Analysis
-
max time kernel
134s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 01:59
Static task
static1
Behavioral task
behavioral1
Sample
66996f59b89969dd7c30998c90451eac.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
66996f59b89969dd7c30998c90451eac.html
Resource
win10v2004-20231222-en
General
-
Target
66996f59b89969dd7c30998c90451eac.html
-
Size
2KB
-
MD5
66996f59b89969dd7c30998c90451eac
-
SHA1
f7a13ce8f74247d2c91dc0e1f25c43854e8696da
-
SHA256
714dcbc60d2b5c3ded4a7dc7872981e79b00cb82d614596153945b973614a2ed
-
SHA512
bc4beeb507e7f25b342287adec5b18fe76820f0870a8db4732f07756e8e9b86c18a87ca16f2a19e31eb0a0c4c404c6fad5a852d530c6a1073301e5e447a5a33f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{458832B1-B676-11EE-B187-EE9A2FAC8CC3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e9178664000000000200000000001066000000010000200000005b0f83ae46d09133470446d68b089fc7f1a2defcef7f9ab82bddbd3a182da0dd000000000e8000000002000020000000fc446ff5f01bf882874deba46344cd79155f555326c115acccff150066fee27b2000000067480afb14025de1683bc0498ce3168962b45cc7da81257d5d6089bbbabf2032400000007789b5b9fa99a8d5e92a0d3e8962e71cc94359a338c9c37e79dc75cfa96ba5964be6edfdd8ab418de255ea3ce81c84258b50e3db7d6243f8a1ccd23bcf40bf89 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411794826" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80265e1a834ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1936 iexplore.exe 1936 iexplore.exe 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2016 1936 iexplore.exe 28 PID 1936 wrote to memory of 2016 1936 iexplore.exe 28 PID 1936 wrote to memory of 2016 1936 iexplore.exe 28 PID 1936 wrote to memory of 2016 1936 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\66996f59b89969dd7c30998c90451eac.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552589097d24783b5e49a20265d9910ba
SHA188310deaca78408ed974f735586ee09b232f521e
SHA25621cc4bf962c7157a334b4927a85034ba0a7ade3ee3721a98715f12c8ebc1d9b3
SHA5126e79131eee205a77f967678250c62f08de068b724741aa6abb6c0cd3382c7d1b2da3f6db228446141a2a4b88f6c83dc390eca560a2e6ac9048843e3aec0c2f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df26f53ba689dd9c021f7da89f1b8d57
SHA19914fd6e2cf142537594dbce86675bfe4de0d9af
SHA2563388aed20ac91c7ef676f3492bb0293fc4312fcad2fc5c7058cd0b9385dfee81
SHA512352de16d70b46e1be0546ea9d06769ca06ad8ae88b5a92d561143a028a9f0e9fc5adf354e3d79f7dd91e4125a451ea4d3266c2fdaf8bb03855b605f97fce8ffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d2e5fa13d3fcc65850c6966a25a4dd1
SHA1d79f641f8cc28340823b231faba8159c77694b24
SHA256de3ccde38ca8d8b8554306047f97d8a6d03398780be2f6d076ff680c07603171
SHA5122cfad99cd8df550c5c8b7e7e2033f50783d7dd38210f469cb3dd1f0021b57dd172c0eac5d686b0190824735d2224fc16d9c984fdfb4ac956d436285df2ed0e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3b9bd04bfe1d8be4282500035c1e0cd
SHA193f260220872294115ff84d1e1883a79c39f0cfb
SHA25600e011fd544bde6b3db7dca2e0f9777328f960a20430a641571d8863227af00e
SHA51248f615cd9b5af928ac9fd9f5ed92a020b25db3c83269fa60dfcc5d90616b9a1bec80936ffb19f1dd0d4af47c667968cf1b062ad224f99dcf1d4c90eb419ef00c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2834bf021b31fb92badca9bd19c3a74
SHA1d049ba91b448ac2407c6fe6be90b2cd4b4025e50
SHA256b635a336980cfce747a9b11179d1c23f438cb33fc15b4b3470867af2dbff7bd5
SHA512c9e6d60914a3e045420e1a06fe3006dbaefb34d3adfea442e686afc6e98e56f6768b6d1b00e64dd757fee49544e90fb9f65a974b6e5f41a60809c9602295eae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc7c91226b1e980c5ebd0dfe12eade44
SHA1e331b390b2e857d1b44b98d25d83a952c7ffb070
SHA2560cf67a09a70200519f716c70ac7514d25b2bffae5b83fbac52f045a9f32a9108
SHA51232e15fe8ee2092fc887c279d705e83eb150b06bb0dcf0d6a7a08a0c5b4fa7b4c0a94d59f8d5c60a359b7617e63a5ae4ae84bf410b9f37e1d5ce79d2c8aa8f54d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58229cd410077ccf9ff5edfa7253e9f30
SHA144475afb67ca00b51b37aeedd576eb9fc5026a5a
SHA25643432d344d1355a932af234de4587449ae8945734c90de1b3b84232d54bcc3be
SHA51289598a50c591c2518aef2963fc8e2d204ef9bd25596a58aa9f32e496b1014b06a12366a42bf70c3a28099fef282ee52d3fa9f02ac6dbfa7d6e887ea2862ff44f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538645d9281c807be41c923d27904bbb5
SHA1a19d092b4128e13357285376ad8d828854811d5d
SHA256003f899926cb686de57d5ad2d0c32c1a80f63dfe598b1a19d4727077b8fcdf58
SHA512271a3f00cff9b5e531477f0a74d9e2a7bdb7166b296a6b7b735b7a691805306334e1a75ce26c04ed72da4388ec3c6ce7ec6726865c32e44414a0cfad242393ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1545071deb87d276c557f2938e96608
SHA12e7c3b6d39584ff97e718f223b42bf38e97f31c0
SHA25635742afd433de0cf9102e7360348c66225cf115291ee57cfd9ee78cc2b47cd06
SHA51251be07c3fe3ceea13a55700d2a6ea58dcbd7db2b99ad5792ef0e896ca3caaa5e818d91cf992002ae596d603d0e59a2691995e482b320de1aa2762c327aa53366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5150a67aa759504b619915e593d808860
SHA1b1a317b7c140ddcebebd614e0a117fba225090d8
SHA256d9d39cec805156ee23468525d4aa9afb196caf6b2ac8befe0f1bc0b38d0649bb
SHA512b7fc3dced2a621e71138749b4173f6589e280432cc9ce4b8d38d62b38d588cd2b23f3ac2ef105c08f823e60f58398ef153bd1f122f64fe8b8c14d193b50ae358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565e9955bf97c71422571c12a3acfe3f3
SHA1e40ed94338b31927f51036ce207938fdc1758ac1
SHA256d1e0a82f182e9145a436976c1a162802500705a744b240fc151ed1608b4486f5
SHA512690eed03ec388279ea251e71c0f0723ee12377477aca47aec2b384ec845182cc04a155930ad5746cc2d418d1aeee9f3840a893278b2c099d3d294384ba6a8423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580c9d212d48c39a7b417e44d8039689d
SHA10bd6f4cbbf782d3acae90d79ab2d80895bca19a0
SHA256ed797424f2d1066d49cd53acc862446392569fc393a1e72879592568360872c8
SHA5128c063c3f11b5c0377aa0ef574aa949e5133bd6e1f0f6f7aa70512384b258d069c0f5454b543133d1cb805a472aa6421475a6c9a1ca30f7afdf69cc93c5c3f253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552bf831faf40656bcc0862bcd43a8461
SHA1776af1a67d3a468f920de2773a9a9d16f64b740e
SHA25606e82f1edf3cd6afa90a0c79a904192a6b716449cf027ed60e3d1143e320ccdc
SHA51231c4a532583f70b25979f9b593f50187c67d9aa4e72276fb15e755e2919d1964b0fdc8adf116598c7a38188cfe625f0285338d5e9ce9414adba020b7f1ecce11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5483a70242bd9994402064ae68eb6f741
SHA195f789fa3dade9bbb955effb7cb9b5f4307f063d
SHA25644c34ca7ca3ee81c94abce8844cee065da1df707da6a1f5320d3a7e2fd8d0bfc
SHA512911e9f1949fdcacc34e97b0ca0eff3a3d177ecb95e260330b9fe7171c95c7624262024314b595dfcba7993742491787a2c5d7c9da0a3b27525c46cd0a0fca174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1a16ac9257d5db274286d84bfc61547
SHA14e4daa43c75ef87553262b1de36a0c2ed3ddc9a2
SHA256eaf62e778b52606f22e59eefb011b4a33d18e04cd15bba18b42ae5001eb6cdb0
SHA5122543a2c48150c973112d6e723dcee3bf5c6e3dd7d997d42d0191ecb1df61aa1b64344ca737baab8354fe0603e9a1675c1e9834eecbd282168ccd674fd9123bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57220b4e126afddf579af6e4e3d5d12e4
SHA10ac2b8b70b9716297ba6808dc3a7752958b8372e
SHA2561a0f13850a24c45f5d93f8e6aa96af8cf0785259aca0fdf31911e7a6bbbb5254
SHA512d925c6507ec5b4edcc90eec2cb79a206605e84ce9f0fc9f8daa16b61fcf0b2442dfc690c2b238c6f20830d30f1a025d679257376496e51fa8406c8fb0f2e0eb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50564065c21e8feb06a2026a475556377
SHA1be891a2b88e0fb0cf98dc03e8a8a8c5c708763df
SHA256fbd638e92722cd7a8e071de6912c59e7106a4ebc9e85ff2e04f3314cc4a827f8
SHA512a282b2bb95a700a36facde4a799c402c137dd9b0bff3dc811380c7233326bee0e1998a87b6fd374fc95d36fcaef3adf7c1ccec8e3ac89b19b9b5de06c7e8793d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efe15e7e9d65a962025973c0bcdf94eb
SHA102f42e141d4f9308860d7ee930d7f153ec027278
SHA2564db9da6086d0f77851c48f52ff2b1e590386c6edeb70a528fd01ce2ce3583072
SHA512f6d5132b511002500b41b69dfbb4840636605a776b01163c085d7e449f7f46c2a83d668e9d79fd20a5327dd7e6c0f56f6848ae80dc0e6806d38f00f1bddf9123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d544f70aded7bbe3de57e8db6e7959f7
SHA1be5f69ac359464aabcf631c894f1be2722e41792
SHA25631842495ef26e4f660e4998441b03681822350e8456a22db4320e96e56649890
SHA512832adb525ee501c6f643c5be83f588396135abdb75e107b274f3200ef587991be2691bec6f06a364d3794392b981bde42cbf228d814268b80fff96f127e93b90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b466a14e3acab8a91d9c679b63d9d0e0
SHA1984514d3ad00510713ee8470b4eb8f7ffad76ab3
SHA25641dccbf8e43f3d119c7c255eff947f3c25fdea802b42043feec410563a6b4739
SHA512308c241c84d28c2cbab2a197413848e26d5348b057210f80f5fba19611d81a7473c48d6f9cd2790e2a26e3363b387c857c7cb5243a77644a66e50924916f3a3b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06