Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23/01/2024, 16:53
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20231215-en
General
-
Target
sample.html
-
Size
22KB
-
MD5
3ec5d3e590bc88565a10ae3e24be0722
-
SHA1
537d4ddc07ab22baebeabdd722535eddfd75bd1a
-
SHA256
2fa44ca34070b5d979e0f8ef7147e85f0e0d43c23b8309fee1ae87d1d86b0f86
-
SHA512
bba2689a341c1cb37878574460924350215e34c4ff71029514ebb78ba6a139052e4f3bd15840f043ddbfc5f8f6c8bb535d6bc09269265a08026898de173e289e
-
SSDEEP
384:PlSFpvsyhDNDRacC6rHrhYXns6798NGWYGEw/1RFovMotdvu3hl:Plo9DN5Ra96rHrhYXns6798c1M+dvahl
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412190709" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{021AA601-BA10-11EE-9905-C2500A176F17} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000f8189f1e4abb8a352f765698e78d6a78be2d334a1d5f04477a1a9c4a0bd12392000000000e80000000020000200000003c1b78985ffe1090c9d1c0d9304133207b772d6d89683070e78c91244b5273de200000004c07d6f47f33926cecc57228d94bbacafca62d51259883f0e73165223cc4f03940000000cfd5021eae21aacacc3a792595476ce2b9009c7eba72e94af1101f8f6ffadadcefc5e8ced5bc08695a355568d4f85cd88f6fccaf7721798ff708c79cacae2cfb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0397dd71c4eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1784 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1784 iexplore.exe 1784 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1784 wrote to memory of 2092 1784 iexplore.exe 28 PID 1784 wrote to memory of 2092 1784 iexplore.exe 28 PID 1784 wrote to memory of 2092 1784 iexplore.exe 28 PID 1784 wrote to memory of 2092 1784 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1784 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD50caaf71d7a8666a49092cf655ab90376
SHA1b762be5cdbe05f01728287c401b124fa8fba436d
SHA256c7c0c474e3cdc30c0f2a89517439d74f31e2bc7b7f1acd4c58fd3854b59e986d
SHA5127cac3f6c472fe57d7aee126fe02659d968797bb4192c8b1718a70c73de7e228ebf8d7e953e35e531f853acb23c8d9f14103ae43063dc3196c804150b312b673e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508b6d73b39c3686bfa101a536d33e270
SHA1702939f636e8cea68c4e78ccc5bb3bf757c0fa8a
SHA25668856043bbbaccfe4519de78505901ba39534df6b93db6f3631f51a306e95bdb
SHA512558ea11515fa93c83a50a96baa05b7e63a1720c9308993f2e8f274e08c6440046147bee319bb5df88d6c93f2cb9821b5cc08697e8b92d7a3a7a2c4b3c8324839
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548de003e9e0c4dc223c232271892f79d
SHA183560414694844d80bb4488b10cd2837dd1b860e
SHA2566e7e9c576cff54cca2e53d9c666add804a2f717922c5921b0eb29b5a96c60a3c
SHA5129a9a109a4fbd1a3027df8c7928c72481f0ba2d071b6166a48ccdff6e9a73447af5af2cceb14a2fdfaea2db9ce9154c66a34f7d934124a74a13ee2b97d85ffc62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53feb95b4ee07ccd66f869886a6d22f1a
SHA1bd8c575417d329e858a3316f82388c936e872dfd
SHA2565ebad31d89d77598c2c0ab34f1abdffcdbe970b8e926bb3bca92c6266b32cdd8
SHA51209de408440f92efbc78b2fd40c1a8579d2b6cf8b9782d929f46dd4aaeb543aab26763646d0c3205ded379846c4a73cc5790e1ea65b6ff0b3fcc1f43b8490f09f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5414c299d4ccfb52352ecba660ccac4b1
SHA1c74c029dc37c6d3fe2fd3e10a419bc160fa9978c
SHA256d84412868799b0003e1e35e00ac44efb426effc7b09e3c7e20fd0fa59014dee1
SHA512ac2418872b1e840cddf2701b7a08cb90ea3479e0999028525ec459f42be66ea80271318065c9472ddfdb1ce4fbf520f6a1c4446a17afd24cdd5525185f4b1d0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a9fb31532153bc16ddf253fd25c8726
SHA1f473c1e4e2be8c893eb1ba6b2206795ad26e8214
SHA256593fff57e92e85dda70027c5b857dfe0214732c9e81c8c7555d299ffe99ff24a
SHA512f185b2e161b90a2989d00c2e7181d0714adb7fdde655aa539e794d54f3ad1b6e5a8612fc0183affd58c14e978627ff731e010760fe5bfba8b7b9e212d433202c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e59ec25f7cdbaa48e58a56ad39ee0f6
SHA158d6abf0d826653366a10cb43942243750c28ff1
SHA2569fc29bd6cf4935fd030a2dc20b050c2a34d2690981fe8c243de8640826757c3e
SHA512cdab0ada60f39fcc3d180d9a130729e04f706f5471e3b72b0bf9ad0f5fcf6ecec8e9123f43d7a5f5dc9029ef2a5ba62174526eb68bd54b5195a5e2cdf8eb943d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac584f26504ebe14d48c674f163f763b
SHA115eec52c8afbf6791deca06ed114dd793f5cc638
SHA256d964702e3fc86961cf258018fb137c94962e50d55ed38ced76b32ab43d726021
SHA512e8d5b655c75ce6cccc043a41f473025a5c806990616dcaaddfe4b3a5774fcc1a91ee8ba4ee7432a90e9022aa1dfa7f4a73290afdf5ab48e5f67bbd0004359aa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd50ef1e320bbe063a2fd5c724dac4d4
SHA1ad6ff3600ae19c7376bdee476c16d094c96cce1b
SHA2561e14a568b854057922d552de3068012694cbaf7dcb67263816c4051e769fe7c5
SHA5123bfaa5606eb9f706509512b6a65e951ee68e788d0978c5ff9ed6b6df007f34630b57cadd78f80aa4bf6881c5f425331223e860f7d5726640abe5045d2df3c47a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a70204476604d178728039a3d5d5685b
SHA15c1e5df2f4302729008812f7a9498825011948e0
SHA256ebe63371b05146d29726cdd1535bb51213e9bad9bdbfd6d18c74c96a88fc5a83
SHA51242cce321b23d1fbf4956f71403dad10eaeb1dfbda835f7c921bd1779352e789c725e81e31890ce2b1b941a33d0876e5e04e9fde4b72388a686ce2c9868d3b314
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e1e7a84920517f55d393d7955d90e6c
SHA1c97db11b045d6dc842d61022ec6bf73a0c63cb1f
SHA256336df05ce1eb2dc1069cf088a371e2f94f1f89a25ba65431940195fbaf442984
SHA512492d0da1ac64bc43d639ba882a170379fbe61ae4dd497a497e26c43a0bb0c3c06b7f4eaefa12a5f560a689cb21fbc7eb58f68bf564c8ad8f2d9558889e28291f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f533858c6e18bd8e8357db9403588b5
SHA1d86feea55d52265683230c48e16ea7982d68c6fa
SHA25652912c0f664e00927d4aee88e527768d999f8a35936c3fb343c729daa0f251f6
SHA512ed10a7fe8048b082a2580818dca9032dd68521981ec55d6f64eb123748251213378369a4992cbf7c6d2ffdd9bfbf6b192bdc303ad7f722d34c80f3e01be31a3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50261a4d2ac9cf46e221346c634010af1
SHA1471ce3582191ecbc115333927893b03fc69d264f
SHA256c128acd3f1d4d455c654a52210b92fbc0f7c93d586e80a97cb382bdd9a9209ff
SHA512a2c8cacf0ab08b89df28e5dc74bd3db291d50040a44323ac5461222096ea96a3bc1d4b412526850f82f427ab0dbcddff0fd565e0ae8595def119b4d159058c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57da317a55b8e6b5388701e047aa48ee0
SHA16fd678118b736911a2e568d1f2bde6bca0a7721a
SHA256fdd740ea0168e6217f7c7665c2a6f37eb8910e28d53c473c64cf5743f6713bab
SHA51263efda876bbee228b09b5f4cccce91f06ba8417f85ee1226e57825cd41d0a42c1c46143b34eff0952cc623fbdd8f4f348a6ffe283ec428a282023baf7e4474ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf3dbc035b23410ad2936714662213e7
SHA1b798117b94d74f3fdcfb1acb62a4708a5dde8d51
SHA2563bbf206b617d39bce913e2aa5653e79cdbea5f2ba207a1908d82537acb6efda8
SHA512ed06cc00ad7d2a172448e0580e10a725dcfa5cb327e9fdc4a7e165369f927850a1a9700f0650e1268fd9f59b2582b217a7435225fd3543b9e95d7f69a76a2a32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5459bf51e1c4e0a4b817ee2b2ac300b4e
SHA1317525dd51647923a002328bb7750bf9fd0e5bf1
SHA2567d0d09facba243997dfa4b3f1059fdadd6ef7b4d1d50f7eb4c11762495cf214a
SHA512fb4c5644666440e82226ea5946353fef4e24091f128e1f8ecbce64f3591e117861de69d5c22a654c45b9bbb6d30df457c2365c8bc7ed6dd7d2bb4dce2ba643a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD522de521fc0d66c1804c9eee961763258
SHA16427803a9806b4f1198eb31a098659edded3b833
SHA25601d8d7f5a52f684e4b27396c95e00559029dd22d396e50543b38c67411e250a1
SHA5129484479deb2671f127cfbaf4edef5ba564a557f339f53d9b1ab673f5466a9d7de0bf7cea2570d19962a6d2e64315ffb555bbbd144f93c36b884b41688d45c30c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06