Analysis
-
max time kernel
117s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 12:28
Static task
static1
Behavioral task
behavioral1
Sample
775c1c7eae8005697b9842baef9290ba.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
775c1c7eae8005697b9842baef9290ba.html
Resource
win10v2004-20231215-en
General
-
Target
775c1c7eae8005697b9842baef9290ba.html
-
Size
8KB
-
MD5
775c1c7eae8005697b9842baef9290ba
-
SHA1
04a19efd3220735a7d4efd89e6e25e7beea83443
-
SHA256
5bb92ab1c132703fcb60bab4dc841b5f61d7e21b874469adeb78ae4e9a3b959d
-
SHA512
02f41c472ff6bea91500238cbff0876cf4bbe8dc0df931d8af45992c6147250d276b6248b4aeabf5f002caca229599a9e4373e8162b31ae963525e1ace95981d
-
SSDEEP
192:yvqQBge1mhhKxjjhpPjnPxjjEWBmk+dPjyjdRxjj4BNnIIWlyplnalPjj04Pjxj5:yvLB91UKFjP2MmkqU4NnIIWlyplnalkk
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412433984" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d3000000000020000000000106600000001000020000000fdeb62e2b911f508239e505f0344b4b8a0ec173c00df3c295638aecc5b916aa6000000000e80000000020000200000004c6495e8a75fde5648eccb8924599b6d065a4cf62437fcdca3510e93a32d838b200000005ff1f15154244b6a1edf5b74cda5aa45d0120f72d6e4068bf93921becd9fe5b140000000b85347b53fc6b91f84a1d769e966817b9954410c4d1560b12a41e049cd253b81fc4ab2bc77790960f30c57282b0274a912badc71c222bbc7ff54393e2f88e07e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0341a4a5350da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6C8A5611-BC46-11EE-9FF3-46FAA8558A22} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2044 iexplore.exe 2044 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 3040 2044 iexplore.exe 28 PID 2044 wrote to memory of 3040 2044 iexplore.exe 28 PID 2044 wrote to memory of 3040 2044 iexplore.exe 28 PID 2044 wrote to memory of 3040 2044 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\775c1c7eae8005697b9842baef9290ba.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577b52e6359b5ae03cc1ec475b58badc7
SHA1bb648fac73eb13065b75fdb981f9b5916586f303
SHA256c7ecee5ff056a51c2ccf70e2bfad03734ecb42fb6b7fe784f768e8dbb842e7fd
SHA512b5fe23ab55a3de8ede93f21d3ed512a91c0913d6e1948dab79a8dee8d25c2967ceea4055006b636826e6b8d9f36b7926a447b584ae73c17ba02de52321b99a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c1b7be65b09ce9fba8497cc4b770390
SHA1dd452533ea0678910395a277ba39dc339a01e967
SHA256cc857c15e077dd6c952f84d59f136d9a81903105f4b15b3a7081d119bc6e940c
SHA512fbc00c47940b8b8abe965b3db90e51952cfa12cc09bef1282f33181d95899ff3e5b2443b943361843ef9f77b4eb5705f8afac61cc7e1a9f62a51a807d3b8c00a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fdff2d878e44e87a8b7a09a76d6306d
SHA1415bc7e99925e006bdcf79baa95c4c569c9bc603
SHA2563f689d3ed555b2eeeb3979137515afb9fac9320b3c88de557a1d5bcc10ffb755
SHA512ffd3a2aed5d0f831cf6ada940bfca65b15e6f67aea69ab956236d290d8ab0799cbc71f0ae52e3531268da736dbf0fea541acc0aef015faf87a735d78026b3349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb60e821186d3cb4911b65ad961bfb06
SHA197433cea77c009a27762a0526debf9fd1293ca8e
SHA2562a3573f0403c45fc9b7f4032bb3b72e2e01ea8219540f321ac1074b5698292be
SHA512d0a16b847e8fc2b96040c201be77fd7581d323ab634cb370f2c5dd9331733275505f104e936dd6cfaa441843b765bc7bece1e384da05b352c34da2da66faab24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea6b011469733ee416eecc7899d0b2fa
SHA16347c127d6a2c4c767dc4f310dd1c1acec3c9bc4
SHA25653528154f8a6dc29f5b3e093bf0476ab6c8e731178ef623e52711db6b88d8749
SHA5126b571e2cb87830a1776a565d826dfa49047fa4001ae59e69a63d92b1a737b23c64690333f24b2ac08d5a244bfc334d5c9f4bc68de956658d4b8b8101b4e786a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53072d2b8c7d15dacb86a66b3d5f2c233
SHA1979e65db4fa3a23a7f3657ac4917e399c1ea3fca
SHA2565a7510f1dbcac945aee31a3481ec59cafe729224dfaa04600ecec0afcba4cf7f
SHA512d10b676da908ffc96a8845956d116c2c141866d3b3fdcb282334db0dbb358bd44b06356206a5915792ab15fe89729bdcc0bfd86d389afd8fc49c966da73811c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5809f4e7ff72bd2565451e4fea496b121
SHA1c1c47d7b370c8800c12abc1f77f98cdd1ce2a16b
SHA256e75ee0338a09858fc669c4c88e5e7d4871367274ad664217c096dab094d75e38
SHA5125c8ccaa94ce2ca50e4c4e4f6399d6296a5f1de7bb0671aad1dd6a0d53c7d5a479d7b770bf1d6bbb514ca44c88d6042832c33d2f2fc1536d07a6be124c1392b21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7899a385bf2fef70b52d7a4021ebb2d
SHA1fc0c76c2341e598d6721e4079d3c991caf1801cd
SHA256150d2ecd6243f1056549df9b9e8f372045af084b2fad7b1fb933eb2229dcec1d
SHA512e73122e6b995618b5b2a88faae7efc8d8ae1b8ada0e882ec86d41acaaaa3a1c7937ca01fcd97d6ac151d10bac191c7238f31855fe0c39d89000c7479bf4ceb41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f67889dd22c0a0e41b02f5ac264e4310
SHA1f28386d12f7e7060f46106f3d7ba0a8dc7c2bda1
SHA25636a283625accd9063db0ea22b452cab97604151e4bf7dfe3863a44cf7e7e68d5
SHA512ec2b2d60aacacc1dc1edb7e3b05d866c29195b7b7775b415046a905d72b986154625bb92e835f2a70772615d847cc5a3fd142430aba8997743ef84f26304a705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565bb0a81a2a35c73aa04664e798eada2
SHA1c760bf91057bfb2a472fe0f4cb0887538404dc3b
SHA2564b0fe5dc0fbe92a6af1c3a9285ee6484fd04e6387b3c52de0990ef83e1ce2afb
SHA512cbe8e9500afcab53b66091cf47e53c4e6af692c5b5d58ad118c762df4e107e01322524c62cebfca9c8389023483b595e353d81cf06c5ba0d2a3f7d4b674a650f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502ecd6e51155fa766db152f0ad307c33
SHA175c99759d96aaae3fd7f426ccd8def6521552473
SHA25678520a073c831809361ddc45402aef4fa0ab7439dd1fdd3fb410e8885f0b6761
SHA5124509a01b9a52e587a8e20512c061a133426acb6b130f8d947031452e469b95058a07fd0185fe34d62bb5274d2e43d9b3c6801dce983433b266dd55bffc56587c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5582d93e3ce49805b4ffd9742384dc513
SHA11d34a6bc2fe2e6a724a73e3ceb2a0e27bfca778b
SHA256b0cbc86cfe44bfc0966a8dea7c18b755fd27d38de30b1109b48f0fcf1b467d0f
SHA51225213e2a77d28b51a72eb8828ba99ae0ae8ab2bb000aeefb13ea55e93bc115042920cb48ad04a236106166f24d72504d9bb6c706288c3ca763a7f498fea04908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a58361dc808966de52b3fe4f7839b241
SHA1391006d76ef7fdb55763359788d35a1732143572
SHA25650a53228b2e14a9954c191124a5bcd3dc52da1e3b76245dff10144608c84e260
SHA51269c6028e90a9a274e42221d48582259d43e2cf2f0b1481d2a31cf700138e02b19a852c42aecfb56285a503540933312dfae3b1c2d6d1d65568755452a0e6a58d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f358ccb93c8098a1cedd949bff8b03c0
SHA155a0049a9f6d758e2adcc976db35b80c23d1471c
SHA256eb6617442c1cf9d0596386d11484befa82d211568a375362b3af0e0a28ef1d0c
SHA51260641f12ed4dc1824886006ff3ed1a3c5d4fe73734a846efa079d8d2b2fc8b8895e02feed4acb3be07e075f460529a37983829000c10bc222b29a889ab17df12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de32bec18e3cd373863583b7dd46e540
SHA11ad81c124e815b77bc94e69a3ef328fb496a59fc
SHA256f3c2558e3d0b716199569da7b1b0e1210c1f8738f185a55179b2cc97272279df
SHA512a8e5447e2331c2a29ef14c3767b49c378e6af511bb0294f4fbc868683ad2320b4a4504ea18931a267d718140dd953324c5c4abe65ce390459fc362d13cfa3716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59698ef58a0d35bd05991ce111864b0e8
SHA1d1397fff393d8f2969a225224433b98eb1eabb12
SHA256b1d33fbb4d8a2ca2ba9393058f721cee8a1be6cb5e643aecaad08ee93b738d36
SHA51265bfdaa493502525b4c01937b1555a6a90f5c34cb9ad5c9a1afe7155de9db6f044190b321011bd5f9fb84935c5a45ec6f26ce2f4e43b36e26a2ec0b410e2b5a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5217b5a14ce4955bc48b3a5f93c675973
SHA11042e31ea6027612d24d6e85463e2626e45bde23
SHA256e68e03c894281ce00322eba09ad28a2dff0239991d2f9f1ca8db22464cb12c21
SHA512679e7ac9c13935b2e0bdc8c1fc2076e220596cdeb17219196438b9222155c25a298a851e8b81a3768c434daf5bad9cc478da875f8449f8b50bc2ac630e0dce87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac4cc8c074d241cbb8c18f65f541fbae
SHA1d2f7ae8b5174d222db10ec3b49e21b625e09995d
SHA25681bb3222a9da22c107dd740ee1d603868b0b2917ca4923479aa09f1dddd6f65e
SHA512e6e6ea8f824b569bb4e818c55a1ab29a4d9425b784b993ac37bb5515ead750c0a2cf70e89260221cc7d7d147fb2e00bb1ae820fbe8f587abe3d71b290e7962f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558f2bd57f83d074a2a8abcc9f445681e
SHA1eaa934b1d147d043dd1b132582471b32b0652aa3
SHA256d9179a1ab66d5b2c59ed682aa30ac4cf9bc4190795039c05845ea1cccb27bbf5
SHA512491045a8dab91411f0eaeed5b5cb82a271abc7fb892bea400363c005e73b054cffa4b92f811b6c28e4bc19e4efe6c4d11d592b809f2e74cf0dff325a893b00dc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06