Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:51
Static task
static1
Behavioral task
behavioral1
Sample
752308ed8751974d4cd633aafc3f3b04.html
Resource
win7-20231215-en
General
-
Target
752308ed8751974d4cd633aafc3f3b04.html
-
Size
284B
-
MD5
752308ed8751974d4cd633aafc3f3b04
-
SHA1
09b32ff2a64bd8749efeb5cef205665f53129216
-
SHA256
1c233b917c83cbd4e4f25a43fb13bbfb752befb1445f4c693f2685ac4358e49b
-
SHA512
f41bd0455f2856a43af92eca4fc80311b59275b3749c0df8bfa2a79540fed9d9eb1a492e452bb7086235f521fbcb83261b9789945e9a540a4c8ec1c2c632e123
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f07aba4cb74fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d30000000000200000000001066000000010000200000001f0c110aca0298247a3d532512b636c5c5fb1f196ceefddb6c85f99bb6429c32000000000e8000000002000020000000e82c2ac8f1cc7d7ae7f1a3458a6cc01e15bc09618f696488df94a5a5bc7807a5200000001a34ca43eef342f46ca82b21bae516095f7808d4724751da53dd59ffa91eb14040000000c148a874f107ee70d8076f9a12468b1b4084fd10249b6d39e99648ecfe533d257b06739c790f5ab107ba5fd0e3ad35b381115f8d7fd0a4f5e77187a5604b28b7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412366960" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5E8EEEA1-BBAA-11EE-9B28-D6882E0F4692} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2008 iexplore.exe 2008 iexplore.exe 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2008 wrote to memory of 2880 2008 iexplore.exe IEXPLORE.EXE PID 2008 wrote to memory of 2880 2008 iexplore.exe IEXPLORE.EXE PID 2008 wrote to memory of 2880 2008 iexplore.exe IEXPLORE.EXE PID 2008 wrote to memory of 2880 2008 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\752308ed8751974d4cd633aafc3f3b04.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50b456776b782ae5e20f42cdf780b9202
SHA144ad57763fca97ec3f348134842220814af2d0b5
SHA256d817b036b3e565b5bcea83e56690f6370a2e3ab81263a6cbe2115563336af0bb
SHA512d1442c2fa6e3a8c35f83ce515a5e3d09df89e89ce4b10c30fed1b16333c338b4c82d91966560402d1cf547c81b49fb66c6d4dfc00459f321c8c430e47cbb72f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5740ce2a73fb845f4f0f3c9acde25f430
SHA12098d77c908f63e0241449dcd112535d3196c43d
SHA256e9e01e2b379045a758d910879adbbf92954941ad8e4b3d6014401755d11549fe
SHA512f775ec91d5f09809f3c0ab1bc57dc3b913bfcd8a2e8a5648821fb103bf31ef8c96b071629a8fefb89793bf6f0757df6f16164a2cda92e9653654ac92e007a168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a062f6099b75afe48f1dbf1d011f3f6d
SHA17ca092492854c93a8ea2659637a1268a4f1ac940
SHA2566ec4cdea91639ecc53ca79f0d4e9c327fb005dd7252ddc811c559215d4c17fb0
SHA5123570d87a3a959adf1f1fdddf49773b65ab137b3bce927b8232a0b44cb10185bcee1d7956ddb8b314c909fd8d1c1db89ce690d80aa43974e4f75c759b37f58862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d1242d09f584dd231f57bb451c572a43
SHA1726217c4b18d67f11752fc888e14b632ab1d79ac
SHA2564035514a3f38b0f074d8ab43d661fb82f75c9e6a1db6df3857bbe786de0b4797
SHA512168f03085663ea452a946f2c9e219ff2304dbb1cd5ca24c9a048afd7b1287da1e76014ac2707644f1647d7dd7a6cb2cea5a68cb848b71098a708fe89ba94b68e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59f9b3cb6089cfb0cb888887ac26afcfe
SHA1b5affe578e54d3d8a5417612bf74fd06685498e9
SHA25668b2b3e4b2a75f177c111db24f3f54c688a96b59686007c081b47fac62502439
SHA5125621f097e1d70f2e149ea4826eda0bd82a026c72c337138b49dacce15bdf640b07c73ac2a3564420bb0b6ee900ad4034afdc261c6fa643c6fb074285e6bd3c95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5870678ebc5f4550c8c2858183a85dbfe
SHA1f4fc1fe6b25b1c60c52adc7c3785a9736f088669
SHA25679160705dbfdb3dcd85031cb37792f89128002cde5d6be765bc68a88ba6adaa5
SHA512ebd5a2fc5a5591843bb8cffce5e41782667039f2df67f077ca1c020068dc751c9747000b99c1204e61bee08eff1893d4d2931661a1b065c94773f4b8d3bc896f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55d2ea0c47d65d7e452ba646b95d1ebad
SHA17505025abe957067a2b8eafb9d36f3c47529e348
SHA256281b17b1bf55856bb3f0a8fecb51e478e7f00fc668bea86c41b41bb04f633fb4
SHA5126bb573c4b8b36652e1b178f462c7279bed88d536c7629c6aa162229c61a43406281449d6a848955e3868610310b169a161968d9b1ff3177107428dc016b2939c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD596cff91013df2dddf4bf7b7cda86d457
SHA146ca462272059eadcb446dd2a67f6a2cd444916b
SHA25618fdd00f1446309cc143075972503f9a0d3a00b1bb5b473aefa5afbccf2ca80c
SHA5127feaf76f780631f175bb38af95eaf7955b58e12eebcd092ea77cf5150d14b3ed8fea9fbf00ae096cc9236698dc77e397b242499a7359fc6d99b230aefc1d8296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5039e7d5cd12c406ea6e483a01885cf35
SHA103633662c8de997c718c06c4cd8c39d27411ee6e
SHA256fdccfbbb2d884f81d8405e40b5cc2329253aff780126caccd095582196836dcf
SHA51211ff15a53877a959eb7a020973e57b82fcd6cfe3e7ac1d1b98d382ecdee6f1d224fe31b6384ad3f3eadfd9669a2d475dd2aae403c00f5f63b688f0bd34bfd070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53df07c46b02c0cb9bac9936435f78d4a
SHA1cbe4b70089c8074be1a6c0102f6933cf61ff2a4b
SHA25609083b55b24c2d13f5e3984518e0c66e487440c8339e314c16517734d804b4cd
SHA512a1c99e0de58be0ff73ce3500f4f738514a985ddee87869af7924560d4b8e0d1784ab70ac0d364fcffd5184fc5372f56fb70c78a882ffdb5747d0d38f5e24114e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59e8bb123512e034ae6bfe77a566a80db
SHA16f79cfd535b1fc935590308d6c8d829805636d02
SHA256dbc3ef9b786ae56f43c66751c1b4b112d506900caf2f809dab1a12c22ce18d85
SHA5122f2c5380200ec39a279be620b17d0e67818e2600b1328b334c70a5b3aad0a694916fca6ee929b27c30c84ff7e35a8be87c431ebd302fac23be08a8b3db8a6a1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53a22d6c97d0b0737868ea06f04bfd275
SHA1df3734a9827ed50314c7d5c1190c8a8ecb29eea5
SHA256a877434cc1274d3e20278a74bad1a1d9cb2ab36e7261789f0e075d75901c1bd0
SHA512cf6e1796ea94ae5a5d69dc2edafe70ab8a0c1bce7019fa9290c2836722a2443e4151405c4e9d8bde87c6344615a8b351c718168bd605c998523c620cfeeaf6b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD542826ca762851ac495ee534a0418a823
SHA19994114af25b6a2676bb23bfe5bc468169b1b5b5
SHA256a16ffa5b6ac92ba1fc5ab03589d14512b98250135a826f3b503209608e2786f8
SHA512fc617888ef38dca292dfaa79171f0d0cb8db8a9e9507db0f68b287169d0ddbd9ebb743d27115e7e7e31490c2c618f3e76e4a4f9eec91e9190edb9a1cde1b4bb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD510bd8b2c62fb39b838db3085b6250ecb
SHA15f43788f3d1756c07db3f0feeadc527c8613abe5
SHA2569e090ddce6faa0dcfaeb3a844f68da9d9f9db197b7ef8feb787d8eb12fadb35f
SHA51287d54119da991567e77ac022702759f5248a56920966e3d497b87134f106b066bae69263dae17793dda18ca0a132060899a4cd7d91381a9337c611468f93c826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55c160cea279c0733257b6f582c5b98f8
SHA1f686dfd2098f071988f5e77553af24252177c9dd
SHA256d33d7db2e56665f77ea794dc6ae7cf81ef09aac1cd736dddb673f6ec7d35a1ce
SHA512d942cb402b6305c10c1452738f00039945fc029f7ecd4745a65959fd890aed2059cbf1d044326b0be91b379a890b20398c9ac9ef15131085835ee26c098f6b7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5cc73a135b04f2fcc4f8984f331a373a3
SHA1eff5f447e21b0307099a73adbf71064f00ecb08d
SHA256d2f4f6290ef0fdfabda2bd833becf8e219c4f0202c46da552e90f31c12a12f4b
SHA51224e9128cb0ccc87d236c33ebdc733760bd443026ed5d5e683d9d11d1ac6d5ccb02e77023eca51fc7a53328d917081ad2ebf8358376cd59363e5361065096fdb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5375acfd767c7e2130c339a8a7d35695e
SHA102f6e70a656372c718c17f5fde1014d7f74812d8
SHA25622eba02b3179b7f3c060f96c2046e90dc176d2488b556291648643a1b3fc4be4
SHA5125aebdc6c24f2f9cfa3f96af80638cb16e411dac1db2266f8a0b90ac4446cab0f38fd1be3675a7d20f8ea61779e293f10aaedbc756da1675213efe5d439bcb3c5
-
C:\Users\Admin\AppData\Local\Temp\CabE91A.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\TarEA17.tmpFilesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06