Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
71486ba29e8cb031234619f34b0ff7b9.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
71486ba29e8cb031234619f34b0ff7b9.html
Resource
win10v2004-20231215-en
General
-
Target
71486ba29e8cb031234619f34b0ff7b9.html
-
Size
44KB
-
MD5
71486ba29e8cb031234619f34b0ff7b9
-
SHA1
534b716c33e8356fdb0a63d12f06545671c78cf9
-
SHA256
39b127cd1fc1fadd668af764a0e8213013e3ed192fa8e1c2eac79bbc06e5ec61
-
SHA512
01d5debe81cfb3920050e24f79e803ce998cd2438a7b45c41890adf479529e27c6f150e4e9cd16e7894b650e9ddf8e7b44217380168349cfb3de99e9011064e6
-
SSDEEP
768:mwS0l/sGVLsk8ejW4mTNn2ojmelgUYmWsd0rk:mZJt1melgUV
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412227468" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d6000000000200000000001066000000010000200000002aa458e9653127e3b887731259f37bfa0d1665a73129c57d1a5103f2717698b2000000000e8000000002000020000000fad6d33bc28add7f0822b0bf849769b10dd1dbb20ff74467335e880a12611f142000000072dc240d4076020e14877f86b78ca202821b8c2190083b537ff875ed25a716f240000000b1f7503ab73f4fa74a6e8a91d5beb74c0852554e0a46aabf23e6ec83a2caf87d1b34e3012984e4f1bffffc42ff6ca49065e7d36364cd4f4198db561d3471bf06 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{98C89EE1-BA65-11EE-A80E-FA7D6BB1EAA3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4093689f724eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1948 iexplore.exe 1948 iexplore.exe 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2616 1948 iexplore.exe 20 PID 1948 wrote to memory of 2616 1948 iexplore.exe 20 PID 1948 wrote to memory of 2616 1948 iexplore.exe 20 PID 1948 wrote to memory of 2616 1948 iexplore.exe 20
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\71486ba29e8cb031234619f34b0ff7b9.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd6bee1fccdc1a00ca6474b9ea8c0516
SHA1fe09add0e2dc9dd6f51127bc7cb28ed744dd9b74
SHA2562d51dd7ee0d34c348f755a5d808fea76afb16367ea454726b43f839eb01acdde
SHA5125cc6818a9010b611cfe89e9ccb0ee919f4127a27f403ae4c7f4019084299b08c19b0168b8128441dfb350a889ff5e831892f586835f6fd5b34f9e25ab94cdfbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa84cd198c523b7f0e5d58ee4e388a65
SHA1e9fb2adb2e22e52713dc62fef3f56371605c6b1f
SHA256db841b467a659333643796a0dbda5be314d82f5bb474cc5970fe4f25a68d1f16
SHA512df2d969f34f2d4d4731dd3a1f121ab5327c41b6f33a8efaf2eaad437c8c446a22fac24dc64d555d77fbf84c2ecae803013e803948594f7008d071d30c960e33c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9a9c116ebf0d4d6fc2e9ba9b989e8a4
SHA1a7625ff9fadb5ebe23c388489a571f2160836776
SHA256cb6979a3bd2f0afcaf8261e7d3ccfedfd9244e9023f0dfaf238f3c0276dc8c78
SHA512af28c0c54672e836eeb81fac3f0ec5ceff119bfd5c78806f062e862d50cec703a963ac4230796a1c0f71cb1d2852b37ebf7125f53e5ec45ce18aea48d3b0b00e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53807d12b126d0e0eec3873c6f2930500
SHA176b8054001a0643a112dd7b916a97e6f9c9acf4f
SHA2561f2c72d3e66cf568f57ab0e566114942f291731fd96a206f1ac57cd1216e4c2c
SHA5125615791e29fd23092148d71c206aa512c05667a00a6afcd6ecfde30516417832449d1e30d47c71eb60bddc033452ef5db2695080b9fe01d6c4dba3dd43c71b0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a14b47cb868f6fd31f4c7e06307f85b0
SHA147856c6f4d99db1c0f7f376bbd1fa7981d83d99c
SHA25603b5d12e4ce6b2f2cfe6c51578fb45a912aaf4eb0f2ecabaf257a1169d90d86e
SHA512a70fd4d30525b6878008ff5e1b369d2cc0fead3cb0d5799e1cc230c5f448b115dbc231697f864b7230968c66d4cce0c8dfc110773e2d31d880d6343129616710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5187a289510e002cdc9d1ff8466a34b51
SHA1a65e56fff24cdb87e405a8e6fb516ef775811300
SHA2562bbcd9f427acea573a2dc95a87d4f88b777280d75f29bd14be88a5a47edb393a
SHA512e6e563249cef4ca671b702d7102c66f2d6a2413b58db346f44f3fe041f6afc31836a6bf868e2542195fa42f7e1b061ccfd162d50c253b127d476bf8a7d8992b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530a36e7aab18e96d0911a69c1a05e164
SHA1fc3a56cd823da90e30ba50e3b55d9e3a6404abdc
SHA256bac03ef51b8f6e3d49a8e83fe1f19baa778defdd635c50584a0ce174ab21c293
SHA5128d27a9aa0b42182869c6851889893ee43704e95c958fbf4199a08ec4282774c73405152fb18e7b9b9b95dcc58bf7f0f08fd8de0569d026f7d7e5dcaed5760f29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50602896d830ca81c1580d99e3f78f615
SHA171989974fedbf63c2fe47571fc85285829ee4bc9
SHA256c85117a307e14ed0ada83b8bb5781c54f5dc1c28c02b2c1adb7d72662c941794
SHA512aeaaab4265a5ff48825228082e8cadff00bd45031c772b2c5b5e2f36ed3c161ff43f613d37daf46ae4847b5f4f6a8e2ae49e62fe170aad490754fd167db7354a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fb4109426d3949898049dd06778b6b9
SHA12b5f595d4934068e38e9ad326d1411a3d3258af4
SHA2568e3210ba3390e21af9db8143d38180303469801599526fb45edbd74a14231839
SHA5123192d52d8da084f12312f34f2e4681693bbbae97832c722e351aaa1c87ff6aa447191576b62080a4ed9c453ce253de5740c528065d7cc25ca721841022b1a69b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de14e1bb80d1ad397e806b71233ab61c
SHA19d962c8400d379ef3b2179bbee48e32352ecbb80
SHA25673a9e65d391e11064c6d5d890f45e8f45478bd83da4890e8fa42cb696a1cfdb0
SHA5123ff0b8fe0bc25432334f670061a8c1359213f8eab53bd887383a0c279051b9257a76c9be1cc81237dfcd780452a58f984dbec815cdd7cc0741e75a1ffa081d9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2ff8f8b779e6af0d9fdb24ed7e04741
SHA1a84d54ed596a7c0faef242b2d13110461c7ceefe
SHA256946481bca41b61929e197312c6218a7a3e32f0c10815a8474d0c395dd3b12dd7
SHA512daf134d6ceed9d4e237922e6bfd6aa58d48e3acfff73f0ae0f4f3730c2a85344fd91dac9f675021e39c10e8a23fc4fb13c83bb40612a9b3e5ace587e1544e04d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53869aff448745fc356c195955d0cbc85
SHA1674f2a412ea53886f7ac297ccbb071e62a65be00
SHA2562a70b58982c60728fe58fc1da73b94f01f0e697511dde00cc57e6bc380f997c6
SHA5129976e0dddd8754a2f5e257f4a114a3011f99a107627be73eb0cc1ea4437b6ada3eeb1f933cb277031b423626da7bc240132fc4e88265f711bbe9f00bf0bc9a2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9bd6e000353ab388ff72ef148ff8c68
SHA18880fd36521d8af9430444a1c583ed7e397d064f
SHA256a6396fcb111b33e8a1b4448661c3158c6896493f2b58010c551562ee0dabe280
SHA512ecb377c41539c9d67f337576f37df6792c549bc18f7b3a89975fc36f2d828a23f9f6a6b8676bd7ef68a00edb63b4447a8a00f785e0b0365890e8cc0f2ca9d310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5accfebcd9cf939570f44e89875f38bb0
SHA16d49fb5d1bcca1ae6ea48fcf3ea567f6679a9b06
SHA25626bbe3777bf2d6a99b7f9c28f21693f2ee980861f13f0aae37c1c395f3db47d5
SHA512373802fd7bfc1255f4903103c6294a71dea0cca77fcb0f89ef40557552bb411ffccdda199f3ca9d371deb6becf548a24ad26563b4b9653858a533634eccc2d8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db6968281a276c155c1000556d00fcb8
SHA1ef12019e98df4d5379cb93778d55def5278b2c9f
SHA2567368873cf0c828ccd6cf6039f3b6f62cc8b64185630927fa3672c909a378e95c
SHA512bb5a7cb14a881c5e2533e242a8717577cb3f3c4ba9c9c6dbb833dc19c78577995e5c5edc42a8b84eb275d5c4684375ab92f2de10b5e56863b84a04329bcf8ca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a50518a44b530cb7a9c966d3911a388
SHA15f6f648df86eeab258d265d001692cd401f77fdd
SHA256536c73e4c1819fe72e54c272e9f0a462a4614248e779fe1cc9fe2b689105a895
SHA51279ba6ab54895d8fbf6f419676dc43f1477f8fcc20966585796f824e99e5c82116bb30c8f948355c7829a51c85c39807af2114c4f0e7baa2565f02389018682b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf8cbaaa1e3968f5ba2caf04648f3639
SHA16f8d136f973a44a18eb2f1f21611da61db688aa2
SHA25643182301badd9512bb0212430f49a4429650f7c56acd4c85ce8f6b44969c77b0
SHA5122a099d7b2f89814d3fabb753daef816208275c04c5ce57aa7081307876c6770c3abb077d955db02d2a06159e524f26b99b0db6fdedeadfbd6c74bad672cb77eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c6d90ea0ddabc21d4015dba798b84d6
SHA1184483030b3aa470e622798c1a58ca10408470f3
SHA25665590933cddd9afceffeb7da376442cf7d75aec8e077276f5bd0fb690960507f
SHA5128dc6df56771357f5a67b8c5c892fa00fbe1b963d33e8eee87a300894c6a263c6b48e647bddde5c66820866449dc525ec1f976d655ae9d663b2b0669c75a68831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc489b2b02580baea97549a68c14e6f1
SHA1c940605c90e4e4695c58cd384dc049e56cb981e4
SHA256125a1fe6ea55ae4b142436dbec0fc4b9577ea52a12bd808f6b0da20622e40826
SHA512b2060dd2d8028c6b9b8d26ad3b17d942e20b90cdf6d00dd1228557b38c5456928ab6563e4b052e50f75b76f0cf6b4202fa534e3ce0b055f6912825efa8a8e230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa6ec5e20abc55e59aee8eb4294d4d13
SHA1b86ff9f160784c1df17626ea77d15a8b34b52198
SHA256fc7b3b1b3c4aad61c504c846b2899e928c7dd72d5446e26867b2c96fe6945bca
SHA512a9849b4c87daecf40d62fac6976dc142173d9b06a772d347576e03d73e5ce1738677f8847a257d80e17a948efb4edc1cfcde80d19f9ba8be768c5cdfe1a61e36
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06