Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 16:26
Static task
static1
Behavioral task
behavioral1
Sample
74f73dca39d71342ea984e7f511bbb45.html
Resource
win7-20231215-en
General
-
Target
74f73dca39d71342ea984e7f511bbb45.html
-
Size
2KB
-
MD5
74f73dca39d71342ea984e7f511bbb45
-
SHA1
47f61fe94b2369416c7a638d3d5cf00f81eaa1db
-
SHA256
fec8d4049c4a5c8f9f2a60cd3dead2af0a71768216f1c56141a01b70d846908c
-
SHA512
0d1f53ba4b6c7335901f9a60bd49596432e21ba706f006c4d2fb497682322c7582945732bd3fca1538e9409e350c4c8db6fce54077b8888d274fe56df0f282b8
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000914a646995faeac8873e8ff6a7d2de8a0710d53033b961a7ab6bf22a427ed74d000000000e8000000002000020000000ec12679f7cda5eeea949b20fe27254c240e190ff8759fa588d71e1ba5c3d645f20000000debe6524296d5bf747c3e608f61a817a81ad59f1c58e76dead6d79eea370718a40000000e957b97c477f30db21bafa7de1db7d69b4f0cb5c54afb6bf63b17106f541bff100aa84a4ce4d052c756206e60ee6a93fbcc531886c20decac779d49ff017ec6e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7080cf5eab4fda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412361876" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8A36A541-BB9E-11EE-930F-EE5B2FF970AA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2028 iexplore.exe 2028 iexplore.exe 1416 IEXPLORE.EXE 1416 IEXPLORE.EXE 1416 IEXPLORE.EXE 1416 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2028 wrote to memory of 1416 2028 iexplore.exe IEXPLORE.EXE PID 2028 wrote to memory of 1416 2028 iexplore.exe IEXPLORE.EXE PID 2028 wrote to memory of 1416 2028 iexplore.exe IEXPLORE.EXE PID 2028 wrote to memory of 1416 2028 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\74f73dca39d71342ea984e7f511bbb45.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58855861dd5dbacc161b50dd53d3d9f82
SHA1ce4e66ce32915418c9f90f747046ef6a80b648d1
SHA2565658d57796902af70b6163ad79ac3fb9b1051eb58d6b69559ba6d40206bbe5df
SHA5121770c83214b6592168ec0c1eb284341a81b2bc53fcf2e1fbbacbddba0f400ca7c6b2c9727bf76941d4469383d50210fdbbd9af4b7fca6f48b13b3d174f8b6eb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5aacd561ee2ceb43e4e8b8db3badf1698
SHA12025fb131f4f32a6077cde8e8fc0efdc23598e32
SHA256dc5b8bbb371b55f03e43d02b17d07a46e4c2378065c8178cc4e9749f1d070e96
SHA512b9267bbe9d7b59a64381426185b48dbc512f20b41849193c0f9577b82506405b851c98ed4f8209df59f85d5da9b2be8821cf2e785efaf419ccc3749a918ac869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5cf735abeb16c1124d2e9bc87c98fbc73
SHA123c9e7a448b2ad1cff8d9ca55db65257ebc1cd68
SHA256b614ba5f3e4e2631d88a0d42e6e36e55fb0d43401bb5c3f81a5313984542e03a
SHA51271389ce39feac73aee1cfbb0583745f41f8ee86303a3cf4034987ba2e14058ec7f4c9179bebd3a3c427a88bc274fd0cba18fb4475b6502072366251038269de5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50be7c29a88561374c09370107de59f30
SHA1cad46acdb56f394cf0d6852acef2598dc2bc2c98
SHA256299b73ceca5ecd6f21b610732c2d9a749d6bfb56cae1e7ad9741a49ecf922125
SHA5120f4d055a9be9cabbcc598bd93c05eecee3df660bd89c24da64140735ecec38e9881ece28aca1d3cc85381be1fece903266c355c8e565643bfba53e2d5351d6f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b848b869cd54b78a69faddbafe9a303f
SHA1bdc0149c4d0564485e905ce03fc1651fe62a2f86
SHA256bd849844345ba70e2dcc7356bbace510c99d9c7ec3c1bc091a2ae1b1a9fcdc36
SHA512d6b4f99784a4e1019f7d79f947cbe00076632da30d06cf1a7cba170c96c9a632a7061373d75f6b7d8b17509e73ab83669d3b28ebcca306b57c287f61a4fe083f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51e3f57c3e8f99e51733c3c9c74f3f40d
SHA10ee8f2fb0965b2269469212a4c71b6e00e63d5f1
SHA256cab686fa7f5184c0684bf835f500b8b900e40fc7587a050ea1dbfc405cb272f7
SHA512408f5cc90a6620302650febc6692413150e82053368b34e14bff289407cede3b30d8d8b37455ea23ddf84a5fe7dbb640545504180e8ea7b1de4dc0c56b033858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5de6534223f175b2cfb35ae31f9fd65a1
SHA1b38ce2e149e9530a7221a96fac027f0f3543396d
SHA256bf10bc7b20fca7514664eab2dd6add75cd2402402ea6a8bf586a12ee5b10dce2
SHA5124cea01ae64ca89c29b90be2d3c95875b1ffddeb6fa80a8853ea66f04318fcdbfaa589420cb290e7000247d447575821a4806509582a9175b3199502f7d78d3ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51f9a35a4ea1cd09ba29fc8da79017d75
SHA15881489e0ae2fd19fdc9c20fae92dd2ff3e10fe9
SHA256a52ede810713366706445155e552e6fcacbf65fdef3133c81372469da39620b4
SHA5129b39c34ddbe4b5f54f7188a92bed90b23cb1e630b73cb55e0092871cacc39fb4306b5866ec5004d31b9e31e15cbb13765c07e5fc4ea6eee98941ea59f5f5c345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD599f2f287633d614f2ccf2992fdce9da5
SHA1ea16685fbeaac9875a9c1c741035b910960408b2
SHA25699761a0d842bbe4be7d23bce52bcf967b157884d0820058c143e331ee7c7341e
SHA5128effd39aebc8fce532a932e9f9936a7603d4905c3f30d178a3006037cf1d65483e64113892adbc43543cbeb0ed9985819fb7f4be8ba5c62a5cd1277164725339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56b85bc251ff3949dbe0e22cdfa9a38bf
SHA195a6e708c6c1e45fb3dd81a396585a0c510b925a
SHA2569f13fd36848ffe9d7084eb7b97d1904c5cf0d42627f673ce46df459a529d5e0b
SHA512133299a0faeb9b3f21e3844cb2830ee22450fa164470ca545cbfdb81cb160c5594079b214ee06bf3687306996be2a97c3d0fd426d9c04ba3fb19fa6f37798ed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ca5c3322a34b341a4e1bb417f2444150
SHA1a0fb8f8c4162f3dd97616fbe12db18240cd953c9
SHA256fa4b71542a815e6a435729cd74c7d05f5908bd9a38e8ef7174d7f1597b63ee25
SHA512bd771c2a2831097a631bc5792aaf8e9dc9e329de6b6f217239117e0e3b9c7422f3d10a115e3fccb78b7f4c483bc859c72dc0cd1595f07428d3b8c39c87f0f104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD588751d3ba6601a081a0f1e167f5440a5
SHA1b2ed3e765ae003a03db9367e5d3c12558109aa99
SHA2569f4e3af53ab356c569a567727849752c0d00c2119c6e11d59ae2b64c937c98f7
SHA5127e5b7c61f867de1fbc3101955368a4e9e3b7b403c2bbd2d82489362d1101e5c76c42b4ebeb240aeae5afe3e1225937746427de2ae55427395dd7861807c7954a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55103d768bbcdafe9402eb3a5e017d3c3
SHA1a4af9e70a42c7c1775e3541a3e8458193dbef2b3
SHA25620f39553afa632ac113cb258da15749fcbfda3ccab6ba2cc673a985198d2657d
SHA5121317dd999394234990af7a4622c044864a336c86ee0f180d74af32649ca213ae53de3c8fb5851f56e695bbb0258dd54088df296ab0bdd3159aee2d0aa6a4c972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53463583df69bc15401698c13efd0af7d
SHA183e9fea849f9db78b201c836e109cbbef27f824c
SHA2566708a9c7c489d21833b7507313b4f0eba4d5a71cbb9aa6809735dcd9b7c19426
SHA512da375994b57e53392eee72b33e3e61e83ae6aeb9cb7ee1a006ba6d8aeb3ed5b19b2568eed5e08d069516f556a34bf2ccef96cd635047931a54f17e4001c1d542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD537acbf33dd7a631022df674a9a74fd0b
SHA12c4e4d34586cb7a62b5be619d044592bed302599
SHA2560940b893043ac6a72e58203dedfefcc260fbbdb158d3e1058312b011a76b80e8
SHA512a5caf3e2aa627eb4637ec7c4658690b040e0927b34f399116d02981207515e2e39322b89b93c973f81bb5882f99e8e1bc4a33d630d7d28159fb3925cecede709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57d860e7bf4853fe96afed3e2cdf35248
SHA158889df7a7b976a2da0f02c7b18dd00d2debfe10
SHA256c2c56633d5253067d15c68ec5dfe9634c6928f2a5b4de05c9ce1e78cf2eefc06
SHA51275423b073ac21f7331dc1686329a4c772021dbe1a901761c4c59efeb973f07218ad7d27200bf0af044cc9577deda6f93c2b885ba9578fc657236fc429e873491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e262c9a7a7b16186ac06418f1e2c984a
SHA14323ef0befc329df48d205e7648326d04ae31aeb
SHA25619e328c5fcb151daffee0f1f53e954b5e27dc7328e53b66eba7af163acf6e148
SHA512ea9e411e78d675aab052ef2beb5c2b67508dcc7b69525fa75953668fcb7ad5fb61b7aefcefda88de89d131537150eea73489954b033f4f1c2ee4a1996ce26e8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c52ab219f57b4523fab31f034ee1de42
SHA1f3466c3eef5b5754db442d84d88588ad2bc5108e
SHA2562d5fd22b14a4802acf9ab00a0ad43fd7e6157903e330ac51c8c93cd076bfb43f
SHA5127b46aa977f6ba892493363362988f8b681a2f3fb90e4492d81fe8ab1c043878307657896b4fbb987daf9115c9999ab8d9407bc3b36d2ac9e14c156c0883df640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53d6cad596af4799161780f47d383e7b4
SHA1deb72affd81b32318e3b8a05de8d4f0b00b30e40
SHA256ec1d8bc9e32fc0fb51d23324c412ba083669fbcecd133f01f5ac026898f18ce4
SHA51239cbcc964ddb1057e032d7ab9f20259f2b691c56bf2f4d2f6a10824fa67ecd7113e83241acd3219f15c53bf1b690f2bfe76acc58355e66f4df53dfb0e2a053e9
-
C:\Users\Admin\AppData\Local\Temp\Cab27BE.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar285E.tmpFilesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06