Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 09:11
Static task
static1
Behavioral task
behavioral1
Sample
744d1ea4f7dd0f27f1e2c2dd7674465d.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
744d1ea4f7dd0f27f1e2c2dd7674465d.html
Resource
win10v2004-20231215-en
General
-
Target
744d1ea4f7dd0f27f1e2c2dd7674465d.html
-
Size
2KB
-
MD5
744d1ea4f7dd0f27f1e2c2dd7674465d
-
SHA1
b41311c0c238437c7582ad554bf5bbf12b155fb8
-
SHA256
dd061e2737fae0594d9da9782af0fef15cbd6c6ef4ea4c5b3b6518468b715256
-
SHA512
8f988781d4480e6ab282ef7bdf11b97144598a04a7052c2cd0f2968f0d0bc121b144e166e4447a58e16be19814f2cb23d1218569b6c885654ce978e950f7ea92
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C268C521-BB61-11EE-9439-EAAD54D9E991} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a000000000200000000001066000000010000200000008e50d4fa1af8edc143e90193f687818a531aec7f6e58793399372430711b3f86000000000e8000000002000020000000177483e6c0ca23ed267fc5f2cd4749be887ef4f9386f1fdd992290fb67aee6e420000000b3c802c3d47cf6c07223e9d3e77e93429e4df0ce0cc1bd26e56b942d13c1a9a240000000ad6121624c85c6fa229da630186c9beff20c4c3a345dfd880b52bd30b72ad5d8123d5e48426e2397066cc766878955b9f93d42f74f3a7dfb953b2099e4e6d288 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00890e976e4fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412335772" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2496 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2496 iexplore.exe 2496 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2208 2496 iexplore.exe 28 PID 2496 wrote to memory of 2208 2496 iexplore.exe 28 PID 2496 wrote to memory of 2208 2496 iexplore.exe 28 PID 2496 wrote to memory of 2208 2496 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\744d1ea4f7dd0f27f1e2c2dd7674465d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517e1a6dc165aa78f6b0d842eda141c6a
SHA1c5b8eeb9eb2cd7d3e399de86ed16cb193997d093
SHA2566213ee6761eaa31b824c75f12facd31c815913ba1445fd767ada89c3ed5fb87c
SHA512612d9556d9c208e3048b8f9b7f0b993a1d79597f03d5e875946d81f1917d01d6a4bba3671c395c0343478b84d49f1b9d199db26322e484973279be161fc735ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524f16cdc2ac2c57c42eefa030c9591ef
SHA13726f2675edc7360f38c11e30079cca9c2fc17a1
SHA2560f8b1c2d7e03f7266ff7fb7a6025444bbb5626a1fdba546bd62ffd8fd525c4e1
SHA5123fcc7f229782d4d381efecca565d1a93f54d544353aabf2575f3b940ea7bab0c1fd77ef4edb98060fd992ed9bd146e65688ae66c5e24316bb37bad1a37672f20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5581d555d6f07dcd80f5fe91df6373fa9
SHA1ebd113df76698c0cd9152f791a55bb6a32bce959
SHA256a72cd147775e80cb19c35db11ef036fb304a132e2299da5e136507b6866b0dde
SHA5129ee1eece04301d92069f951fde64874f88bbdcca04cb4160f0ce44b4985c748fd2dbcfb4cc97598140c5653e13424f8ab45945e14587e567da332d58fd25bc32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cd872dce5e898832f760e96eb929fc5
SHA10d0e466dccf25ab01fbf4fd0b387326b7ecee0bb
SHA25623de68a6717a41f75ea83852754be1333435d16272904b01ca14506af60e22b3
SHA51242b0f1cbd17c738b0a1465e63970f14c5e756ab98285eaecb3ce149e9af6dbc2df31209a5655ad07412b3598c2e4b4a727d3225990a895626110c5e2288fbb06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5134c371185728f59dd225a89e2b77077
SHA1806087113eee389d332a220cda4ba1704dfa1314
SHA2569af6920a94ca08b658464ce097ce0b388d432ae270e0004e77bfdace08c177db
SHA5124c81fbe1c3aeddb721d2dbfb3a27d21ba30770d08bbb430c8c3185197dc7f5704b12c3ced003a14095e46d1f23df8987e731ed15316e55a294c776d01bf3508d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ac02e7dc2b804d7f27a88d8c1cffd77
SHA173ded2c2200e95c0501bfc02e8b2ece1c3d962f5
SHA2560e79d3aebf382c2cabc7c474c9d0d1a4ded065a1c5146e4eb1ed7598449165ec
SHA51268a082823b5874d4822680d994246c29767232a80c23820ecd4c83bc86c88d5e1166e51257f1df2cc274eba4bddd371e8510fb61b2b73cf1e39a06a0c06a0e49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdc9524f4f4cc1ffa80e1daf43d0e20d
SHA1c60acd9c2c3ccca497400bc5b6aa9d166874afdb
SHA2563c1af0e9131fd4442207b28cb38d9311f6475ebc27125cfa3c4d8c2da54afe8e
SHA512ce7bd29b7248e5cfcf48a218a8018b993609906710519826db3392a9c88d8aa462933aca13afb3a173b4ade50443ec72fdc71231bca5a6ab7e82f8144dacc8c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d67a7fc1ac09e7e7e2d8094600a799ef
SHA1fdc358f617e505b3dc7b0a00264e6f1187604f5d
SHA256faf3c902978ab8d377540afa2ded081573b772f2e88581e69fa46afd8b5a7e49
SHA5127a76ed790fd38621a4f39bd3cb45b2d653d77e5c416543c1019ad76981138c4bfe8aea6ac9c414703430566e89b92d99b3ff287aac21cdba89cbbd650c79fbef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524ee7c7fa7c020a6bd6423be7c1fe7ca
SHA13463321f091543b37404e308c2872cfb0ff1ad5d
SHA256626882305653d67976c5ce8a3d6b30ddb37222ae75e5949049d912879766c205
SHA512cd0afbf91dac263717ea1cb5fd3141e214675bde07315a24f66aa970270e0a212f8fd574e275a023ef3918e45f97c31399364d852e15b24ba0197544dc03fdf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d9e8bca0157bb5a4be5d468fa41284f
SHA188f143d3b722c549696546d20475cac5ceb3ef92
SHA2563ddd85a158d95f064439afa359d7f82d4130ee0173bafdff137adec3bbee7592
SHA512861ca486c637a16786b529ece496990699a142c62a5f976fbf3541669d07435db29c2631d1cb1093aeeccb2b084b165a31970fff0f6fd0d9cc39d015661a4b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1f63309bbbfa8bb6f7699b3211363ed
SHA1705d24297da9042e4bcd0de1b9f0d6efe76290c5
SHA2567a399937b730249ae3dbbfe999db9a6cb6f078e4d3ac0a5e72125793db4fcf93
SHA5123f13fa72773ed0246a5e8718ccee799968a7959a16b9365ab2824589cfeacd1763839997690995d13f1cf25e6b817b47604920d667cdfb9859d4f4640cdb5c0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a5b1b163502122ec54e230937541833
SHA1cb51364e005d93a7bd38668dc23bc81a660401ce
SHA2565bb366ab811d130c5b8d8c7446cd183739d032322a14ae14e646c9629b2886ca
SHA5120a0aa4599af314edd6c7003607801db50a4429663f4d1535d8e3ed1400a7ba8eab98e2b59e21ae317df64eab90df3695619ca25111d97e5fd4271517dfc2e039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce3a7119dfa51f58a85ac652e0f964b3
SHA16c5e82ef3dd2bca94fe89bee43d8d9dfaa7999e7
SHA25686749f7bd8b2b783eeb6f5bd851726cfa5206af497aa53af7350bc1c19cd3ab9
SHA512b13f328172228ffdbd8e9087f6a38ab4b70ce64d42fb58bf00c72bdaab7e550b6def3d7484dd8644f6e2872eb4bf89cfb79c4865aeb561f26b7c7546087acdda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c22e82e3e6e4962ee6932fe533eb9be
SHA18c5ccf43b429e1278cc5b25f87227a3453d9ddad
SHA2563ab0ea05d5b2a9656b6c3b6cc95fc696251a495f1c619fca924ac09039728da8
SHA5121be08b35f2d8231166460d8e664a1203811d367d277b05eaee480e05fe68bfd7a3e3f612d04432efd235caddb2dc073ce2f7e4ef9e4c05212ad70e96e0a102ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8a1a0d6b9cd554e8e8b5ce90565c2d4
SHA13e3800390df9fe7a8a4e299bec7b7a4bec46052b
SHA256a117f5123fa9a4c7ad7ea4da3b3a90ef3d9fe591a046b4dd591ec7ffb6531be5
SHA512275877214220ff3583b7d010d466d7fd2082ff924b0808f75cac746e01f6dc8bdf4a86458f80bf68d997c21229fb8246f1664de0f7e35242171da7c956732f7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c2c83916a3cd173923d0026ba48e7a8
SHA1a93dcbf62799dd83fcfbe60743fa7c9c1a69b54c
SHA25640c31fc4322e4f10d1ae1c4ec3b3d0af6579e2932dbb47ccbc0c73a9af44fb1e
SHA512fd30da47245f169b04c701514a4e9c9c248703e924bc7975e82545b7a7bd338e4f15d00bf0a0e9f90f5c9a8fd2e0773d49d83beb66937f26451f804dd378ef48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f202cddc15802c12f2f548babb9be318
SHA1d7524a3488870babd3fad22a5dd63dc5a1339e3c
SHA2567fe90d73a5aa187773fb6e6e3610df0e96a0f1e5cae3783c0c77ffeadeffdb42
SHA512a099df5ca62f31c26b2a657e97f82e9335e3fc42bcbadd8beb1c7d9e732d0c6df3c4220a2b74708cf661a9b3da53fc0b7e39f710442577bdd05723d9af89be5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510b84cd2545ef219fab0588f072d9536
SHA1de0a926d387c5d22c02348b9ad0b6f30e05e684d
SHA256061c6ef3aafdeeae1211de7ae532971d1975890c950cfe38e8abc78f592ac5f4
SHA512f16eff1bb3648fe059a0a57347ef8456831b419df22248f8824d0826425b47d7cd0ab34b1c07d3c21f7f70335984ec553a3f45a07267e7eb68d43382b256f2d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fd142baed68932e4f23dc496723edb9
SHA1c52d22bf78734f7d8b057fc6f4ceae89c3d4f373
SHA256c6f8cc06897bef05c586b73a1fafe335c9ded9268cffc8e86d10b70f268898b9
SHA512689e3d360d4cf3563e9a9a5f0df930e03c86f5c48eadc937f9cc9150df8e0bfc1baf62f4cd68fed6225702ffb434a9b2bedfc2a7e47df6a40fa545237938f52a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06