Analysis
-
max time kernel
119s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 09:46
Static task
static1
Behavioral task
behavioral1
Sample
674e7e036af366ca7d6c1fd95d3c1ea9.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
674e7e036af366ca7d6c1fd95d3c1ea9.html
Resource
win10v2004-20231215-en
General
-
Target
674e7e036af366ca7d6c1fd95d3c1ea9.html
-
Size
286B
-
MD5
674e7e036af366ca7d6c1fd95d3c1ea9
-
SHA1
355a548aa8001e33c75866520d14e665d80cda04
-
SHA256
441edcce0850ad32f6412853a8a6989c657382a96ea2376496bf26f5c655c41c
-
SHA512
4551dc295cf23c02cb0be63b589d8fc0589e8f4a858d6133769e8d4f42653504f0d86637f656301d60a3ee5af6f8bc7005e477bd20432378b81e4c08ef6ebcd3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1015c668bc4ada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411819434" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{919047E1-B6AF-11EE-8456-F62A48C4CCA6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d780000000002000000000010660000000100002000000022752e62a3314b1c2c6bf29815b79e6980aab66d8ba24bcb44efd85d0e48d8df000000000e8000000002000020000000d5c3a1800ae5276a2711010ad17902dab1ade6037aa97b5829599740f10320aa9000000063bbb94d15331a230d0f31e3a2fd941eba2a66ab8e513768fdf866035395eb619685e5a1850d17dc7dd70bc85d7a8a78d480f284407e77b031b0d7aae2b80a539c922541cf38dfb07d8543bf83ca819ee83fe47479a7c8634142a78b628872a4369c12a49f6178682699ccea73bfa2475f159820ec2a4f4f592cb6b8c87aeaaff929fbc99c26d936a489fec1eb5ba18d40000000a24518431a2991663bdc393c82cf9949e558b04b8166af0fbde88f3e7c7eeb15cb6ba0caa77afc0240cadf8760788dac2be753f5d0da9507e4ac4b927054ed12 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033b2baa7c38bc34eb000abaaaac06d7800000000020000000000106600000001000020000000b3cac037b049a1038e27f9dd6dcd271bd6c258511141343d89e1762806af42fa000000000e8000000002000020000000bc183c552b3ce821528ff27ab197ed1fd2295036803b38a7e7978dca37cb49672000000094fd3e7f350442c0000ec1c270b1c4739e42a7184c2d7c8e4c7b2fa53a62b98440000000068913a04dce2183237d54e9f1d39897680b7ce2f7c7a8ec2c0f7be3f6b8e4b9c45d8f79fc5e6a129ad962a69bfc4232f6cf275a92be32b50a2eb2cd2ca1e501 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 836 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 836 iexplore.exe 836 iexplore.exe 2044 IEXPLORE.EXE 2044 IEXPLORE.EXE 2044 IEXPLORE.EXE 2044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 836 wrote to memory of 2044 836 iexplore.exe 28 PID 836 wrote to memory of 2044 836 iexplore.exe 28 PID 836 wrote to memory of 2044 836 iexplore.exe 28 PID 836 wrote to memory of 2044 836 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\674e7e036af366ca7d6c1fd95d3c1ea9.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:836 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5d409279d025a298a2d408cdd0c47c2b5
SHA1a6675e8e5a67b21396cb66de5612c947eb65ea6d
SHA256db08fa318c78dd6beab537dfaefd85c339145bc9ca878d702a3b6a197e89fa3d
SHA512585820e4ea8d9891b57989bcae434e8f70ee25fc3ae7e7165f6d0c0ed5b60ee2809a4de1c98fab0b78c6d29aadab4715d9ff20b22e1f2592c07bc14b8f490d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e9d99df77ae60432845fe8d5cc5e75d
SHA12aafcf11c752d72191dd95c0827a035e0f9d101a
SHA256d32d88254e212bbbbd437dbb229ccc82a5c2d44caea26335fdf07dd7da310625
SHA512e3a1d25aa2f46ce4bc53bf6bbe4e5504c080282c8c3bcc2795d18e4cd8ded9d0a90c5de55acfab5ca5e263ae6bbee9d79d9fb377a7a785f800c7ca6113c06c4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebe6c28ffbc3841d94f7e269d175fa5f
SHA1036c09d2f2058c1af37467ecb42bfbf72dfed093
SHA2568de504ad270479a44f84c71979253446fc225634fc62cb3ae6b263696d9a42a5
SHA512d2d3801ddfdf4add4c06040171fb1d5b7710ba0dc87c23a5961e7d5e9349a7f252e819a6040887e7ed64cc94deea3a77fb05e2f253478d7fd57ba5056ee86938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559b8b70943a20aa0a3b10966d069042b
SHA1ce01880ae3f260ed98679cda276f221a75b8c034
SHA256cd7b85a59267d4fa68274e4162ff54b74515b8753107e3e8cda08952cf994e05
SHA5127e9981760d76cf3fd09fa217ab497431324d65858254a19dcdaa297f81287846e1ca986e7f8149efd6d5d0150edc7834a67516d3d6dd1f73a87e78efabaf6d4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b73f8ac6bdd080cb0390b7a82f368e54
SHA11735777d97491ea10c9f190c7d4e5b10a15572cb
SHA2565948c89a03c190a50cf3e34567a4ddbc5cdd551d8b538f884fd44a034170221f
SHA512a4485b569240a4259b917a93babad668afc41ead2c175b79c6f5181a50a985859a23435170372a91a05b59b988f4c35a8c67acda2ff2225bdddd4ae74428502d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a0df70903029f0e6faa2648d304cebc
SHA1189aece738c3e3613048a8b2089cd92428bf43c2
SHA25660e61325adb91a6c327a25a913ecde8e33bb47ddf2bc16f5158113b17fd79934
SHA5127b49dd29334e86d6dde3e7ea61f4631c134e0440e99279a3b3537cc19d554f714415d7e0de27524b7cb1e405b374a792b75ef04d4e3c6be3d8ef2693243baef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9218d719fcdda06cec6be3cb08e777c
SHA14b115d21b769b3f8d461ad0997b4b19dd400aefc
SHA2568f65c53dff9a7953412c75e0084d7db823b6e1794ba606eabd67cf607c4ba474
SHA512546ad3d9f29d75a58566713d3d08a79ed7657108b53787600ec069e05811f59ac465d82debfd3f08d3ba27a3dbe24e1d273c19a85de9cf5c937024bb2451c2e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5582ada61247e255ce6f05504ce4c00d6
SHA15fec4702907776bcc7bd57fdd164a17346725a6a
SHA256b43852de1bfa0a1acea6da00ece8e3a3727b57a2d416c75b2000b2b06b058f43
SHA512f5cd8ed865443f3396d0b9ef34dcc460c19af434870b85abf99eca785c44d20c9b79d318474fc91209e9a44e2e495df98f86e4b0a58e5dc1585866a1bcbbeabb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534b8c93b0a790a77136d9bf9b2a123da
SHA158dbfd9b24738a0aa17ba0e0a932165e49dc3109
SHA2560390a64aca90d6a05de00709687e0003ed69cccd8e08ce38f3d6c64ab7612c5c
SHA512d43430baa04688c9cdfd56c331b4c56a47fc8c835fd8f5036d44f4389fc70777f88ec5f7b7211477b29b661b9cd7cbab324472ce29dce01e648b9351bdb69dc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514f1c119ecd7cea9d72692f1ad8d09f8
SHA13062312d03ff4b87d4d49901109aaeeda64abf8d
SHA256fd136a586d73b38bbd1205403cc7ec215ea2eba13cb7c4856b4706aacab1cdef
SHA5124a1ebe4094b5bc4b99b99956cbbe51f77319f6465678733cc65ec7cb238014be52199ed5d404b3e92c74485c610e2816be8eb24b47ec6da9cca837c5e78a4cb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522986ca274b9d93e9a20b68a2fc60c37
SHA176a55c460fbaf74a93f0042e51d9254cd00620c5
SHA256fc3d40fc7887118032b46704f6231d624f621ed9680bd139ae54ece770947ff8
SHA512c8ad4cd2e0365084eba40f0ca27b556e2b226fc5c0df9f754794492dfd2cc5c4e24db9611b6141d5cc3526c82f79735a4b73072817611333f168a56b636a4876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5851804949f702e47bf6e1d37d64ab469
SHA1f6afc5d2197bbadb2274351fdb737a097cf89c47
SHA256e4a563724ec18e6159c0b2add1754138bb9e3080a789b0e11e1842483648534d
SHA51267ecbf1f7a8cf33f132d8402bf324fda07b3de50c1b8eabc00c58fda40c01446cfd0668a48368b55344b494befece440e005807085a5a6862789896093e895ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06