Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 12:57
Static task
static1
Behavioral task
behavioral1
Sample
74c1b9cc06d6cf48ae07d831474a2419.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
74c1b9cc06d6cf48ae07d831474a2419.html
Resource
win10v2004-20231215-en
General
-
Target
74c1b9cc06d6cf48ae07d831474a2419.html
-
Size
899B
-
MD5
74c1b9cc06d6cf48ae07d831474a2419
-
SHA1
09a907d7388bf634f173f64c8677987365bea090
-
SHA256
81caf66ebd6cc2008d3da14e3cc18a9978183ae76ec448625a76cfb4c5365727
-
SHA512
ebd64c0dc1880b33a83651ab270310a6ff61d7b92bff6bd422aff5da77264fac7748ba7ec8ca5640e847fbad0318f6412ef9484feef67aaef38cddb5ea7b390e
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5F8E6981-BB81-11EE-A5E0-76D8C56D161B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a02be4228e4fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d60000000002000000000010660000000100002000000061b433ae1fa337dccb408193af2b83a7e8d7a17a69a94d0d45fa9d59f3c386c9000000000e800000000200002000000064528546ba503a86e569dbc067a5c6b0024d494740af5f01160b2e5a9a5b189b2000000012c8cb06ca8b6f319f1e60f79c0c97687b39d4fc23d0dab1e6887dcb28d8097540000000f425b0f5ab8b28be1bc3597631196463796419493ae1e6ed1b621c72d41bf1137cd2fdaf540e8f473ed0f2f65eec6cf8b6a55d12b91111afc5072e2298441bb3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412349350" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2404 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2404 iexplore.exe 2404 iexplore.exe 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2676 2404 iexplore.exe 28 PID 2404 wrote to memory of 2676 2404 iexplore.exe 28 PID 2404 wrote to memory of 2676 2404 iexplore.exe 28 PID 2404 wrote to memory of 2676 2404 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\74c1b9cc06d6cf48ae07d831474a2419.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2404 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5862fea2768dac75f05fc091f2e702d81
SHA19a8bd4bb22fba4666437e11e8bc60e35bdb868b3
SHA2561adf891a21b35d48ab5d4ad7295b13f0cc959644c4a678ef7398e0add5387297
SHA512fe5f44086692d34fd86654cae219195505ef08560519a13d8bd8b5f9706e5ee7def44be998cd66344389e96049d6e3d582c6f3bab3dbfc6403bc0043bde21862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55acd756095b7b55e1adab9f996ac83fd
SHA16bd26661a7fba6ec6c07fe217a5a554146e9b23d
SHA25653f2d388ca21fa06808ae31134807a5c8dbaf222735e3f8e97309e6a8b600782
SHA512b5116d20e80c043324dbf3d83aa86d5f5fe616e912a2032e24bd064167705c127d1f6eb86fe91069e9c49a85c54ef5e98d3fb8c1b6d7c99b62f8ebcac03fccbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53844b70bf936463a45325e40d26c5717
SHA1c458349596ef6b7c82e2d65fe7cb79d71ccf3481
SHA256af240ed82ad75118ef41140edc758a776464b9ed1c78839d0247d05938e85d60
SHA5124ae4a6ac3afe81240e267d7625c3b7dc55523c5b68d0e99b409fb28be9ed7e6740881842f9ec2ecfbde31565a4a1df6757c0fadc1d2132ca69c02bfae7e64dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d21f01bb58edab203bde8871a6df0d68
SHA1ee799f5d2df9f7ad59e06ed2147d0d9aec760a15
SHA25644251bb95962d523f6d54886871eabe10872b7f5271951aa3e986cea192c2755
SHA512abb91029873c4d8a62974c9eb05a1f383f0e174d9f1c5655c18f34d0e85fb500d88cac1615e0acd6d50e4557b3e444f3ca157b5e63e8ef048466b34ccb193ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5a0359a6b1d4a51e378265f06f6bba7
SHA1e7e8bf32e1091ed6ab8a173719d4717f7b473387
SHA2569d64cd35c3fa08137d43fb52f1323dfd0decc80e342531701f16a263b2abd430
SHA512349b57c7e61ca7a568aff7a3fd972c9534019362f641b8a7b0b73d3fbc8afd8412f205d29bb115f80444e264dfa8cb2a90c50a3aaa83b684004be9b3cbdd100c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c832632de2fc57c8df1057950ec4e382
SHA10fa6b2e7e042513eba1f986fb87204b9315905e6
SHA256673f45dea5b22c5c561b7d772c3094d245d7980d86da22fb56f76ed9e23cea70
SHA5128fb7a6831cb54cbce29d9029bbfedbded48f19056543b2d7913eb71491d2fb3e53ffbeb423a314e7c8eacf3192512f47c614fac0fc37e3ae894b51311aeb993d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503a48a748dd85a89b9d2082bc439a358
SHA13202835490abc617c4ce5174aa97316df1818b1a
SHA256552cde977df905d069dd7bcaf41a96d023d4cb759be94a18621f845a8591b060
SHA5123153bf7e41f920d214c21a524819cc8d4db5b1eea04ffde01b6cc3bd3736e7e305b7bdb0c26a9e677f1ca4613f6ef0ae4c37eed034e1b1aa8c76c213f2d9012b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c071a18f1e7ba65a1120c7742b7295c
SHA137cf5e91c9782e66d8d0520b9496e85f30afbc24
SHA25612118d91cf7420234cf87a6adfadb085059fcdb397941aa882f7f5dcb3ed3f35
SHA512be3291abf3e1654b6e5fac48829180e46c8e4f102d4e2baf9d6ae6f77f6fab50c7bf15622b9614df82581959846eb1412a34f3e136275e6e2a2ee23d0f112e9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e22150d838739e5acfc772f0b7391ef
SHA16f18f338c983189455a6837614d66de61e26e7cc
SHA256a05bb369dfe1d9c54fe96a56fd4c71963ccf13366f909c76568e0d35286e9b14
SHA512c9e5c1d6ba1860c184ea4f7f4e7a5087cc782709f31b56a7f97e39d695f874883d66ff0a0a6d5c0f01435c1aeb9a2b5b0ce9354a5bf182133338284d3de24599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c31c7fa920ce81dfed44c4b6eac59ea4
SHA1afa6195e783cba6e203cb2f9c997818186d8afe6
SHA256ce92c97065fb3901edeba47b0e718691b490eb0b79d5f0bb03f3f3a2146381ef
SHA51265efe07365e0b0476a469e5ca351e1fdac1548cb02d6c6753e7dfc1f252e75afc5b63ab73be593a76728e63940791f7e4517c45f8932df23c9e3e87c7ed19709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54af4831f3cffe1b9e7ac4b730a309f1e
SHA1981a434ab03d90aabfd71663e95a247fb37693cd
SHA256c5aa7a7c9d667aef1464433cdff5ee71ab74eab67945414bf5cd6e05a1b6cd7d
SHA512386a2a1c366f8ebcb9719ded43755b01e9a09964f348659563c56e6dab43b4dbf08bc07e37c53461158932227b908eaed67dc46f0d3ed452489eb61c1e767401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be8bf1aec731047184c375237702d743
SHA107b22cccbbb554f43ed493b1d74949213e45fdfb
SHA256aee2d30a2583fc0397e7bd63ffd4b48b61a8a4e85eb07c2916e964833c61a074
SHA5125e582ad1c11b3ac438ffd612e68950c142f59da708f1c2cbc369c87a51fdd221828be1c6505694d756276334393592be86cedb19fc02301be40632bb971a011e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549a02cd8f9354b4f6fd0b7e08a357da4
SHA1cccd2c0f228520ef50a616222874232e48979aad
SHA2560625d23ee67b02d4ce1b28a714e1863a2625a431657f70077ff1573368e033d6
SHA5127ca683c618d57360b14cc976a8227d1105fedb463c17666e9c385f002988a506736ec5103e56603cb7af5b02cc0bf1b20a4cfb8940d76dde96f95dbd725048fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ae5af94ca6d17efa2f36a1180fc0a29
SHA12e901ff7eb174338825529ae90c58c230c9686ec
SHA25688fac026e8efda43a68bbbeb332bd0ee2f66868e304ca454d3c8416131af0cae
SHA51220925a8bbc308619e2f9c428805214561b26a45812885d8d842a85842d7c6dc96b2168c4ad048138afa264d6d2c3b54cdb8e2446a5656ba844ef5fc29a3e0af7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a728f4f0778af167ba4693fc9b45587c
SHA1d9d34e2a954520478b2134eb50fb7d4c6f0d48fc
SHA256b5e512beef5941a8c01c7ff185970e2a62dbbcbfca01bebb00b1263d6a48df0a
SHA512ff26753e26678616f1f395a749cf1b2ee4abab1688893c1495daed2780eb8e416b0e9c0d233e2dd749b641ef528dd801216ee93a334581647c24a305b0307220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516ad8fea101c28d8374e604246b4db0d
SHA1e0c49eadd9377a5201bd87df97f9cc32766b91f6
SHA25667ac989aa73d8b2bfe385cc8f4c25a55ab72af53a0a44877c4cfaec51c70bf60
SHA5127f66a2ac2a06ea1590a5f20f02c25d9cc35713b493865871dac5a08d6c013a837c50af18c25b0df0311174afe3c82e1905b36da42e18a1179625cd89be1d69b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539314c038f02f6efb4082d4b1871c8f4
SHA1b04968d48b45a388b5b1992dfb9c850e7873d170
SHA256774e049be56b9a40dcf78cfc8d8358f17d2db89c28c5c791bb58420344236c61
SHA51233c56c40e347a70c98059b39f3503849a7004639c7e59e86a1ae7c3807ff40a1542ee3681af248ebe9551cf102a5f8fae16824005b1cbb30259dc8b48c53817f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538d6999cb47752da01965c9167ef5372
SHA1e2771ea9c5099b574fb37388e5329346cc31a896
SHA256c5ef2bc03f02bcdc3394dac33906b479c2e5db9311f02ff548e053d154f72f6f
SHA51223f566e202ae4ada71c65c601116f64982e92a312a9c1fe7f29bbbe36a80d348f080861c3493f78b8b85e08c11660429093cbf67683925a0b0b0737894521080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d19fea34a23417569e0bf117e8e83281
SHA1d6cfa8cf338b1f475d66c36f6d082888abcab967
SHA256ed6fed54d0355c7f79c1c3ba628a9e6816a9012ca4f295ac54146597c8cc4f3e
SHA512865429a38405a7c1ffdae4529fa38bf425c35fd931faf86617857743f8cbe23952a60a57fd75b82f569686a188ae3dbb0dccbbe44bd425daf7f7db13e8150c5b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06