Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-01-2024 08:57
Static task
static1
Behavioral task
behavioral1
Sample
76eeb225e714221273638e68d46d115d.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
76eeb225e714221273638e68d46d115d.html
Resource
win10v2004-20231215-en
General
-
Target
76eeb225e714221273638e68d46d115d.html
-
Size
13KB
-
MD5
76eeb225e714221273638e68d46d115d
-
SHA1
b50bfeb39ce7d4cdee0ddd194c373790f68f18bc
-
SHA256
e5792b6d0b3c1008a621e8bcf19117770044569ee259b8f2083cdbf2b9409c10
-
SHA512
07e65c57c09c473c477d212b95568f4c5866129afa1a17250cfd2438cc839bdacbd398a4c0040fc4808c6a9d37b17eacfda15952f364c444ea1fe3305ffe1d09
-
SSDEEP
192:cKAfKnsiMIpruFtAcxIBoYM9VSfvbKryHjGvFeLnrG/H8zQZaB27H2ixdqHEgyo+:4KfpC5IgSnbmFe7AcvQH2imRSP5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000429d3af34477a14f8b2dd7691733418900000000020000000000106600000001000020000000b5b892bbb312c4bcb00a00f7c5f3aae8d259b952618be5148b91418e0f3c20f4000000000e80000000020000200000001db458051904f1a73996db13900df85d8b258d80ec00bfa5de96497e56a3e95420000000307973d83010e7ca76b2130c6542c1b9e5f43ddba28e5d88249370110bc62333400000000f543d1363c659db49f7efc623b2ed305472574d06f1f1bb76cdf9c34767916d3ff4090f4ebc42718163fe701a5756c6f2cc839f2e5ec0e9ef964a6528b7b8c1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{00D5F901-BC29-11EE-AA51-EEC5CD00071E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0144dd83550da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412421347" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2320 iexplore.exe 2320 iexplore.exe 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 1928 2320 iexplore.exe 28 PID 2320 wrote to memory of 1928 2320 iexplore.exe 28 PID 2320 wrote to memory of 1928 2320 iexplore.exe 28 PID 2320 wrote to memory of 1928 2320 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\76eeb225e714221273638e68d46d115d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f33d2e3671b64239f24847791ec90319
SHA11878aa0a937163ed7b4c19ba5c524c0bad2e5a23
SHA256ece036a154aa68c36d7ea7dbb0d33ea79e6a09b3529054ecd871212b677949a1
SHA5128e3cd4cbbcbbc9c64fe64a52e82293788da889e812506fcc8ebd6a7720429c1cdb4662c600ff2f92ba64f8e84dbeac6d99cfc60d879f98944ad4f163ef26c858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c159af27ec6201964a8cb2a146fb7b5e
SHA1f9b5544dad521d5985ccce43dacbd2e4137aec44
SHA256c8521aa5423f52d5347094393a1f47839853d0b171cdedb756951bb23f12d001
SHA5122730b27bf702151eb7c67779991ae0cb001362434a50098724f7f5afbeb2d02f58f2406da43f68096ddb1f5141c4b00a40b3638910e93f3f399ac78f6b44e34f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5e9109683b6d000578a0109d8af9ea4
SHA1b4ecbb6b05bdbd4060454c7744a3c46ee6c818d8
SHA2564939af7d272ba54435ca66aa4f1022479fb3dd6058af5512ed15350032396f94
SHA5129f4b25ad20c8713c3c81f8733ba0dc00477731b9898be113e7b2bace57659c559fd3cbe3a5204209744393df757fcb1a07da133c3464d81168161abc1a483f24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5f75453ffe33ddf67c5a0a05a0b4f11
SHA1b75d1971f7744beb783b9d23d7e7a22bc5a0c0a3
SHA25638c8bc7dc1bff2fce3fc10cba7be83f4b91ca8df48f87c19853520f3aebffb54
SHA512b9dab5fd5b45a016e64d3484cc8859af5ac8a78841a5120b47c030cd2c6f6b7d7329b62b4717ea8ea260b69d18db3175f30a994ad3a14c5dd47f2d4f958de630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8900ca34343b99d7f36c8b6aa59638e
SHA1c59ab6e3ba1fc63baba87d527e98e60279c4f3f6
SHA256da81e5959a0d8740e0bde90f41e8e4b260cd90ccfeeca6724d75a839cfa0b200
SHA51265a173d247b91db1cc0e8f41dc7ecbfe63d1ec000d0461f849b9d5e5e58894d51fde6fab9157cc2ab0e9104d09761e09ccb0662079e996373646d5142a69ae42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4d0a1ccb790485a635c28167cfb2868
SHA11cbe4131940951b2b2cf6f6e2cdc2303bf6a5b8c
SHA2564981c9d139ce9877354b95f64c9c1b482d8c37c3f0c2afad98c772536e42597d
SHA5120307e4b3bcfd2a984e8f6acad89b83196222783e649d66247dd879d21f8789011b8a31062761a372e1428ba20c45e489feb298be710044b7b424eae4ae0a862a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58578eb2eac0719225e54ffab7f72c633
SHA181439a5100fc70e3505606c8b0d723622ed296cb
SHA256b6d9fdc30c4d3ef7b0b013dfce4a9aabcd0c3ae49c35b87ff785e461a839ea99
SHA512be6ffddf8c5c47289e7a9f17d07bb70fc2a7d788d01080b4cd6f00530dfd6ea084a473c4b58a9fc030ad55d629c8c5f0923fd4938646b9c50e64d67ca0371f70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597d01d65c4dba1d466dec9740d6eb1e3
SHA10c84587b640712ed8d10934eb5860a9621992315
SHA256da285946e1871c5b88c7d07703a4f2dd7fee0ed074626ec8c04119fa9061fce3
SHA512be3f302fb067cf7dc28ff1a205c2f7ba3a2fea1e804a75e165011da60464a287b17a7f2523ad3163d39ead8fd4c77d3dafd12cd2b6c6f267459c151808d584b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576457b1e958e25e3c8e65b4f1b69c9cc
SHA16c1cc7e20734c3413d54c116b6b8ded94654e0bc
SHA256e50cdcaed5d50c5837fb843742c5b1e4f53189572f5db6d9f3dd63c33d9e32ba
SHA512010af1e4276d41c3c38fade09cfc967c1b687fbbd824799dc1aa4a2f5b43fdb3c8ea825ac925dd0c963c9fc39f0ea582c9201dcdcbfe947a073e5b2c39bf6c4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af9740c52bfb8f75fc0c98d38b844af5
SHA1177e9e6fecb44c724900be941e2374583c5bf39c
SHA256d456923902325cd62b04dbc4ca9163bf848e288b317c7ec7695150b497f0fbaf
SHA512cbf323496552bef61f8c84561930dd02def6f9ceea813da761185a33f3f47cebc2e2fbd5a8de10b733cdeb226fda9ed73b13e54fe5d4540d1be6631569c8cd0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557f970b993d935408332db373d85a6e4
SHA1500f824c723d4668222840821d3f00bb35845581
SHA2566725fdfe7fe6bfc265a8e3b53f3aec4e33e7d6339c47bf13597e8ea85d1f1f91
SHA51228783e4c4e72c080b090193279be231df354c15c0b1903b356d8645a8233f3dafbce8bda286fe79c852bf474220958342744bd08768ecea9a08b131742dd92eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cca47873ec5e947c7bd72a7125a846ed
SHA1a3c30c0fbca90facb6828450b5df9caf58cb9d1e
SHA256bf8c8db37d77a7108b103d36576baa61da788f2ad0b4f06d3291e1697d4ed9db
SHA51212a3dbc24bd6f8e5b8b71d3f692cb6a2c71f8ff8ad31eede75b48f192e3b57ded1df671597013f204e26be88e5b5a4c28053f40f23fed8f59d124b1ae1c2d36a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad7c0e37912ec0050cb9349ccd4b26f8
SHA1a5a285f0eac1de73e4b1559b5f4aeb46c7ff5eb4
SHA256d548b5dc1459c8cc094d815d6a8b094f5b3c0c6e376bde7c0437d1de0280ceff
SHA51297645891490e96824cad41b72fdabca58f9b241f0b4e398f4c6d838fdae06f48a97f70314eff7096e7760a90dd64b4b4714ad3620caf76b649c141b37d3e99e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c54e08763db04138e99f5fcd6bd8b009
SHA1299bb8af2882abb1c25b891e5c5a39aedea31253
SHA256c73bf3f511db5f101f25995c5d720b240ad5fe7b6ed82b7d9d57bdab75e10dc0
SHA5120cba793fc7c8c0d2d533eb8a24824435efc3c8ae5d558e0af922ab0c282e73c25b0e0d889c12a8bb8c307024b4d3bc295a77118fec59cc27483c3893d717410e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56aae761fc7a320cfc51f608d2fe8fd40
SHA174e571cb31b53ecaa3c7627ecf3276e4860e2c19
SHA2563541c2124aa6092ea47cd01deef3d97ef86fdb5fe97fcfbc18860f728650fdf6
SHA512cd423d8cf07a5ec843d77cf1e7b2e2ac9b23efe98b61a002c16552cf73b462f9d3a0e657743d7e5054daaab8c1adb27b5595a9ab51228d0b105123b717497e4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ba86aba3ea8a797e34e1bd50474209e
SHA16a1af5918d2e696c56b95761c5850d39d2ef3db0
SHA25682683ba79b1ee9824133433caac39a41dd5b275e63b607d510b818ef467c8bbd
SHA512404b780447b84ead00665be4e0e1dd5698a83ba13cf95805002b82fba07f0f7b2bfd8d1ceacd685e2fb572d2d923a3d7aed6c8702213ecb63ef57a4e6223a18c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563119abda1951ebed9c0e710c19586dc
SHA1aaffcc15c132031bd04532f87f79b51b6fcc2b89
SHA25660e93a48ff49d3eaa293f930c4124ad82906dfce4a6b8ef89b371fefdf70537d
SHA51265744e497eaead9941f9fc776ecc44f6b4bd40e1c9233320e69523b88c174208804dbd45bca11179e754c01f1533688edd6e96ec443d8a2060da902f7f1f3f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a591c181e3a57e8d647762f1c16809ca
SHA1cdd94368a5fb2b34fa683bf509dd9bbc97ab76a5
SHA2561736c2a4bd1887c6859d7a7a2e2daa0d45d942c433b71efb99c905c65984b985
SHA5122fc20fd0570300075b9bd9b0ef2edc98c9e5750561a49a80ad42e0881192d8ed5ead67f37c07fdd1e841c3c0d8bb28ab68c9699fbdaa8c88500dc0c1da084b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d336a94874bb9084fa0322dbdcaa2ca
SHA17b4caf2449fd2a1ce931434da146f641504331d2
SHA256121e57b89c3ea4f30dcb367ab00c295a316bc9d4cd2a9805a9f8e2cb3c1d68d1
SHA512c08d371ba2c740362eb8c3e13315bb41ce8b76d294789e92a8f1237c539fca5ad72418dce74de91f07a67b2dd99616d934bc55a2844591ebb6905e4603169dfe
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06