Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 19:17
Static task
static1
Behavioral task
behavioral1
Sample
754cd8160469a7e8df7d5b9e0a590017.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
754cd8160469a7e8df7d5b9e0a590017.html
Resource
win10v2004-20231215-en
General
-
Target
754cd8160469a7e8df7d5b9e0a590017.html
-
Size
11KB
-
MD5
754cd8160469a7e8df7d5b9e0a590017
-
SHA1
36f21b69a7fa28fea9abf2c5091343ca3727239f
-
SHA256
5f8abf8474c1a1aaabba578b5ad459fe9f1d54a7fc40c7d80737be43ac6dc166
-
SHA512
2d0c095fa4d0d0c08e1601ff3867ae6a356a7b77df69e4e612ffbb511f32a3dc46b014b1baabe1514df9ea93c464d62f29f055549407a0e0f3362c6ba81f0aa1
-
SSDEEP
96:KsuBl666MCo0v+ptfV8ZOt4hwgY7eN/HMfndifRPQmwPjEXgtHQIn+4UhJHM:a666MGKIDmn+4UhJs
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000b9e3542381e41fdfa4eb45f55de1d5af0bd6836e7f5d862e141590793a9184b9000000000e8000000002000020000000c1b0ffc34843baec746b52618b982957670040f2a2ea2e4407003632704d7599200000005895ef2ee090c73abda8519eaa865ef1e77603c0030907da5a87acdf8493643f4000000068fb0da0d44e8d9ea84e72b9fa5b3124d2ba02fb42eefe033fdf4449148a11e3d1842befac9f93d774fc4b2a05c5d4a9a7e9b0f221c7838dd158f73a06ae0bf4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412372094" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54004D61-BBB6-11EE-AFC4-6E556AB52A45} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7091a041c34fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1708 iexplore.exe 1708 iexplore.exe 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2716 1708 iexplore.exe 28 PID 1708 wrote to memory of 2716 1708 iexplore.exe 28 PID 1708 wrote to memory of 2716 1708 iexplore.exe 28 PID 1708 wrote to memory of 2716 1708 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\754cd8160469a7e8df7d5b9e0a590017.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5571770c32bc3e14e92171be9da9d5e76
SHA1909c26968b8edc39b4d146270ad5cd24418f35cd
SHA256bfa63b044397df4189c51551c8a7d0c756be687e8b3cc9f8ab3d9b2ebad7d137
SHA512620b31c74649baff51c68b03a4e6f75b5658a32c39cc10ba1a465a5581185802830f8dc5e84195fbdc87c644fbb0d9de972b58576fc6046543ee3036bfcd7040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c444a86d694f4caa6f0dccf4be0dbce1
SHA17d6ad618f222b518056fe43b5ebe99a52efcb79a
SHA256aa2ff8529dee7df78c3c81e707e49f60a7b257b9092cfafec8589710d3ff83ca
SHA512338de6278e86f21b5c19d3cb64c5697b5018f99e32aaa62440f14ed2c54a6b9cfe232b826de922987ca9df9db6c7c1f40e64e301ca1def732588a438ed1f2585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534f9ac48830acd9affc578f421134955
SHA129ced97a3ff0aae92ff63cd829615698eb6673ab
SHA25644b9fba4db754dda29bea268fddc95e873e690ab68ea98dc0e5b8987f2f8bb49
SHA5125d6f57bc8fd178b06380895646b868ccd503e539173fb2d4a69df30ccb162cbadaea33d1d327c46ffed4866d2984f4139432ff0eeb0ab35981f004a4ffe2e715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536d7b9a708557f9907746f7dd9b26515
SHA16d64ea3c5122d1b171de562e6763cd3e43913476
SHA256587349e7ce84c242999b4249d8d7ee6804b381a676009462dd6a796014cb9532
SHA5121cf26a5728c8be85d697320505bcfe8ff7a4e204cd99ee32bc68877cd9145e10458ababd5ff96db30dc06ac2b63ca224407381dc06a6ea3b4a0f08e7d38a99c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab52aa5d6856283500907127ad001755
SHA1fce749b244f15826c93a1512da374235e2ab3642
SHA25610f21c30b818f299b868c5e0a68b1b56fccff7e23fab572a55ab8043a28a9233
SHA51223de09e863780e28dce52708e46d36b228e3983b2bb99b8c71c22039816eeee9259c450ce8d66548ca67e4b6dce32b2957d585653a8dbe3077d299730d4d4616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8e9fd91528c375c9462c09080a62402
SHA1e7d40e0509f513433f7e859fdbea7b71dbe2c3a7
SHA25637a45285bde6e50bb24b71ac2401a98bc23b082bd598a2a5a4a3e7a15972ef29
SHA512fd4688ea0bb3e62525654ebe1fad0d5cb1af0aeb64e7b4d6e2db0d2302937ed18fa96e1e4607142e838eb38709a621a806dc4922d17cf28f6452d0e41537dbce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540740df132020a170ff9326b62c35e65
SHA1da447f8ae11b9c7d78bb586492da4672e973a1dc
SHA25634ddd95f9dc8dc91a2baed534364a796876d32f9de7fb6c1a29fc56318c2f1fd
SHA51293b5317bf42ff7059083bb67925912f7ec5b09ae5f18b8bfddcd8ab71167ed6c2233e2acb1232873ac0aa108b34e7520ab016d82c1396a436788951fe611177e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529fc803a07468a4fb27e27c4beaccef5
SHA1f6396733be82f98af37cdeff938e331f246ad999
SHA256ad5b03337dddce18ef55445dde95186da26b9ccc03be5f4d44c6c1dfb1b255ae
SHA51204704de33bba64d2c4064dadc623fe22d3ab85534aa332622341dd9f01d4bea8124678626e69094d8f84cfa3a81aa33132e06c083dfaf9bd26c5bccd9be07f8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c126bba00c11631f9aedc93e3e8e960d
SHA1cd7d6b07f013e535524322bc2e5a0c378d5a4430
SHA256d0f5981d91bb8773c2163624d77a381ed4a5b868566b76768b52abcdf1a2437d
SHA512dd99815229a1d04bd9c80d24320ee5756bad6161a29266f79b101ca41629fc7d773210f5a02e1a30aedc9e1e6d72644cd6c762318d6eaeb9df40dbc5287172ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50208373be54d3c8392cf22bbb5737b7b
SHA1d6e82fcd21d04a12e762d5047ea0b40cedbdaa3d
SHA256ce048442f94e1c9e550b2855e5a819f0cd1c40306878ed38558f40e5dd85c68a
SHA51214552f9aabb1bdb661bf0c6560025176c927afd25e718d06209bc8b08db248a056d85ff385c74a576e6928e96cd806b118e45a50952e05fee0c61cc347aea3be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5366bcf2f48690a5805c11d0a2310890b
SHA1cae740746288ec3f08c02634ceef01dd16dbe1a7
SHA2569422b6240a4f6c73f147dbfa23db0e3672066c125c8422b03b737dac952a1ab6
SHA512c3c6e446b4d050c9d65cba2c054a3514544384896e76fc20b21305a0a41678f40cd6d27648d2acfcdbc3446e57cac3f3d8963475238191585ce3fddac48b1021
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531abba823865f1250979f98e3943a860
SHA1a64b9d7941f2575e956dba2c5963f192f4210f08
SHA256f0ae1487b25ed1a4c736f76128f0ec20967c301905b7c92891d36976dc682f97
SHA51277ee7a271847eae630ee1c7bdf8ace3f6f3ad5e1e570bef8333d07b95195165759d4ede74565ba1fc8ae45f79f7688ca02979cb15ba0c0a30e9c5c781abe9ce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ae2b4b67a167744d4c58bbd52a358d2
SHA131f49e7f5ed5e4fe7b4c4b60cac2feb288316a86
SHA25613b2271b35a129a58eb5f2ab758fd31e31f7bacd60d8ba17958ad7f5ea2e7e72
SHA51213ea1a74ed89b978b6b66b742c3f639093df6dcaaf3e02979fd361552513c011335251184118c3af63f9c07ad10ae5d6d39709b0b559b093f43ec8d8e35e81bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2f8788499a74bd6afa75f9caf0d9384
SHA1d1f6fc25d4c0bbaa59e93a76410e73ca097f5574
SHA256df201a64c64ccbc2c95f457ffb0c5d8fb3d4050fb9384f0ee2e20e54b560798d
SHA5123eb2fcd6b95d15a8ec917ca2d64d1cb17661d0abd7948a0d2f134e29b8c964d61a52e60fa9cc30e4130ca25841b5c4d0dcd809a9c0497467501ff086574d291b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e87870b16c63e3e3b3b504c8c077b8cd
SHA16ade2f69dd59f341ce5a2db14c90b3696d093a04
SHA256821b9aca0e0ee190f7d055024de13f324670946ea615494f27ecb6375dde3b02
SHA512e41535e267046bc9de422b93a550c25196166011f0d927a2f61fae91ffcd582cdbe43a2b98d1fa92a91bfb81b1e469e7d8cf83b953d813bed3a992152f8d4e5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3074854000bca7471d5c9ec44cb03cd
SHA1ed259c52bbab50318c98d9b3994ee659c1521582
SHA2563311f3178e013aa444c237d9440e2c1e7875b18808fb5cc57d7f4a13520fd646
SHA512452d1e78041f7b706cf53a9c9b7c2b88569663588c06b75e29be197ac7559154145dd4c0f349125d72f9482a345dea0b06e3071fc55960286fee9d8f09b4b1e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552fda3597c0ab50eba929b966fc99681
SHA1290c3e2ef2a5648b06a17b9372d0adc7cf79fcc4
SHA256e646b875d4308ccfea610b16fb3db7871e2fd51b2f463c937dbe214adbb10f6a
SHA51293f9d3aaf544c14b95b55f6819c36cfc1d32de446609da7bf0f8147f4a9bdba4d2fb255a13bbcf2fe2095cbdc57066dc07064ee4e7111959fd64c9cbb9135a4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bf9610500431995c0f7192057549009
SHA196e792e49c8fa32246381ca09c26c52f5113a8b6
SHA2560fa2a8e08bcda8c240455e235e5b80c312c9d31e1a175bcdc728d614bd013620
SHA5128d6ddb3628eb83d94282df40f7833dbb501d6f754974e62122a16b4daf738ddbcefd98faa6445dc61447fbed78259b5680ee7984f00637782986d945a9d5d3e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527dc5cc5ec296cf4af26ba5e1aed784a
SHA198fd1fa82282d0856d9f2a911114fa8ff0d820da
SHA25632616d680911d39623ed34160a2d8e2b9623480531bd29dbbaf5104aa3a02981
SHA512cbf46edaa68036d34a517991c449cf58e8c8979770716a361517eceb1279af34dd1e7589a79960e19299970594182509984fbab17ee304e08677e2a12fdbe309
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06