Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 15:59
Static task
static1
Behavioral task
behavioral1
Sample
7486c2316f54671651b325853ba4891e.html
Resource
win7-20231215-en
General
-
Target
7486c2316f54671651b325853ba4891e.html
-
Size
2KB
-
MD5
7486c2316f54671651b325853ba4891e
-
SHA1
5563ad9e8c30325c4460788aaf8d500802cb123c
-
SHA256
71df4c3122911c578fa35059e078cb9752079c37b46c3323ebf07f48e36f65ea
-
SHA512
489765a10d462a2c2bca57ec1ef926ac784c3343ea283a0a1cbf724537617445e7d9cbd45085a3a17d94d9c12451f14ff61ad097e9fa9a779f33d348efac61e4
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002213d23592f6d648a137f9bf65c22cfa0000000002000000000010660000000100002000000031acff57aa7f579afab54786d85a9b5c02e4a63bfebacb7b60fd93079cd8779a000000000e800000000200002000000068f202c4bc6720f1f626aa77d19280a64c3e6db95646369b3d6cb194b3b32aeb20000000d34a5a8569bce5a8767b1153f9f6d99afbabc6088c034f2ccacc6cc04e38135d400000007e5eaaf359c0119d0d1aa2a10160f65d8ef0fad86b66b21680fb097ead42ed3ba6ea49b65f30e17d983b2d0facc4573c8724e0564d42950be51026a2f36a6e36 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 800a3982a74fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412360214" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AA2BB1A1-BB9A-11EE-BEF5-6A53A263E8F2} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2316 iexplore.exe 2316 iexplore.exe 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2316 wrote to memory of 2312 2316 iexplore.exe IEXPLORE.EXE PID 2316 wrote to memory of 2312 2316 iexplore.exe IEXPLORE.EXE PID 2316 wrote to memory of 2312 2316 iexplore.exe IEXPLORE.EXE PID 2316 wrote to memory of 2312 2316 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7486c2316f54671651b325853ba4891e.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56e132a84cc500df8a292d9f10388eee1
SHA16fb51dd5b135036cb58727b5dc6e6e7b9df101e7
SHA256b1010de52d4976b268ac9c12aa60d92581c2f94b8f25bc774f955aaa5bcb3e61
SHA512a000aa09f6c2e17e8fbed642ef782c10c66ae7d901290374bdc894c205fa39d94c3f5543ce4be47be6ad5ed931f4f2eecee7635a2387fe95867e35512c7ef3bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c9b3d302fa4e8f19c0c3db9771301cb9
SHA11e4a0ea1382afa89446970522990e10c56363145
SHA256e3b9c6958a63efe8e1f4056c2d19027ad2dd3a2731b8fd94fa1a0f6c162f729f
SHA5129b13f48104e3462da8f99c8592b7ad1a8db109024af658a922d1d52820f11097507974a57ee9d7821984aa5d425e0af5db283b6b6f83c9cf0e42d7d186e6d728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c65fb540943dd50753dd35eb7cb6954f
SHA11c0f9a5b0d5413ec22b59e2844c6e49b15c9005d
SHA256c888738be498bf787182f3260085ef2bbecec462f5678b79b2356955170f61ea
SHA512dc98feb2083d85954ea3ec4d583ae3dfab704c9f283bbc687e51451121e678768cb7ccf8cd9d28bb75418bb131a92474203620e319b87b4491750bef8bbbac7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5107dc3e073851d4d5116ffc0ccfcaa1b
SHA123acab03ddce23685f4ae3c28a19584a77d2f6d8
SHA256c6d3f5b9bf0838103757dd6738045114b72c2c859c00f96416da3491979f9b6e
SHA5125facaed41dcb737308d6beb977fdb2ee5ff9e31b80df76b8dfd9afbb130a468bdae7ebf4cb4df584cde209c08c44170f827413eb52bf47b59fa20714258e90a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD506c050f410c0a3118884637928ee0fcc
SHA186f62319e2df06fbba6e3071e08fc23b7ec80a0f
SHA256d6d6071fa6a4b5b63f4ddef81c81fb356548c89537c596927a893e689e8dbd93
SHA512e20a283f38df0866c13e54a3f0b2ecda5841a9ba0db3130be98fbe37de5e3307514b7c5d74bf7e195c78a5ea13392efa5fe60c2021625123b0698543655b4ec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59bb583412630b151565ee5958f444182
SHA1ade66d775eceaa326c73764b69c071a11131485f
SHA2568948d3c7d9daa549526705de3ad5b751b470f7326a675d57a6c58048e68677c2
SHA512be9b79e92594ffd8282318ea6c23a3b076fbc15d1451050cb0a9ed4b03064efdb33d82026efe5cc988e289b642eee1c57b3536ccab6efd37ace4e14dd4076eaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD530d93e532993b32ab8ffa5f0e174a3f0
SHA1b3641ced700064e05372774919695b8e9537e796
SHA25630c852fc931f883ae8080299c37490bd0ffe017c37c9c17b629e72171f5cf5cc
SHA51220635ff5e1cad0dea61fd2088143f195575f7d928e2f97264b3fecd0c8957354cdbf454c9372babd9e8e63bf5922905f8b1d7ed307bd222954d3b2b435c97dbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e8e35a8f705fa231d1478d18b3f1b38c
SHA18072a2a6b3ded18ab7f122c3f2575e1528610a28
SHA256191a61d10082ae5b146226b7c41861fc0632e7e5c5101d61bc7144a469de6eaf
SHA512438aa0b205145f1bac63a8b2a66cf369dd3191cd4a7a692b5dfaf371e9cd25bea3e1915cd27d698aed2d83bf3503e83686e2be724ddf09202664f31ea6b57f8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c2af8d001214d99a6a4b63c7fe19c64e
SHA1521310e249295b2a4283a87ab6b3d72cf22fcab5
SHA2569d9717c998f407f1f351aa29be97e2287af1a5aba27c27b736df76f433adbf7a
SHA512d651a902081830744d005191787ea932145b50637d443cd96a4379f275c990513111da5ce3c48bed839d0279ac35bae2ffc5e8ff336233ea9e61e01b6b250e6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50a073cb62939d77817ef67013eabf96c
SHA16d366492d8a1434d8f1850bbcb11e02e4ea31795
SHA256806fc24d693d990d844aba5eb053570f6d3a73d9d87cdf1be0894ea590d4a7f5
SHA5126baa30187adb0d84021abd31bdc6a20923aa58324c10a5c2d62829d6042c1f3c53d3b0d80649f86d9bdc3cc4e32281f08a8478b3eaf08f5fe8de0261aaef963a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ff3a4a7a914a9a2f60a7536eedde12a3
SHA17c543aa23dcbd897b56a87bf1ac63e706aeb3f26
SHA2564c0ff94782f92305fc3a1ff71abe1e5169e94b5a00ed7f87e617bdef00090c62
SHA512a34033214214b66fb807eb8e602d8a0a03bbedcda0973a303204ad9c966257ca4d5bbbcbd6b7720d3c3fba1f582ac74558e3fb1df35820f462c0763e39812ef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5791f2b81cbfa746bb7327b6a8407cfd8
SHA11ec46f6174efc3547cdfae4175b2fd81741bf0a8
SHA2564e1b2606e20bffd06dc74547eb07e8608ace0b77871fa087599fdfe6208083bf
SHA512506998bb851a3f6bf7d1e4a2a8191899cbebfa57ad49577f80a007d5a072d086f4ad355d25ecd3068bfb8df90c026507e230f4214d010120fc7158ca2923423c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d403e56c119df63d0de6e25b7e50065f
SHA1857c4964fedddf4a5909c78794f4ce02af06346d
SHA256d9bb4c4132ece828fca751f2ab1b7c538619a49af5d34cbaaeec220ff603d77d
SHA51212b1bceb716d3b38d093ea0fc464eb17ea018694d4043f2e0a7478bb5c7fb11f334443adf4a8a1b809559ab3ab97fbc053d0699c702609dfb1317edf8b725511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e787879cb1d97f93c9e932693f750b77
SHA168f8aacfd2b4607e8f274b0395742f3b42df4fc2
SHA2567d3793d4e7c8203066479cddbb4fe8a06de1454dc377597396a909adebe4814d
SHA51242fa765ac51f70f012db8e4149908a8ce0cbcc2d9f90ae7aee190612534aa6de06d31bbde4e21e6b9d7c980779f122b88999527edd70e2d7294976121c6a32ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f9eafdd2e9150938524c58c49c1a198b
SHA1846e37f0f888820a48f010eb4223bdddbfde610e
SHA256e2a7d83d599b73b68258f10f04ac6935846d37c52f88eb507a59331103863ceb
SHA512d2440707c34405c28eb1b250b188c2afb964fb8f2d8b344945576ff2dbffcaf2dd6cb4cf0629f83d4c430a40e19ec3a15372a14e6b3d165a33fa6a5498a9f6bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59c79fa8b73c20207405f483e1964a406
SHA19a32e0d237239fe0013c84bcaef8d69c28f02f16
SHA256469b97725e5e907e6eb624c4aaec39944276b45866ba6c4520f4f1eceb65d976
SHA512bfca86279c76cc8a0c1cc5300279b67c8f668282e3d1d7a47e80e723381e9f6341e535535bf257a32fda27bbc28a8ae2a26a482ec20a8a77824e84574d83895a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52785433db94b2c93408fb573fd643df6
SHA1a69b33bb450f9b7f75d0f9d45e97d24dc79d665f
SHA2562fc7239f27f8523d73119b1899fbbd10936e01fb4ea1c230917236eaf15956e0
SHA5125b060951a3ad7463cf5da285bd56bdc26a00e41acd1731eb0172eeb2c3b2c2317c6c04f1e2f8481836147efed0a5d22ec032ca09b3ebe5ba3dc2a6aa2d1a9b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53be0d58420838790229f66f08943d9a3
SHA1b45c91e4e33603e567b65b331cbb273a8bf7b1c0
SHA2566207357db6efd4cdd3fb56194c466e4af5d2c00f1807d3e96401c1373a1950d2
SHA512a957d07e8f9653ad44ff0d6be46a0c29647fce1517a85537b7707ab4fce584879cdacefc0eefa536a6d882c9e5c7ee62385e90cc694805be4983e0d241732697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55513fd68a70fdf92b95803ffb0785c1d
SHA1b2551741600cefd7fa1d285a1e7c20fd3bf87c49
SHA256d5540e4e722c846101e45f2bbf73a2c1e1566f77b08c2df9a1566816319f7f03
SHA512df038019be1409f6ae100b7494c00686b66cfbbcc15ac057beeb8213620498ad9beca0b30ccb78a0242eef34e1463dd1dbaf5c0f7c7c5a3aa723a4a96fc1d938
-
C:\Users\Admin\AppData\Local\Temp\Cab698F.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar6A4D.tmpFilesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06