Analysis
-
max time kernel
117s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 08:08
Static task
static1
Behavioral task
behavioral1
Sample
742bcfd994fe24598a8a1fdcf0fa38c1.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
742bcfd994fe24598a8a1fdcf0fa38c1.html
Resource
win10v2004-20231215-en
General
-
Target
742bcfd994fe24598a8a1fdcf0fa38c1.html
-
Size
18KB
-
MD5
742bcfd994fe24598a8a1fdcf0fa38c1
-
SHA1
36dd03e9a01a290b6e901f5c64c43f0aea7689b6
-
SHA256
caf3bb4565bccabe2158ab03be82ab6e88885f36cb05bef18fc856c8227f0e52
-
SHA512
ec97c6fbcb9ba1a2e99e5fba054cff2e61caca1daccbda2ab55beca71a5079488a62964bdad655e8711b2d6d76d6f4a8af554946139ea1aa3deeeb8ce64e9b4f
-
SSDEEP
192:zDmYKAfKnsiMIpruFtAcxIBoYM9VSfvbKryHjGvFeLnrG/H8zQZ5mV7JHvxL+hjH:zXKfpC5IgSnbmFe7AcTHvmkw5wQwCPWc
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000007fb3e86d08eabed254ad527158e854ef4e9ba4623694dfdc63f2e90c03131840000000000e80000000020000200000008e9a6d1d7ba88e706b23d118a892c188d72ebd88bd8543afeb8a8eb17fd0681020000000f90f7936d53db4a35bb041a963133b2f0737e2ae7f58b78c944f1d0644ada0254000000020feb38efffd3e799947bf9e4d2493471d87328a83fd87c0248cd4c7fac8d02ad735b53e5b2f51133d04784a93d853a52f8ec8c5591fc04a45b0b8ace3bc4a37 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00ecefc4654fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ED033A81-BB58-11EE-9D5A-6A53A263E8F2} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412331980" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1888 iexplore.exe 1888 iexplore.exe 1980 IEXPLORE.EXE 1980 IEXPLORE.EXE 1980 IEXPLORE.EXE 1980 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1888 wrote to memory of 1980 1888 iexplore.exe 28 PID 1888 wrote to memory of 1980 1888 iexplore.exe 28 PID 1888 wrote to memory of 1980 1888 iexplore.exe 28 PID 1888 wrote to memory of 1980 1888 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\742bcfd994fe24598a8a1fdcf0fa38c1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5f8fe32227b8a4adfa7e347774e4767
SHA109fb2fdd5f213bfab725cd37c85fbb6a7fd71368
SHA2566d1aacaaaffe8fe945372151baacca714d8025ac6ccbd13b7f2eb3c80397d44d
SHA5121110d2e893c61500fdda5f3a7dba66f5305bd5176047c9717c710f9a4cb1a139c4d582cbdd8bd567cb1ba87569fd6f1f34b90c75bfd2c1d7f0f5d3354322f1e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bb16a76b33fe1158dc2f96b4303d826
SHA15400cbf1459e2252a7ec14c774e6539ca58449cb
SHA25651ec3075309bcf1bcdb96da7e587382379931c8cb37236f058afb6229154eb8d
SHA512839c044c61343740fa56588f6eebfed367905cc55f6d6cb24f3fc7348c9c55f8c185149d0bd48b5414b2d09abf462caad4a3329b65a167e19a80dada2752a22e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58046ea630a9c37fc08474c94bc31872b
SHA1f7f243ac42963aedc8917e28ce248d0805a16f5a
SHA256df12c503b6b4b12cf1eb1ac6bb5bd0db957a8ce5fcace1f6668e0dcd3ab1d2a3
SHA5120dd8e27fe375d7468d131a5d530e583898ac6ab52f1d57dda2bbc4737e99a8ed3a2ac9a694dd6a1491678e99062d6c2e907bb0e80b56e0a63b3b7afc264ed5b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e85a3bcc59dca7152a56c817fd78f0fa
SHA11ae2c437e323ac118a9c5486bf40c23a4b73c1c2
SHA256041706dd244b2e85b1a7a194c15644fda3d764a68f11a40c29675ac1c65d23db
SHA512da0b0afb2639887eee7d359c2dded35ff85753684665dcc271940dd27f9556ebb03af53150bf5cf3a6cadece749e345d2aadd4365d7edc6267b1f7b0cb383922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57be8ced6c89585602ac3d624e58eb542
SHA193c2bf43bf7b097218f5a40d1cff5a761be025f5
SHA256b7a6039c6e19030a7aeaffc5ca555b28dc70373a05b6e242c5d586545ad5ee21
SHA5129be948cdee2ffd01cba88a4e12d605b15b421af54cdbbef3c58c69399723bfd5d20492ffa280d34238b923fd5fd4eaa142094a7c168bcbb5f5f9a0c9da1621e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b81ba1e0f490ae8ef53b1a7dd224439
SHA105de79f3c68281dcb170a60754d769582b20fc48
SHA256267cf0c6f031b3f8f8a10e5e8b68cfdfd5432894c6181fe98fef1c73f1e2b7d4
SHA51254dda1d7695023c5f5bafa928f760b1e6d54693b25747998550e803f905cc1136af5ea5813a48dcf1e82a9250cc65aa33da186c86db0dcc4d3933bdf2d5b2a98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3f74ebab7c2f22624dc01c34e573e01
SHA17668a1393035df9fffad05fc9cfaf0badb47c42e
SHA2565d8d14d679bb14da543d490a2719a6cba7f346753951a84b030fc7b974fa35df
SHA512b5450af158c90b13c74869c0b290264a1d8c2e42db026596f07baaab908ac4a1822310100890c265584992dc5fe2821b67e0f3e2c76b1a41ff12751031876478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4fce55cd7833e52e2b7880fee2fbd44
SHA1ead11fc9e38b8be44ce7d59761547a93dfd5ecbc
SHA2568484995279b8edc9cc9dc3bf49b1fc0c0b8cfbf086c9da3892d824a09e238e30
SHA51216edf89df5e4b34cac1a0291d1c533405dab688edddf537d49c39c953f713c57b306b6751b59a76044ba3ebefcf6d6a662885946fd8150d8d151ae7938221a7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542b5577a0f94d716f4bd588cfcd63b07
SHA1c345ddb03fb6ef36dd00a1b69728cc842a9781db
SHA25619e2958b23445c12c73fb4a94afd407b913635fd9a552acdbc024f9f47ec6305
SHA5127730b07792cf4e6dc57016d3642be14870e6eee6dae6517edac8fa886dda210f3bb9e3da74f4154e9c129af01ad44ce791e95109a6b7c9a29d630a1c6ff0ec9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576a6119bcbc5d91ffe634e66ab74abd0
SHA157a2c05be9c5f2c3c36c128706ca94850924db28
SHA256924080bf5337267b01028a6067e7bbfae1165cf11940301bb34de512c5a20362
SHA512e502e97913c144cc6acbaf7243901f4c99c6fd1bac5a813368629ea26c6faa35788bf8feff82912f65370cda78b1d4917e196d70efac7f2a9caa64de870d6e06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be42d7bc55a67ca8c9247812fe471901
SHA171de929b30fff1345f6233ffc22198c74f80efd3
SHA2561e5fe0dc4a195b3be4bb24b928df99b4b67bc929aa0c23c6ec74da383f968820
SHA5129e0dbbbff2b17dd7bf988f0a2bbbaf916d1f02c0e3dbc68ccd4859c0ac0f0de03dae969c84494ae0bd717c6c6ba90352dcb2e9ab44da1b0ef34b8a4c7412c327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af5f2618bfaed05578805cdfe7f78f52
SHA19998479f86ae0a3a714e77f53f01cf194f60c0a1
SHA25639c2af1240487ceec4819f8a3efaf8a98d786744bd9aa0d1d436e699d65c9838
SHA5123e64e23aaf02a48c048d29f28a43e30cb9280c8f67bfb8744b71c38ca155115a1576172f4031556c1e4fa767811c430427fdb7d38b2d4732d333cb82d314acbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a91404dd02cf118022336f7c9e75541
SHA101becda6c5a9b3e5f7aa42ce6fb9893c6ef118fb
SHA256d444a68b7234f22f11a8771cb75f180369605404768daa382b06d1be17c9d334
SHA512cb59464c6835ad18bd42e96954dc5112cad616ea01bb1c7fd8aaab39850a43f4b23a1f739dea531ec65730bd299e325e63b338399d712c70343bc3b104d32749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4cb6c3d13c9aef887cd683295a60c10
SHA1d4f1407d0f232576e64603dc06f1781d9d1ab425
SHA2566f6df38028d565562edb5cda4423ab17eb4090a02e1c96579ff477b1d67b97be
SHA5120764d1846ca8508a2410cc0db7a507989e21ef0cc3d07fe9932e87171911b1d6947fc54eff90fde9720a634cdfc213d8ec721fb3af2659b1daa3bb37c9dda6da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50910ec0259872e0198531b3ca249350f
SHA12abf881fdc677a4221081c52c5defba8bf2e9171
SHA256477e86cc4d98959f03d7bf3d15e3cf563863e74dfd7a16e653258b7c519b580d
SHA512c4b66c3596f6565ce5bd17f88d3f7f61866807bfa6c727a245a6cdadf2c88ca4f327ab7fe91d29285246fecbc9b0774ebdaceff4e5914c443b9f6a7556d17749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53134806a8b147c26a96c14856d8be4b8
SHA1fd33a22500b41ca2ef8fbff346204994eddc0894
SHA256a76eefe512f9651c0af8a5c18de3d4415ff46781aa4b545fbcf4253064d49d2c
SHA5128b2e7f872e1aea1190c8eb18a9e286e9bcdc72ab1b08b0134b32fdb0e80200eafbbb2f40192f3cafa30f294e7bccbd326fd2cd14c6c640c3bdf3a781ecc30cf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5419daf205d9d23f8fe835dc5fe26db
SHA11bc44ded6593d95b70f3c8000dd2ff8e7859705b
SHA2566acbf58e69ca7dc12461c14bfab3c657404d70f584b0d480065ea75b1383658f
SHA512d434693cbfa3c8305eed4add718a806b65567860a13508976245717133e31f2b14de60b5d4376a370f0a41d44128b8daef9f127992247245294addd662528f3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505501f982db4717becc3a983bb0e6f81
SHA1885336273f3006e69bff42319b02a75bb8e07c5f
SHA256605a4bffffbf3b0ec75cdd2690c7ae845d5f888fd28609374a9a9a0b3bf5d3dc
SHA51252aaf62d382e110d89ceb54f1d1f21d897353a3bd54c4c88bea1bcf81df97bbf356a2ab7a3d840989fc9321d9e5686e26f72b47e47a2bd281fbd61ef91c86d0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfe210fcb1be4e44f981fe09e272c4a2
SHA178939724ab3d42c1448346a0c85c7f62c3b51940
SHA256092ca17043f972240a7fc754d9bcde7aea0c4417063570c81fce67ce1adaa25b
SHA51293112bb040c7181c805a2e35022a5ce514c0545d84b687df67bb65da4d27474966a65552dcd754b1335b400c037e4869adbac1973cb52c558034e7de12cbc1ef
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06