbe0c
SHA13300d41f888df490e039d2be53f1df7a5ae0f05f
SHA256992292b8e1a699cb0c9a2a107e5144c59a9cda928b6d3527de1d0420aeb4b28f
SHA5120247e4f44298af11a4c761a9ce5231960683edc2148ea67f199469b5ba6d75fcac049698a0a106016be8d7af9e3bff46aade0ad4fd789887cf3f73672f509c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5992fed2f758e79fc6095fb39776591ff
SHA1133cdb863b3b5b7b3fdb86aebaa4bab74be75d97
SHA256529c28cbbc12ffb275bd39ad4ec20a2507b6bd07928fc50f5c90772ee9ac47b8
SHA5125c26ee93dce26d9288d8c978eac1f650300e26e487d2a1ca41a7760868cec0c9a8eccf00176b88d8f186828176ec96f14759104610bc2ea814b900a5468081b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580d0dc76a7c313260af5fd72352a1e87
SHA11e99bd24631f09ce9ba7e0a4398bab802409ee91
SHA256f252aa0d7f2779ca33d0ab0462b86e3f7e06a209b587504041bd94584db60cb2
SHA512377f7cf9e823d51dada27b146c6436f5ca1b18c6d778175489550a516ee022aa192c3ea82a5e607e62475542235821ce85897b3ab184e29a124a72b2ea9eb2ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fea0cd1637de630d8f31da2d4f7c064b
SHA1f9045e725bbb5de23e47acdd926060ad8bf09d75
SHA25634a1c324fa6ab5feb6492552b601291a4d47e235987ef6e226839f672bcdb9e1
SHA51226acc4689ca8ed15bffca5138de65b4f71955364006cae07249f34d3ae2d150420ab0d856eb2a1b011f00a9833fff54c653b325763940837012fc8a6928670e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dad258811677f0f83637cc1f73c91058
SHA1ebdf1914a61c059f686e90b848c8c2021b1220e1
SHA256310fd403a4d1c6b9759416b8156faad2c53b589297e81f5d4e25b3f1f25e20ee
SHA5127d8b112a506289f04a8584064f8fd120913ae7f8c785d9c8d0d3a44b2066e3bf6002436c22be39215ab9b6d3ccc6ae6dd1b7eb0e785fda2cf2d7922f16a85904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539f6d065b583967441641909dd5d5ee1
SHA1eb39cb789baa34733bdc3a55302bedab89531ef1
SHA25662a352a082b450c62d537618188c90776f92726ce3ea752f232cd0ce4f68c657
SHA5127b87c27e05fc7379fff77a3b99252286247e5c0961ca748ebf2a430c0123f4ee6c2c57c8deadf73a5074247ff7c31d5bbdcaabc2bb54de320c177b019975d384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552aad3f56e6f246ee6df5841c3123f90
SHA15df5c440e00f85b1648aa9a32b827760650d8e84
SHA256219bf6ac2a6684fc81c5ec6eb41dd5c6508f062605789a8ed173bd3d52d1c45b
SHA5122a8366db389e73b32ffb3995772b9647699e410adc0c2bdec6a3b49c0fdc9622add4e55225ad8a03f5d1205d28236ad22bb1c2153cbb82cafe66ffeca55a925f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590ba0a9139631410b86ff3d005410e90
SHA1b1835b9bcf7ba7a89706377fec0a79a11ad18a18
SHA25674abe0055d0b0d67aa33df0eb568e927bfb2f97e26bda97ce673d0e94c463c8d
SHA512dae13021583c2eec27c0850fdf246a869efa883056d4ccdf33111f94065246b1aa1baaffa1574c268b09903353c8065ddf4c468e7f5b21e4afaafbd7fce53107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd09fe30ad54489a504be0fe297dae9d
SHA15711e93e770e7de56db7f5a31a951fdfbe3afd5e
SHA256d1c827b933d82e986d7650cebd48e498d2fd614d7897b0d5d8ed92c473fb8982
SHA512566a76b8911117a0c107eb6a0b0894e7fe2736d0b0481c9fcfade6ee64eb07787023ed438dcc5ecb52cbf0cc979996974b29af36181b3047724fc816a9c388fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51996f8d7c003e7d45817400cd242ffd5
SHA1add8ebebc02e3934b0f7a02fd7c81ea3cbb3df29
SHA2568eb30e44418d04fe772b37a079d3685ad5203f8317a544e3bada2847b45b4319
SHA512e4798b99f5be8d61de1729d0f5da863c0abb847e308a395645c9e450c25fe187dd070730d526e2bf50de31aad0e6913d990382ecb3476fe1001a41d598ad1e10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d94c5bd287928c401fb8fd80fc6c966e
SHA10802b5de95a62a5a79625125839c8603ba55e078
SHA2560d1bd9bcabef6a1704f258322bfceb40d627c9979a2819fc6511b5ec39e3a1ac
SHA512cfa3542fcdf53094620da575fa644a74607dadcb3c0ec48b873360ccc7aa1ab1c1daed175a6986877542d73fe802d073704207214b698810dd77287e4261fe92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5972dee115b792e863539f3d930b3b9b8
SHA162589079780a099412c580381968c30d5a0f6a77
SHA25603c238c989d25295dabb2ed022cc0b5db436dddb84a693a6a9a3a6315fea5b63
SHA512a053ed8a8453bbba0294b65b6fa1b5e4848daf6cc548706ee4b76cf0c2271e8df1e6daf42eb984dc77ac89b8a460f864b159a074a2114654e81ee1d4710ba848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5ea05743143b8318e1eb1e660695258
SHA1316e9e462f474c063e002e9fbafd14c1b48d5420
SHA256240bb552c9b20d33729fef43f8639dca80b41a8f860212a45abced4aea9326ca
SHA512c8c04ab91e132670e57341972cb21198804dbbde0b279d2ac2b4f82fa1f795162bbcac5bbdb15cd46ce572dbe3321f595a1302fd98bf73291a6c78d9f69b4315
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b7f19f2e9cbcaec188e1009de147b69
SHA12d78e6e6023ba735480e8b7ca6c16fe14d585e2f
SHA2569d0b2912c524ed1b090a05174bc95f2cb5d0a23157ec6a9781677d13b1d711e1
SHA512ef517963cca57bc2eaf2fcc2bc518c1f086755af8fe68b1ab2c82007b0cb008950ba4951eda4d12a840cbc3dd83ccd2b436df59a19661ffc6ab7d5b346b7f025
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06