Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 22:06
Static task
static1
Behavioral task
behavioral1
Sample
788221f7e3ad6663613309bde2e6062c.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
788221f7e3ad6663613309bde2e6062c.html
Resource
win10v2004-20231215-en
General
-
Target
788221f7e3ad6663613309bde2e6062c.html
-
Size
10KB
-
MD5
788221f7e3ad6663613309bde2e6062c
-
SHA1
4054b9be4f9f66b7133a7997b01a4856e91ab81c
-
SHA256
6f6704919ce5c8084ab8bf0b19246b9975066042f380ce9018e60d894aa5b6b1
-
SHA512
178c525f2fde28c19af3c41c669eb30f31962c6269c43e6331088dd9f8956fa95906c6a1164af5999afc282f49d55e4a92d90312f5ef55e7e97d8206d73ff24a
-
SSDEEP
192:UYa3bhEUYSWMHVSkA065Dn4OZLhcGVp5TZ85HHXAAmeqO67:Na3bhEUe+SktEn4OZLhzVetHXAJHOu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412468680" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d300000000002000000000010660000000100002000000069cb9d0e1937ffbf9431bd4a6a0fbbcc0061ec9fa848432d05aa53c16cc8df2d000000000e8000000002000020000000eced37ef4351c10a5e859a7dde5dd316b3dbbfaab97d711bb5f5d3c91cbf0f31200000005b88c99ce64a13c4b61ff1daca54a2eaeb792113112bc9ab1b86b552a225898b40000000d73576654e690f0c1d13259a1299e4240373be4ebb32a5e0a7a9315cad0c0ccb2b7fd356882c6d4fd33f0446cfc744449a77e846888cf106c8a7dd6e3cb66d7d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 202c9a0ca450da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34F79B31-BC97-11EE-9776-EE9A2FAC8CC3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1292 iexplore.exe 1292 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1292 wrote to memory of 2788 1292 iexplore.exe 28 PID 1292 wrote to memory of 2788 1292 iexplore.exe 28 PID 1292 wrote to memory of 2788 1292 iexplore.exe 28 PID 1292 wrote to memory of 2788 1292 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\788221f7e3ad6663613309bde2e6062c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1292 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a44e5f40230e7bc62a8d48eadcd2221
SHA1455a2f8eea599958331993a9570d96f8fb0e932b
SHA2566f6126598c20ee5aa8dabaaf90370e7fc9801d185b52d91fc92fbda404949d0e
SHA5121affca20b6d51463bd0a25ea9e4fb70201d253824e68ffd05fe4b89274e2332f4158e29db89d296388e9ba8a3112c68a114699e3611bdceb4b56f49f58a30c6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df23e9a23c5fb6c1511bb132156ce48b
SHA1f69a3708b389ddd2b15f2eef1d2e49e7244ed6a9
SHA2569347f81b6b90f6778df99be3c2484375461cd76a731ed692647bf06cb1e16957
SHA5126c93d912b8bd84c45dc6e7ec47f84c8476a3bf3b8cd68c753df742826d3b9082ef6ce6c0e4418a3d8330b4460206bd612e1742c88731e8f239536fc27d76cac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514e368da2ada1ef18add2322beba7359
SHA1ca0b955e482e7b84377f0aa18d614ab0ddb4ad81
SHA2561c7c59a9ed819731f815fe41f672cbca3c82f0666f2525e66b751961c8fb47d5
SHA51296eb3e95efa16835fb9fb632b2ad06b22b6cf3fd77360e8d78a90997bc0df9135580b05dd6c5816f520202dbe952b6628aee6f1be8673b3414f614ceadf36ca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553be8bd2957300f4ab0b8688e7e47a55
SHA1c3fc4f9aa15fa8df75e63ad655df73416fea2e38
SHA256d5eb582cea24f8e84f21946779241d33013831c20e532f79a06fa5d3fa6d1f3a
SHA5124772904d6a1c3f6b27f8690976f8339e7b87cfeb7e49fb17c9fb0de13a2d6dc3391850dd9009af249b69adce8f8bf697abaa8a6636186693e3de21457d585877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580ad81239d3719711293a72a176d855a
SHA191e9816b3564a330a428dadd4c875daa74e70945
SHA256a5023bb65e704790242c5c1ad0ed396b562d4a58bf712b76cad92fe3b1732ee5
SHA5128851be944e11e4217c7d61c85d28c3ac370c6b4ee87f7613625294ce869591d5e458cb55d7c14a6cc98510b92de8fe36bc1fca35bb359aa0111a2c39dccb63e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2c4f6b8fc87c5bac20537fdc3d3dd59
SHA10d7b97a9dee9435a4ade449ab56f58c79a451db6
SHA256bf49a2ab7c4a7ae61e6eb66a636bcc3c3f85176d2eee66a082be7a1d866b70e6
SHA51209431eef6414286276ac73287da2ee0b875f95f38dbaba986f01737f1f189ec90fcc821cb84730a42da4d6c85a32c0754e78fb28c348fff792e669523479855b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1f4b978f325eb3e29abcb27a1794b68
SHA183eaac2c2c26ac701f85ace5738d5ed84f82115e
SHA2568bb5669faa5b4dabc4e380845aca9efdb182e8eb50323089d5c76b240397ff28
SHA512319df39abc6f8f67fd15dc5f28beec63cb297aff145dd8e2bae5c775c46a3f4244d1ee5bb129042271a443d62e2840b885fcce473b08ddb9d788d3b2819c1377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2ee60d412ad03cf8a8492477d4defcb
SHA1dc6685ca0cc98df6b42008a3d4f0609e9f44d1ed
SHA256e9bd00719879eb2a228726087deeaabf98e7072c83f33be7213ff79edc797b4b
SHA512486bee0ae3d6dc97242045e93ec77fbac7534bf6203b1faf851bada5fe6d27724cdfb27cf3b5e13efca4e296bc4e4539d87d71fc4f6d0dabaeff9a38302d7988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c9c242c8e16b11c8bd61e2794292e4e
SHA18ab8fdda6b22d94c0d537f089dbe7779c9976586
SHA256f42e61679f9e84b3f9958c51b11c3ab020d6fcf7c8106a43fcd96c180ef0acf2
SHA512c6fe6fe69eec86b0c666723b0226d5065de417ff1cf12f6fcfa6b2979571ae84cfbc61fb40cc265799f0e2e4a1b91474d828e0189889d02d151ba9877882d9df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a346afa7df6bcf330716f77cc267480
SHA106b67d14add93d5e0db30332115d24af74b044ee
SHA2561460c1f0b0a661b5eb9c947ab51ef8a186dade1b9c2f5ca3d374b0e638003ff3
SHA512a39421a7cc750b2699f697349b01e2a5df32dcb6b4b212c30042f3519f73bac8957f1458fcef9f336d4e0a42d546627028f60bdea276b48895fedabef4101a48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5063f42170c59cf2c2d81a57cb046a6c2
SHA1656d5715acd47859872c87a061b30e81221ce5df
SHA2569e8e5626aa2cf9dfc6c7c91a94c5c6b92628a4c061ec103a71ea0a06eebaa69a
SHA5124ec9f314b066cf34af1d86d2ec93f2413b06d54e9d7b86ff1bf2c5c9b63b38e02a94478b651bcb87e028e95a7726ac1b95056d1fb9cd1413f3a56e8010a6f30c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5926ca489351d595a10a537f087dcae6f
SHA16aee10fbc2e712d469fb3723ec49a128bc08a286
SHA256939b9f0b834833dac93f54120a796088eaade53f65472a2130d857b1d0be3f13
SHA512201d1f080e044a399519853b0312144715569363f43d0e391abbd106592daad4acfd7ba6882cb53614ac8c2c17f60f1b1b408ace213ad20a07736308cbb28627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7d70bacdc699ac1bef66f911de60d27
SHA107c9ed130cdffae02a2fff378e0e18c747e42e8c
SHA2566e3cee1a0676aa9a5bfc3f6e3be3f8da83ebf56652b50013c287132f5bf67376
SHA5123b815f657ba35e8f621157153e750144ebe92bb30f3342ba8a539bc18261105c73b71a1b422d3cd30949dce2d74f9e50908f990de0749444fd796bb0673a31c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517d18e9d71f55a0fb0e4b9aa7b594167
SHA18273b9f8f88def8872de6057511015636e5f832e
SHA2564af550721815a678b06bed596a3b8646e21adaed7630a10c5b8eb6e03b3bf0e4
SHA512f002762e9a0f145f2afaceb3ef053ccde8ff6f3a16ade9c290330dc3aa8aa2b2690da28016c604c99716213fe4938448b0ef32f5726be3b3c2b4031092e70790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526b5391b0c1f401b7dae5ed8848d419d
SHA1976d35f737e02748b64e3650ba7e59e1dc6671ab
SHA2566ec0e13337aa84a53894ab0290d374a8278bb8c338b9753d1e049a31d241f060
SHA5129ffedebf7009213202350f16539381acf5b18b2e50a0f72c8fcc74db3633c32bf4dbd11718fb0aca7c6eba688eb9196f293daf11b3e925d1504b7602ce81bab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be699323a4be7f1ec3145161cbaa033d
SHA179b8a8af08b2970c69a92543b92e674f1733e62e
SHA2564f9b39f58575f3a3878c1f8807ea2da9d041bf6473f04e4e5f60342be72a71d0
SHA51227caea6d66fe234f8c0b7d2a3cf9deaea97452acdf3bced86fff5fb5c7b4358c3de777d8b3b0ca9a35181e715145bd1909ce27de1b2adccc3b74a7bf088685fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbe5f9620309efc26c88089336d81d33
SHA10144e3692763ac6d8558f46afa5de5223561b4c9
SHA256422e3a2b19d5051255c33bcb218d30e8312c82466b87b98db2de7e6fe8bbf500
SHA512088d1049bfc01a576115fb1caa670ed98c462c2150833cf9a246be96c60b0b6156118ca2ac6fa4ef2e138ee771175b52199a083f0dff4cd4f1836b22daac7753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f391acc1bde0a1c2dd70d199091b1a8
SHA157255518346ad290056356170c2a3ad6e049021a
SHA256c534781f2242b8de4db26373d6413bef99d3f8c065792403fa75f29c3c6efc06
SHA5122c25bcde1f472111ff21bb66b224ec4a7d282e8e94dd7058f5149a21de57c373151345a9813574e643c066ad58e57e0730b5ae13b8a31f3886871457240f195e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06