Analysis
-
max time kernel
117s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-01-2024 15:07
Static task
static1
Behavioral task
behavioral1
Sample
67ed27543ed15c3b8813fbb2cc804c9d.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
67ed27543ed15c3b8813fbb2cc804c9d.html
Resource
win10v2004-20231215-en
General
-
Target
67ed27543ed15c3b8813fbb2cc804c9d.html
-
Size
3KB
-
MD5
67ed27543ed15c3b8813fbb2cc804c9d
-
SHA1
04aeea0c11f4944e23c8f9a1b0610f53873be015
-
SHA256
e648ca3f9bf18a85805d0f877be60ca7aefb1327abfedfffb60979328021699b
-
SHA512
72aad2f2e7f6c3a099f770352a002176f7c62120fd48f9ea880038d314571fa85f35999aaa879f70a348924c86028e90b248bc1255ff576444a21bca5fbe06d8
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411838729" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb80000000002000000000010660000000100002000000004c5cd8a2e959c919a9cd025ccd6657dba977ec44aff02401e8b750aad8f7d86000000000e8000000002000020000000bc901272a3189752859a92b5facd80254d0e8611a6f825a46db5764cb7928806200000006c83ad33426b7c43d80065df9a3e6436c44ab747fb34f81c9339a75dabc74e6140000000de040b9fbe95cc1d63efb18ebb9a924d6de0dd9174f9a92ffc8b86189972c9f3194e671f7d8548bc56f5e953ba294c89ffbfc33af772a1004dd1015ba32122e0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7BE29011-B6DC-11EE-9AF4-C2500A176F17} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 101af250e94ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1340 iexplore.exe 1340 iexplore.exe 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1340 wrote to memory of 2244 1340 iexplore.exe 28 PID 1340 wrote to memory of 2244 1340 iexplore.exe 28 PID 1340 wrote to memory of 2244 1340 iexplore.exe 28 PID 1340 wrote to memory of 2244 1340 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\67ed27543ed15c3b8813fbb2cc804c9d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1340 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5432e0916f49f0b70d9d49f01a761c450
SHA175e2204791b3bfffbb13c2c60a0d1295a882bad0
SHA256cd9630a906d1e6cca44319e3f6a08e6a26172923e94374b17c4f0298f7d77478
SHA512f3126517075757dd07408be6ded9a243f04e0260bcf0354380e5404df19919809eb87387e4645b9ca71ec29749c72d776b73f0bcd5f52d1a9519be9adccd2c83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbacf939d87d18617a0eae636670cba7
SHA1c759fff73e6752777c8257e35a375429e571011b
SHA256845fe4e315b9ad1315bf4d3260c9bfd3fbce0fe6cf38c2e36e5501c2f9d25624
SHA512155f2741c8bda814d196f5f877a42f58aa39a8c1c0c6ffd29302f73fbf524f28f104d04c5846182c8d4182670f9b1fd00e030ad9d0d5c3be24f06ae1375b8e40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3c2c51ca6fe7e8d4a08070b2cca175e
SHA1c782612e92a90b7f461707c217bde27250ba6ab8
SHA256cb6df021f6a6397ff6b0b3505c543b324349ff883c84294dabd2f48c0c136354
SHA512359f001637769e4a94a9da00f8c00904e7fb2fbedeaaa813c17f860bc9631f0fac01fa141c303c2e9f727253289cc13c66d019b488215fdd2c34aa36c913b1dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535280a56e0c85f63472f9a751136bccb
SHA181207a72205691b5e2a52269f020044adcf630c3
SHA256331736497f3664c698703e65891158546c2104f9c7d5e50fc65e569fd5d83c1e
SHA5127bc2a160f69792ae38261a78363ba4b00cb498990b5e071cbd95c563d6a6600729cea2280e18f205a06f0db33d0695d59deef4c731cca6f3f2295d3453ca98ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0e25c6aeaa97825ae105c5c0aea362b
SHA1f220e1d03ca0c5afc8014151b01b41116b5ed066
SHA2566c22f6b670b84844326e22cd13e2f7ac9db3f0f1c297c9243ef07439791761df
SHA5122bd52e883b9b1f6525bc0934009637634d4755fd42a978a41bcc587cdaf98a2fdaf873927aea7bbabbbafc9a871b7f14fbb83c3c7c6cc4978339bd28b064bd9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec9ab82046e099a9292753036578b760
SHA1e28ee7962b8ecff5ab9db0b3a8558c150c693870
SHA2569c3e6100cbe9849cb622c528f120f2d5c728123c53d60c81efc1eb370c48490d
SHA512cfd3822b6ff372d8146e08202209e60b21c3ff91c9fb946f00d6a69367c8a092d5efbc8e4d9be2e0aba120a4beca838e971e7ff677363d2004f43d31c3b1d00d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561206fe0934f2df128b10f58eba454dd
SHA1bffb1fec71cc10e0f11aa50d14d2cca3003631c7
SHA25663ca029d023ac78055c1b292649ba43a9fda0120d59ca16e93cf388dc7a71854
SHA512a6301a64efa8bb253de4666ae8755dfc97dc298036ea58abf513c27a7133d75b95b3a67dd9740f50d20e8bc94514855cc357dbbdee2427566b1a848a86760ef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5723552e77123eb577cef0e551b09a63a
SHA1adec8f173a7846991ff3abd6ed0a2aa08ab290b6
SHA25611de8b9656ba6ca4e046b269879fdb1a7adba1d07b170a668b742197112dcb2e
SHA51283f5dfa656b46b816caab948fcb4c5fd3b340e9190df60efeb195244df11af02b00384e1b1f9c08daa6c1223b29de7dbc79b108d69fba00641a739c0438b5a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4d07b325906ddc6fdcc5cdf23a59e9c
SHA124029639624632c0948cb04abd007c2209614422
SHA256a1b70932e4bc4c211af9106959fce2278d568ad933b760953f2853d6fff0b441
SHA5128f5cadad20b075d42118914e3aba3bc92bfe99daf0d9f3bc36f990462a0155973fed15a467ea699f7545699e962e28fdf21458af8e98109fd2e9dc6c1cd62dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d23b76e71279845e04a38fa52a884195
SHA14ca8d79e0bd5dd67d2e6034a66ed6d3962a2a7fa
SHA256e6d2134c41efdca035d996dbd2f6cb86a475b66f6fa9f71fcee5e77c66199e8d
SHA51283648708a78a93eb91a787cf1febbaaa4abdf41140eced91b011379489cc523652ef90ce4e443175950ed6175432c56f66c46d04bde32094ad862092602f8772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bdc8ae25e818b5eb555aff540130350
SHA1fe6be6cf1921ddd56a7be4d56a90b1148ac24488
SHA256985ff2c5c13ea3c23cfb67881bc23928fbb69541337f35fc0b61093cc64561c7
SHA512a729effaa13b440cff6a2a3f4f09f57b0e2b54509d136eca33cbca12183b9272407c2db0997a367739d959f1980e5011fe1cae8fb6925173d8c648d7983ea782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ded597090e31dd23dd310282c11f8267
SHA19f7b95fe66fb74366d1b19db66f0fc10190f0a99
SHA256055acca6af462459ea5ca23bd144b1e58ce6113d3c8cf4e9c40f0628685f094c
SHA512085be8528abb2c5cd5e79bfbad4d0c4674a25917cafb87269c42b9be04c5c2ee892f5db0cd0c1e7ee5a6a3eb86b6eb9795840b7684ffe62509ac56f66e35c419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f45f063067d82409f4e0b0a35ca63901
SHA1e438ebec2fbb44f4d43c1a360873a7af77c96725
SHA256d120251674196ad30ad7919ffc890986bb4b2733f8ec134bed0a23f65f2108a7
SHA51228230d0f8c68df46a8ff64fcdf78966b8e2466af415891972b3396a383f5a7046caaf4d621a230d8563361c43f98f0cb0f712bccc52255edeb67b3c0a8dcdc00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5603ca6bb5fd96392f50ee89d17b5c868
SHA13ce150e6cef4d2b80ff0087283a940e5e1cdc56a
SHA2566c44c9e0f8a28af9c5fc4a7cd3fe73050d1dcd6545e8c3868963c066754b09c4
SHA512ad477ec9ac3fbefb2695027f822fbb31283b90d3abccb1d5a6f62ec9a42ace2d5244edd29e471d1b4b61fdabea9eaf551d876c76a0d2a44482acb0e2e98d2748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9522a52b42719f327806957f2574dff
SHA18956b8c7c7e7aae279209b2b27c8c4b93d49544f
SHA2568e3d0917af077067cdac1019a5de8e8a5d71024b45629620494dc4fa01fb6714
SHA512a4a9a29f1b7789fa7233dc4b9b69834c5764937180271b53c4ab078289ca755dc55b20cde573444b6285c7bca02716d250cbb5c8fe615230fccc9bbc4226a845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516bb66c5f5d6c27439b2a01d36722cf0
SHA187d66949d34243b5f3e63df58d75c94a10e211e5
SHA2561ebd7482028b8aa22217315cfc9a5bd166d1b5ba65cb8001b69297f12b3fb6bf
SHA51296b2241a0b83d2ca387bdd6dc15aca624d587ff65449dbf8d38d26c6d30febf8c76e9c72951010b100bdcd190acd025e313c27d4a9b8d6a07df8221e916b4150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac2ba81cb244d2b7fe1f7e3007ae3ee1
SHA1a553cd7778c153a779f13ae60d00ccef66897e0d
SHA256c07c2b5acc0cb9b0fc6e70329f18a9056759cb20ef7d320f16e6693fcde6f2b4
SHA5123226ba9204e4bdb51ead050fca9afdd44f61038308b29d48cf1f00d56ff9d3fde027f994bac9db7c78daf6a526a46b55fa2e913bd98359f2ceef69278b412384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5041d2db5a4ff84673a1cfda3b65980cc
SHA1506015d182d29be03d7962034385ada7284872c4
SHA256b228c1bae37b654f597eb67f56329ee559ac0f5cb2814d305e11e2fbafd8b164
SHA5125837892a4a81f71fc24703b1215581684374393e11e32e5e2c6055bf90556f261db4b45679b3ae16a65a4fb0173df370ad31958a3fc6cf6cb5dfef5c80b140c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516758c10684f30983be59ae14aa60084
SHA18309e28629985353ad0ab5f9dfc28b7bf6224458
SHA25673430a3ee5c8f7800a1b77ce2ed59e4bcf43b24e12e1b7079a1fe0338e2a6ee7
SHA512cd6efdfee4abeedc45ed929bf45a631a342462b313d5035f448d419f33dcf7fc6a12c90683fe0f3029d3b8ebd21310ceae7de8ba67b95863d09c7632384c59e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bc8daa20ae47b01f6291f0651e0c96d
SHA1bb9ea86b8b944ea679d20a7755fdf26965d51a18
SHA256341b325eb7b88150bcbda4ce722b4c47cddff473953ef7b45ab7fe8b27b95892
SHA512eb61650b55ba598bf01fdfeac7f6460cfe30da5abbfd49ea5309fc1a5e80516258f16b050fbefbc100a1b7e4a3e0dcfe42a516a043a07b4b974036d9987f8367
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06