Analysis
-
max time kernel
136s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-01-2024 18:40
Static task
static1
Behavioral task
behavioral1
Sample
685ade9b4d65407a1652015b52e6d0bc.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
685ade9b4d65407a1652015b52e6d0bc.html
Resource
win10v2004-20231222-en
General
-
Target
685ade9b4d65407a1652015b52e6d0bc.html
-
Size
446B
-
MD5
685ade9b4d65407a1652015b52e6d0bc
-
SHA1
97bc048b0012d96c054c46ea85f150f91b8a4592
-
SHA256
88de14a836aa767ef7ebc539816aaf668c35aeb45e49530d1b5c2384288a8282
-
SHA512
22600f9f9fe723c75e9715acd259d470379b618a7cceb6e987d58cd08e6e781c613b1a32fd834fe40c31c880fd554f44fc9112f7fd2085a67f8ed2b603da5dc3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd76917334189000000000200000000001066000000010000200000001d58895959dc5cff945a9df32584da1e984c4b8ec2fe77facc7785fe5e7e5e6a000000000e8000000002000020000000bf2876c2882cc3899c1b723ece8c762a0b7ad9fb0d80690e1638304fa69ecb1520000000a7c390c49283ce8a77c429f6531ff0930c702a66bccd4597c729b175e09ffcec40000000058980cb384a58181b0a8586dfe2a4846d8e75f7f434d53617182d62042843da81d0e4440634364f194b8399a7414a4f17941fbdf17f449e9978a705d9bbde02 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{42181DA1-B6FA-11EE-975F-42DF7B237CB2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 601b4e17074bda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411851516" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2388 iexplore.exe 2388 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2660 2388 iexplore.exe 28 PID 2388 wrote to memory of 2660 2388 iexplore.exe 28 PID 2388 wrote to memory of 2660 2388 iexplore.exe 28 PID 2388 wrote to memory of 2660 2388 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\685ade9b4d65407a1652015b52e6d0bc.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d72a35cd977a61eb5a7cf404ebd6caf
SHA162674c024ba8dcdffa009d4a0f5542456bfee5ce
SHA256862a5f8cc5217cf7f7542cc36c5babc34e3ed87cdf1936ee1f4e1c27e7cef093
SHA512691d95f97685b649efb6d4cacd48640d860311b3effb7e804e23564a933b5331b563038772c87f0e19ceb9a488bd2df66ba66cc3fdded3f825855898922d3656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e78654aa0fbb9d353765589b48c3d7e4
SHA1ecc7234e02d6a0567fc1db3cf2ee46b24046a15d
SHA2564e636ff6cbeb0a16c01c60516c60d069bdfb181b743683f8f07a01346badd34c
SHA512622dd9a674586d552b86fba7b247f6631a1d5e2995f5b1684ed8a42d276ecfa85c66575c5757f54b61ee3cb440524932287c5bb7dd54d327b2e773098db5c21d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e371d173b80a9e8dfe5a82ce22957426
SHA192782cc69e3ba3f85c86bae0261f1316c0e57212
SHA25676e04927341d862cfdef59a3ce1ac02013c9480a2ef0c3234b47195bd9a85302
SHA51294747c057b10944b32c7ebb2ab9c3a732581861c0fb438502bc22922e74f3b30ebfc273733f6c1d00aaf2f477492ce5fc3bb4270f0a452e59dc35c258129e41a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587b782f4aac9ff80876f50edb69fb9c0
SHA1ecdf8509b3fe0db85caf1093a740a3cf0d985ef8
SHA25660d71ff0403873efa33aa8a92aaf84a5965f0ab7e7d99e325681214cf836ccec
SHA5128df9ef25884a7970fa616e8c1b44d426ee832c04ce0e0eee939e5b272bc3e394efc5ac7f3af8bb1d2e4a8af534721d1a2d756635dff69e1ddae65504578cd953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5064ce1f738a34ca76b92434200f202cf
SHA116d5e306a25459c9bc3c34e3bb3b7c4589b4b1c1
SHA256a508b536f96e84d298c3192bdc048288354dba5bdac9381edc2fcd46b3438dd7
SHA5128a6455a584436ea8597a21db08f167fc7abe8d6109f96802c5d32239b805d584bb37eb5b636c6303cda60f0ecae88245dded20794f1e96164a34ff4bab95d59d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54abedfbbbb6b2026cf2804ef863c7629
SHA11ee30d631babbd19472bde5f75118af1daf9a8eb
SHA2564838d2319cc1f261c193b4fbaeaacd2c4574742e1b30adaf99ff74f9ca6ae42e
SHA512ea3433a84fa5918d93e5364011ed3bd82ab66a3098e1072aa913b88b4e42df222e7414d58dfec7f2f8fa2778774a5b1636ed1493f75835c96cd892163461611d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d5fdbf86ab258336160bf4f908efa36
SHA1c98b4aa516dbc7908f9f39e320a12a2010d5a8e3
SHA2569a3b579ca69cb61bfd589008c0e9935c4468727b889b2968a42403f3259a452a
SHA512961102f4fe9e45bcfb245adc8fe4130f5d7d0ae8711c4257bd5ba63f8349e76fd2c50203ee467c234fe70d57f62009605af706d3934ed020cc408ed78f812404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534bd48b1d8578f8c0edf1f0391d67733
SHA13c8952b1aa80be8021d064c558cd164efda7f5d0
SHA2567c7f89fce76140e65730f357e2f109da208661d742f9a1e8f3761acad1a7440b
SHA51218cac1f4ff94a82f58114d3a408d582edf78e28e7630de2a69160a223cc76c554cdaa6e11225620b1541e0e5ed0989313b4d89396a4ca935fa964db803d95f8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5728151f627e7dd1388ced4c1ab22f196
SHA10f945b8818c8e3f3158d77bb878d2ae263355f98
SHA25680a87b578024552ac1dde12bd5e1d9317b34f7307c39a25ecfb3f962c085c306
SHA512500f423a621d6d812463bf8f832feb87be847ca64c914dfa0147cd36e57feef4763afe0fcc4df9dec19fdffa08a959f75f03ba10f3fd856361a08e4fe2a2ca95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59917cc8c39e7ed991672845380e8de38
SHA1b1624fc35241b9ff67bbac8631f1bffc2b75a027
SHA2564cabf555ba54e48374a20e0d5b2772bd0b89f273ec85be09e0b34c1c2419c53d
SHA512a1927e18833f4ca4a8546e77a544206a93aaccf8e84934f510486aac84061900eb0b8cbe5a6b0fc405b225ae8c5bdf170832826e4c14428f08938942e53cc2cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5537577fd348d7c2c17d6c3f12c1cf09f
SHA1d43ce445d97e946fd9517c1fece5e0c24edb50ca
SHA256fb9b1f8467a62170be8fa2da6974fc89daff9b33ae434584b99e57a94cb9185b
SHA5125d8e8a01b22278bada50f5d077c3a4a1d98fec729722cb6bc1ed6262bef965cd35e8ee633ef1d28d37b64425b731908288bbcb584505a5915c388d480cda2c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535032200183aec671d954794783b5fa1
SHA1223a2bf5200fc24e8718b395290ff54133f0c2a3
SHA256dffaf838c6af11b2dfec5476eb2390682c756d7b6a06f38118fd026ce73e3298
SHA512cb32bd30301b0d11c1852aead79bb2351e9c9725529fa6fbea2ecb8651a1c49e5caba4d921d28ff4349bf2eb8f145321a5a6d3bc6b70211d32e45df231e140af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50871c2c17520821ed2be069f13f7b677
SHA1b12bd2204edd9d0c8e5cb27041bac738504aa88f
SHA256f14c3bde9ffab2976bb7d50db66849e613e093f6061e216ac949ad157c4a7d37
SHA512bdf970a9679645f01c78237f17e6200ce47123052d21987cd76e69bea9ea74c78429f2bbeb4c92a116250f834a4cb979b47eaea254fc2d9ae96e702dba6f86ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abd4922f61b2ca82141f876938c7a018
SHA19730b26474b19eaba1a993d8ae1e707a77e329c4
SHA256b5587239185049137be5f91c268db7c300676ac893a23e86e015f1672f8ffacb
SHA5129b5a9a3f5a2b4c0792e1ee7fa1669bbf56773a2df909702db3c54fae914bad7b5dcf439f1d96e4f519cbb2c4f82930ad7fa01910b3f3a09df803ef847df53874
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547ea978b3726337f66cbb15ec9a8bcb1
SHA1d80faf9760eb5b10307302b546ad98ded2281774
SHA256231d933dfc3c93893a327f35ec6172df5133bec99c83e58a5bb9c1337dd8eca3
SHA51207cfef375ca14256e52cd03965fe40b47a5427474779794df7433cc878161017165505289bfa7b764e33e4bab460eafe81e267e8a7bed03bc91201303cb683f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a1cabe06772b76f786946b19c8d5c42
SHA1134a7495393c14b8798092c7b8be2e8db92f8f1c
SHA2568557c3650d089f36dcc4f1439ce8fb1630552a97526a1b16ce68010718994094
SHA512627dc2944d4b07cab980c440ae1d7ee490b9a6605854686fddb32de19eb84a6629808d1ad7f66d6dc87eb16afdb67284714d0d966dc23dadd0eed3ace7327f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e30980e164dc95631330e1b87f9a69f7
SHA1a89dcf5a7259ec2d41f5098ba90dbc25a043c935
SHA2569071ce07074c76a82984d2648d0cda21280fd31129987f53dfc8480275e10810
SHA512e7f7d2067a1884577036e5edf2e671bf6be2abad3d9f9033d9304630db47278020961dedf44fede3c0d4c5edfa87f437c62f7ce019a832da8797f6e31c695d6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fae38809776c978895a8702ffe53c531
SHA1f2564613051017782d6b892fbf4c44da7b3a53bf
SHA2569603c996edf3f1af6b55542056b65a4b11945ca6e40100341655aca4a2b370e5
SHA512d3acbba15823f4d77c172df91be87ce92be4223daefb55dd1b0db4b7548f3917e2703a9c9e456d3fa3476377d81d23b8303629617e259f5fec8fbce12581bd86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd803e7839ded77cf8cc1b0e9947954a
SHA10c2474aa4ca5335e33716cbd1d3794dfcfc9e93d
SHA2567761e09f82f05b712d5123545eda0b288baba2a1fc576f2c70b4b578a769d1a5
SHA512db71db9c36e0b00c67b1b57a7aebb5fa764c2c53ae244b538f5c2e81bff0b20ed3851ab00b3e82836262d7fc1588caf749d32e5e23ce54bd4e2d50dff4006e95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5289ebd53eda98ed60ba9bdc848804b64
SHA1be90542bced068ac9a3678a87d06e71a9705246b
SHA25638fd2e9dae0faacacb6c8cad6648fbc74080f195e0315153d2796f55b2a7a730
SHA512d555e9e7d2e84e24046307475684fea2c855d89108813fe20ebfe15708e0ba3f352562749b2e1826c52ccbff83d593a27566c2b74d6090dca32b0a6082b43c70
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06