Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 18:16
Static task
static1
Behavioral task
behavioral1
Sample
72b6f0b50999d83973a621ca29d40ed0.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
72b6f0b50999d83973a621ca29d40ed0.html
Resource
win10v2004-20231215-en
General
-
Target
72b6f0b50999d83973a621ca29d40ed0.html
-
Size
12KB
-
MD5
72b6f0b50999d83973a621ca29d40ed0
-
SHA1
e092018b88843d903b27426e99f8fbfd11ab86da
-
SHA256
66ea3c9c965c1c3d939b758962d908c988e2311d8c6128b1b2dfdaefb0c3aa9a
-
SHA512
8cdec6d1e52a4731540cfc82077096228af80e6087ca7119cc7e9504abfb06663490f27543dc65f343b4857c80444befd4daf760ef6b843379b83e854aa39b95
-
SSDEEP
384:xy1R1QREDBeVliOFugvU2ee7Io48mXXRKY355CPRrMO77OM0TCtxYLuZ4mXYHbwd:xy1R1DeVUOhcz+Io4GV77OGD
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412282053" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AF7C97C1-BAE4-11EE-A581-D2016227024C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c19300000000002000000000010660000000100002000000073401858bb54eab8f296397ef331ad9f78a5d372de6eebd3cc1cd6a306a61057000000000e80000000020000200000009a94f348c641b2c1b1e1b08fe1f450327ee032e63d3cf2c3d9f32147819d89512000000050897bf995ec85f86fa5f7b22af312f36e0138770afe3e7a624cf1826738dc1840000000bbb7b23a1c1cf8e538317f6bb347da7e4771a06bf3ebb26d4e852de1174ba9c3c5c9a8f3f96a4ee635e2a6a78ca14c242f456aa400ac1fe692133a675f072575 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70777284f14eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 1924 2420 iexplore.exe 28 PID 2420 wrote to memory of 1924 2420 iexplore.exe 28 PID 2420 wrote to memory of 1924 2420 iexplore.exe 28 PID 2420 wrote to memory of 1924 2420 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\72b6f0b50999d83973a621ca29d40ed0.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2956e73b92bf8aa9dd65b7b73a47a76
SHA106851782848016a8202f95f64d73421bfa4a4503
SHA2561dc5bb4caccdfdcda163fb1b62d18d7c116f6b74aca3782a20afad6200f89ae5
SHA51258dff8372df8333fa37dd789cbd321ab20c977cd0165d68c143fdbf40210c42688bfb48511603d1ca32f0bbe74fc7860f5fa9e9ff359b512640ede84ca562816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d9aa9cc01e7889013e28c7fc183879b
SHA14a904590404fb767b0dbe6a44e2d3ea0757f87ee
SHA256262ec9543b0ca5e7d27c12581050ac6bb36e0619dd0129307492837c621ed642
SHA512ec3c08bab4209430763392a69ae95d4599002009a9f9395069d02444ff200369b1c1821a3ec60d795113dfcd788d322cae7960f224affc77b1105cba5f5982ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593417b47b140d1110c1c7568c94b5a53
SHA130cd37e7dd53825e6235a0437708988f937a10ce
SHA2564d217a82d9fc043d0402bcf6e70e42c6f9679f4ddd50babd62396c70de681411
SHA5128f8a6bd71798ce186bd80c8a9dc61ee9519599e7bd6909755495d84b3fcbb735071d2d14cbb82be2a8dcf37af0eb72af8a19ad2b79c89c2c4c7b9afeadc9af2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9255d1093cbf03aafa73a7defda209f
SHA142b860fb8dd013d42087079b2d58d0f56cae25f2
SHA256a130a3396e94b05d7099e80387d7519ab40032b50231b18fc7e108e57e4415b8
SHA5126c7b0d981f8dc40dd5b42b32bfa5b711578a0cf7cb7faefe718d821f680803eb57ba8fd67d8dcf8c1aed064e9df14c0e2bd09c04c786ef8066a00b681c0a48a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51aecef094fd56f4a13c7c7263092189e
SHA1c1c7348dbf9b663ba93560f062d58be61b52390d
SHA2564ae666ee7b3824c2a211e56da44031a5e6a64a39af708230bd9796444a98307a
SHA512e2e3f8df38fff8abe22088aff787828130b17f0566eb4e68e8ae3e079d3244539e27127b7d223922490eb9686360665c84f8efbe750cddd169bcba2266147dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de047532bf91d7e79b851eaa04fe6e6d
SHA19cf4e7106766eb6c06c2251fe60289e342c636e9
SHA256f25a4fe9509838648ef2d66f1d12f7aa96aa931c8f18f83cb92ccc1173ec6ca2
SHA5124ac693ebcf32987b6c877526caed6cfd95577737e14db69c692c5be05eeb177f44c0f9bc5d9868df8450b5ca249242834e903c468e2cc2318582a2d0f5b34b7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54537e4a364405603720ea039c0ddd9be
SHA10f3f96e66e558b3094959b3d8891e54e8ed13120
SHA25666571f27818b9204facba3741f792302504a1197e240cce0165c22445682d3c8
SHA512c7d4d8962557509a6a6f88621ff833cd446dd323783486855795b27095c201c554f0ad6d87bad80ee639f7a1e5b8ab6e6c09d9d6596a85d78ba4db010fd9055b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577f52e5dc338755d43fb7a751322c4a5
SHA1c32670e3ba4b65a42e493f49ba0bb70c22d6102b
SHA2569b74c26b68e1e792a2e6e9e57425e371d9aee39245b08d972054fa60d1688d05
SHA5126c92bcd29133a6b14610dbfe2157c98249da9ee48fe0ef1d3f2fffe7a14a639c7db27f06488f8ae2ab199b10cd7d07325c3fc7c0b13985c632c68935b78071ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b710c9c16d9850655b5841c46e3693ab
SHA1f0740e40f725fca6eced9d14dbcaa7f113d13544
SHA256d37f3b3e84e853f493edf0c94ec515553e910258df5c65be3f844a214fbf35ac
SHA51253e29fe36c000e6436157b622f8a7061d6511d3e9606c1aa60d7e11e578c1b2c63448365982365fdb5fcf62cf9a6d2f5fe8ee090655ce77a7b6aa4198b5c822a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ebcfd39e6f6d7a5382bcaa25b7cb221
SHA102aa9f942af2d6484c03d887473d31d434325b01
SHA25601d39b610dcfcf762ddc97043bb1e1fe2cd38a9649f25dc7ae8aae478a294a7f
SHA51211a806eeb3c1c5f140457a4553ba706a3c250bbd83d14a99305f6c03b01b7e179ee0afb2a0037f1463d053d1c569ffa197ffc3a203c38926972305edf0f52981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc2ca0630f16e8bbe626ad52263775a3
SHA1a4c6c5ef6f2960ece346806dfea519553345ee7a
SHA25623d79bef39c6f0225e30310891b3d09e22d8a86ce389eea9b112c9194d072ef4
SHA512984652b7dbee4fc438a8b844ddf6de8d7256b728a58050c27a0455b75b58eb9238980f052ed278a5a1b936e8a78b3cd73401c50dcf7fcbf5897f840c8308deae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571373e6cd61fea36cca44442e180d16b
SHA1d8c64b2838611059a08d04d4ab663ad4fa991690
SHA2565ff9f78ee1ef53362f5c530af27b3b7d9b96488b1f1a6ad20bf2d92a9e394b91
SHA512068f0bf2891da2709a04bd540be144b4dcc36115a2ae551a0f198fe79c7dc15834a75238bf1f82375720d70dcc623f391c0c5a5550ea2241f5ad638882602770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd5ffedaa3cf208efebcae7bc63662f4
SHA108ef89cd745e6a0ef283b29f667926450dd1a465
SHA256c3745b180d26d384bcfe885317701e415e838ff922a2d07db9a9a11594710675
SHA512137e0d1b6a536392b5f1538ff449179fe8851b15f30b2aa4350b0284abd43cbb82fac01bf0e1eddc940bf468c8f39014698ab3787a3fa0d9e8bafefe111f56fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8d48fdbff797afeaa310e509f376f15
SHA13e6fa3301816bd5ab88749bbe0f7b40c3b561249
SHA256d8537294d52dbd163e3bb0b1d0d7ec61512f06ec9729c5db83337b29763c4c6e
SHA512a76374418a48dd277f80cbb88242fe93c27adfc9f19f4a63bf385039e5c19bb5dd9d4575ce7d9674268d545967060e0bbf4f29490d118a613f5c602e60875788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5744c32f3226c7f5035bdfbf26f2754b0
SHA1857910fe86c747adef49ddf9f0d59c594f4982d7
SHA256f0c47775b7c068b9cb88a013a7c00b08473a2bcdc1709bcb7b42bbaa71f60398
SHA512a3f05b636f96f255caba5a67c49806eaf191f1d860a45f153cb586857a9d252c9f02b11b6afe9e5c9a481ff7126eeff1d4709dbb18028146d573c108c4ce0cea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbbc331ba1e2583ac6e571416b78be1f
SHA1553518421522d7c81b03b8dc15cdb6cf3783d2c6
SHA2565b1e913ccd776c62f4cf9466eadbfef832f96672f5a4383d237d53fa1858c91d
SHA5126054eedb31879e8d0cb2dc854ee286c1a11d0280bccf7dc3205467595cead641a0b3930203b5c5769b115052954c82a5346f3ad0d1b897eed061e4b630e37c7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdc8045b05aad5684d17ca97b7d860ef
SHA1782361cdd45a4593e5e85b1a1feb04c69cc9a643
SHA256e6b790578db1bd3aad1e3dbcbfe5cf01273cc01ca608568e85691b2f337c7dcd
SHA512aa91b51b76ad62cbc1285f607702b7cdbc718305ea27831aedf283937ffd9e8af1ed7d0302607a69797a003af203b9683925b4b79ae3741add75cb8744871b7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a8f201ef194d85dc359a4b365fa2b68
SHA1edda99eb53c9defa7bb4516f5a313a63277d68c4
SHA25661d081789f998ef3932a759783e23f054d9d4bd864f664e2a75a410e6044a2b1
SHA512399e5f219d1bfce2832c4762c3ed5ab62a9f93571acb3d80bd86bbfbe71d4f2fa30a0a479cd116bc61b4c5b7f5b077b265c10676bc99ce77a1f422f38c1fbf0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e96e593d34db401d40269a9f4d17625
SHA170055621b8f43d0456da91b2584459b5c2ae3a0e
SHA256a71b21c5042f79759b71c82c148db3203204673a9b2dbb2c396dae227fb51ae6
SHA512c0a95035aff14b170bc5b3fc14bbc767194e9b845cb14b6ba44f19f9beb55b85fc07632cb3e6259edde27327872a1586598f9e50dcd80713293cf737f6543649
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06