Analysis
-
max time kernel
137s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 16:46
Static task
static1
Behavioral task
behavioral1
Sample
7501104d244ca85b0563b7367ec0a38c.html
Resource
win7-20231215-en
General
-
Target
7501104d244ca85b0563b7367ec0a38c.html
-
Size
8KB
-
MD5
7501104d244ca85b0563b7367ec0a38c
-
SHA1
64e1a24401b6e3c346275e23d926343efd48e05f
-
SHA256
0962774174a0463657854b5967e76764237e7d3ba305b924449afb8b45bbe06d
-
SHA512
8e574d82c38778e8ff1b7c6b16f119c0d26b89613f5a498eb89124174583d7bb57b34e499245cb44be63d60672090edbabae3005c45242b5a56357e31b3029a2
-
SSDEEP
192:neWqcq39mIMs4VgHEqPMZpz9bCq5CuSm4nh5XT+WqZEz9J+CG91poxA38eiLe5UU:V5s5VIRCbLXATCEpko1X5UWtNtG3i
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B39EC01-BBA1-11EE-9B28-D6882E0F4692} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412363060" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a062375fae4fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d30000000000200000000001066000000010000200000006e58903c8478c7e5c6aea646cd0120dcc0231aa732335505ddbacb55a076a2fb000000000e8000000002000020000000b94f050d9cd1cbeb12f7f7d30f74b80c77cadabb9126e208ff9991dba147974420000000b74fb512d56cef7504a3d8b1d475751db00d5a5544bf3ae014fe70cf7118d48e4000000073f13332287c15cb9c405225f090607c2cd15f3132ae4eb2bf70359f19bc40670f4c87f14b2fcf488bfccb692e4da65fa132b5eae35aeb73d043346e6cf6c24b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2128 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2128 iexplore.exe 2128 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2128 wrote to memory of 2660 2128 iexplore.exe IEXPLORE.EXE PID 2128 wrote to memory of 2660 2128 iexplore.exe IEXPLORE.EXE PID 2128 wrote to memory of 2660 2128 iexplore.exe IEXPLORE.EXE PID 2128 wrote to memory of 2660 2128 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7501104d244ca85b0563b7367ec0a38c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b86c764b0e2760ccc845552ef600db92
SHA12643291c9c7494e45601c31c7743dbb7a044d1ce
SHA256617fcb4ee46688bdca2650564271ba5d28e4d9952384b2c38eeb2d2e7969915c
SHA512171082b87c428acfdff8b0b5c8a9d42f231096130e7481010091baa9049d9a12892556038932d5ae44977067864bdd31422cfe14bd3af4619e5733cd556b4108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3f43259b1485704da9c769d2dac104e
SHA1aae30e90260bc71122522467970b41042eeacb96
SHA25680b8757d4cf19cec099921af8bf2ff496bc773707f14c02421f895150630447d
SHA512d4b742a93133f26f6ed758ad91320ae6a4dabaabc1d0243063136fca56adca8780546a52ee9083706644cbbb7dedeac9481256b90635f8c70b440b96aee58a9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d42387966d2cc6cb7ac6523c4715104e
SHA1d2045dee2ae7a2a132c9a2cba28487701db50c20
SHA2560c90cf2c00f18bf4fefaf27341c250d0ecc77425dc941ed0bd9a11fad35ae084
SHA5123838ca1441b7477248d4758f9da6041db048d95f7fc53a290642f1739c2ddec615326c5e630d76d04f3c0f5cddbeab7efffd247f9993311a66b4d48775a8e1ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50954e2d42121d307e0c91ac6d3d71dfc
SHA1e2e56984748331cfb56ac10d3265a7cad82b3ec5
SHA2568efd0ab2421e7572a541a32f0722d17e6e490ce88a7568cab6ebf1c481a13be7
SHA512723901a445cc525cd0e7afe7b0a34a15d6d8b962ca3e1c61b7d086e322fb1cdb96cdf98cf7dccb088c7e636952a8b33f129142777ad15fa153c4f08b7833f3e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd04d9bdc176a7357fcfae52635f1869
SHA1da4a72a7c2b5335323bcd0523d2a33d6d05296a9
SHA25646bf6368b715fdcf030df04aa13f7c5fa273b246763cd09f8c5c80300f4f93b0
SHA512bd2ce3f88dcd89994cf7627ca5afdac54e7ca84440692facf00f4af03111fd71ccf3b4d6ec6adb7d7827290b3412a7914f70d45fccdcb28897fc6b15ac35ff6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5486e03c924eb07bee8af663907750967
SHA132c9d2f043275d83a055baa6a058c97a3f030f59
SHA25633ba5096550e6ac480cc30b805879d5455bbbac4298c3f78863277455b494bba
SHA512af0b457b3147356f516a9df3fe37b6f28e5a573c11c103faacfb061afd3980e03a51a84584686956239d0815cda5c387c67fa1e4d9722cd5c90df26c39a601eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf6da4a2d682223bc792e329ea4efa1c
SHA158e94d9cb4ae00d159323c0fdc12d9b40dfbcd77
SHA2566971874b7fa316a20d9f63a3d28d58454ce70fb09b9e0b0670e202992f6b5ddd
SHA512aa593802b7247dc9c8ec8ae6820b4e4624f9970636e7a43d1fc6418d2783c863ae724264f0a4961132e19d072fc971d322302ececae04c8afd3b8ef935cd70b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519412702c00fed695fafc0cfc9ee849f
SHA1d505b08e72112d25b8c10a880d8b87b1d2274fd1
SHA25671c823382b46df1088b4334e2b6fd0d28243990adda05bf42afb3b944a6475f2
SHA51242df128a92ca1be406b6e47d1fdbc5c0dd12ef0b8452b2be1047b99d00b007880cb906f3630326340479a206d12f060ed23a9a1a296b68f2a951c7c8c7bf41b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd9a15cac339fd3683dd98954057f726
SHA104290518d3c41a77f75759fadabb92d83a983eea
SHA256f43220e20c9c56a776ea5b73b90d1624f675351f8fd6793445f0fc48a65f233c
SHA512f6671931d6ee2677959e49896953ad102a4d1f429d75e1b2de377b4f8ef1322c13f120d0ecd542154e509484184ac05ade3e38d3772122fe6fe55d5e4eba97ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adb4e5c944bfec4e9470fc02f82be3e2
SHA11cc054a2be1850401af82063b21ede212b02c2c4
SHA25608fd26e3cf5f59756a74b47422f3343e6f93474b75efb0d9cc13d4f3dcc70760
SHA5121f2c703abae522b8e827924f127459327e4facf8bcc014c21fbbdc1262f84e9daa83f685094df5969248ba3289efb623814e294e813954a3601357ffe6f1edd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541a5739a70b5e145c90e4b39c28b6d0c
SHA196cd98533b1a8e9ab277d7c823d4f76376246eff
SHA256a06c83e288a7781f79afe75787e627ef20a6e917c3776588c1e2e5343b389b92
SHA512fd4724e5f2516fa38e95dd614becdddf1dce19f88502ba9a9ce2d40a61bacce7a0d73e59e7821cbca3a9910df7e3c913d30ac7f9b7d667f41aaa336b31691830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c918eb7ba2292e326fa71fdb4a06d638
SHA121ffb25d24239f3cabe47a9fa07f220399828399
SHA2561029c45584bed08157bd4638510b5a6f5e9c525849e229aca4619d59620819c9
SHA512ba2398fe8ae042ae845a78396670d379412a21f8f76cefc16b63d87e4cbca0901fe1b088c48f1d879fbb6b5797883854fc7976b9783e63a7ce8a7d9ef4523ded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c054e144cf794058a90823ea371c5c0d
SHA1d91848dd773f90e84cb02bf566a2e6a0e4062174
SHA25684b5be2292e0250040d148dbf2dfbea32fcbd65993d3b722383217212dfc58b4
SHA5125f7d2a191f76de839ed9176dc24294b3876df730f04223d48238010fad9d9367468878d02ffe4da37a281592ed728e483603b295544124d4896927c5bb1b83ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5781f5b7953d6eb3f219cd6287a7185dc
SHA1a74ee8234cac9347325db1dbe31e8272aae3c4eb
SHA256d805c0224b7f5b0f9e0f2e8bb8ca983db31e2dd1d672e168d77487d1a0448f6f
SHA51255df6ba31ea9ad2cf63b5fe1b239d6d28dbe69692fd9402993f4f7abbf497f76f48f05dc247ecdc241e3f3fede0cc8244cf4915f919282067728325f2bdf71e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597d0a3c0b1b9eaa3a96b15ad28866dc1
SHA14635d5b024384c84ce00c54983f166f8b6065aa2
SHA25693fd4343e2cdb3c0845cf1254cfe5e16e70804801af398820b8a8cf4f7e0f2b3
SHA5120ec7fc31a71862a0d54788c54b376222f286ff85fc119de64c03f10806e5ef9cb56f7694eb04e80e30edbd54ba99b51fb1b7a0367c03775c6acaa58c147b4ada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5baaaa40580282894925ec96ed015688d
SHA195abdd6698250a1ce92ad8f100d400d208ce5f37
SHA256fa3aa01d9a3634a791f932e0e056fc3d60c9de8436d40b83ff81b962df44cd59
SHA512b1e96dd59df67749f60d34a00037f7ff1a9daaeaa045537bc2888e110f24bc47aaca42eb8a0a0334ee8bd14e86b669cf60767b7159b45d0d3ca61188643249a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdea51ca2ad1b094dc798e65e607b250
SHA16934074a3832a558986e76f87b06c68a50aa3b33
SHA25667dc3382db3c9198f6f15c96aa4cc10c00400cc5de38a0f569f93c00b603a257
SHA5127ed262dc6d999bd0e2134581050f671f0876d4ce78c07e358abd2cb1c6bd8cb1d4f070e97804e7dfa145f1fb8afd3e932aae566ecdd347dda8251f1a20ef2356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3cb108d2b1c20783877d01d58b67d94
SHA14c72b9568a602f4ee55d0f807b5e93925975672e
SHA256c50b45425092af1271fe3b024cbad4ded89f465257d529251d95d9ab7a4c2f04
SHA512321ba2ead5b0229001b9272f3fd696ba5dbf098c652cee4e35a8d490f72006b3b9034f02622f00289a6b36dd3c566179c2d8a89f5a31513a9cf25b6c3c6eb5d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52687c21159eb31e003307c22dc56a37f
SHA1016449bcc115db2271a94eabaf21e1e9951e3128
SHA2561b36cee0b9800cdbf6921869628d3df3e0928d2f35b101b4cb7ea6333004b028
SHA512d534ae3794ebe0d057d28d809bb727fb9f3226396431b970dd0eb608c5050e5c7f7cf1c32ecd39606c7f379daeb0ca1a1e3b1bb4113561479175ff929f7ec4a6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
77KB
MD5982dcd570561cfcddd415c8280892d6d
SHA1bd08f6e908f21c1d937bc236a6bad37f7fbfc57c
SHA2566321e005a4046cc34852b6de7d19c237c8dd42e57820f4280fcac2fa40fc9f99
SHA512daf71fc700137953aad77c35099d89ef494dd68d0b25701904fb0391b621aa4990abac9b43d47e8851160509293b75888637b5aea8d59aeaa29abe9ec3f04400