Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 17:28
Static task
static1
Behavioral task
behavioral1
Sample
77f40b97e995a29702dff9614ee85591.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
77f40b97e995a29702dff9614ee85591.html
Resource
win10v2004-20231215-en
General
-
Target
77f40b97e995a29702dff9614ee85591.html
-
Size
2KB
-
MD5
77f40b97e995a29702dff9614ee85591
-
SHA1
7762d2097fa5af46cfe5ad9121032d521763e2e9
-
SHA256
6c0b7b8c2b9c6bb725dfefb4b5a35601c1ff76c500e5106f8f1e5f0acca0061e
-
SHA512
629ba98136af2254d0b4d175d0ffe6507106a6e6106290e5da3d76fd0b1254421de5bfe365e25dc41a928ce218631ed0d4b477306c507cacc8dbabf9f7e40a4a
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90ebab337d50da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412451998" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5F1E9981-BC70-11EE-9439-EAAD54D9E991} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000a797b3ff69132ae3a6dfa2d2695ec9ad8dde896c1ac835fee6b6b681667fe624000000000e800000000200002000000034745c35e290a91b9e39e890f3f1b678ff7761fe6fb9739974113aa626ef764820000000989732910f41fe12dcbee405a9f19acfff237df114a4914bffff66d5979f3391400000004ae703aa1b8805064dfdcbc473d53e46d08c208eaab04f704f9c3742428c7b4621637001871a8b953f51887808a8dd7d130cf7a8e501e85983d4c4a41a9ab43f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2496 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2496 iexplore.exe 2496 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2208 2496 iexplore.exe 28 PID 2496 wrote to memory of 2208 2496 iexplore.exe 28 PID 2496 wrote to memory of 2208 2496 iexplore.exe 28 PID 2496 wrote to memory of 2208 2496 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\77f40b97e995a29702dff9614ee85591.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5292e58b5b55c89f81abdd20f1fd23e52
SHA1c2d1cd328b636b630f620f537a1e3b014fea3c18
SHA256dbafb81fe2bfd428093c8f7f2a6a9c9143f5a884af0392f3055409527a3ddf14
SHA512fc28afb43763ff42d5721d3cb835a6ddc2abc078006f5749d5c1cc81814a3fc37030b6da843075a1e3047b2bd6b47ee20e2381add433d99de7926d9da9dceacb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596eb72952c355cafc9a386aa10590b16
SHA16133f608dd57475b9df55e7ef599008ad8f60ee2
SHA256e99461f8085340f7d74b63d97ddc1565b8daa8ff184b0c86303cb85af3f11041
SHA51205ba332915014c3fec06c33e55975736c832eada621d0e384eafb020b8009633dc9fb2037ba1d4d498bb95a0760c758626d51553378e2efc101082f95e9761d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a086ad8f03c23111cc4ea3bcf8d0869
SHA19d94ecc2fcf1ed5755526b41da1b24c2efc33f88
SHA2564d5770d718c70ff5bf8eb299de932e7e0fa8ab3987fda56d7a230f4b8e3e6c59
SHA5120e9545ffe37e92fd1ed2fc091d60e1318cf08f397da72001bd4c5cc5a4d3df520bb15a3c921ba2517bd08ef8c192ce50e1e0ac205375eaccefdb5580e4351b32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5351ed58e2bf58c3e8d20d8d5ffd832e9
SHA19f119600c0bc6baa383c13b48068fd98c3cab90b
SHA256c01805758f979e2a4016f156998eb12074bc8d801a8d645c9082bacdf04db4c3
SHA5125daab5dee51b7333a859b793833e988f85af7a914d5ff85a6f13f074b729f77e15b56f7be8b42da30d265995a3100a5d501622a3172c309f227f4becaa098b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fd92d94252aa826c90e2a099b90f190
SHA1c640a942e58cc58d9591fb23db0b5ec92e194604
SHA256673f1b8ee529c705be144764b682d405dfa445eb8a3db8a2c8450c949c19e469
SHA51223f1bd26f4e51038fc176d456c77bd90b281226f8e6cee1895b199bd7d001f9dd0ed00e6969024c6b29834c33579de75dac7f04548856ca51a6e3333409ccfbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550ba202d00a2d87b98ce4869d3ec3271
SHA1a924d538002f685fdd1c0be7e84778b5d03c5bca
SHA25631aabf836d5f872bebd6ad162e877e05cc967409465b936b8c0900c6ed58d0ce
SHA512ed7dfa798b7c74884f05376074ff10f50cb43584e573c00846f5816b1830e5a85d0bc1de8204909061ffb647560de6efd70eb9e4a90b66d886ff9047a49ee044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abb29dade00d7a74c8864983684b1710
SHA1589145c3b1d7956f63d0c74b4519e7959087abb9
SHA2562c4709c5ca096876da3d0e999de73b1fd2f2d4eb160cb97cc2c8624b2b12f236
SHA512a9db8868353a3b41e57133f467e9d123a96581761a4beccf4c71dffeb2b89d2c1160b5f3d64b147b72b8e024f5e0ff755d76700fd3e769cc850d09f7613f08d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdec5c73732448b78386ee50b63cbadb
SHA13430c6068ca7be8f9d06a3adae5bd90542005dd3
SHA256ab76ed9d3cf67ffc41101cdc5fe09d8ebf4529861c6e1990c57bf97b16253bfb
SHA512fcae3a4de04c00db076e6195ac3d2283636520b0447e5db02421f276be8ada6ba76ace014b79ed8d6f14d1979d841e5261de38f5897f1d2c0870838050d3c44f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5600ce2ba672c6e34d46eec06e1e7e564
SHA17ec288eec091e287479dce44137293d056f569a9
SHA2561cc63af8e556f9eee95b38f17415adcffed100700dcd935c8f89428401deea39
SHA512d250e56ad4a5945eaaee9d6f58f87d55fd46ce19bf5af4218d5d8e848497511753e0774fe962274203b8dab1da7a76aaaf7e84cedb08ae542deff215d3f20aa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df9c1833bd98578f6ea7404a340f054a
SHA176965310e33b9c3e9acb4f6668449c19a6b0e7df
SHA256eb34cb5e6c4bd98c05bc617a59cccf97994afa6c066ec9bd548dcbc8be75d23e
SHA5129779b9bec814877c08ebc33e41e432681bc564fe8308abc6e5fe6ec068fcd322dfd1123bb783c1ac12d36cf37cc2a15830166c4f6b88ac9e1d99cc77aae74eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50179815e81a78486e0bd52a98bfaba8b
SHA1573b1404b709066775c69ea4ca18a1f5c5c9adbb
SHA256af120381093cf6a3c8cfec70c170bc9c9cde1d55c757cd47812161d49c26f535
SHA512994b801715d6c33e30603bdedc65904311cd517194fd52967fc6179182591f2133e844e3eb349e48ae66cff704e48cf6b35f8abb8e46a8b06ef7343f09e79551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff06f50d4614ea21453e3172215dd181
SHA17ea8bc4a6ec43eac30bc5ac8698518554d12f77c
SHA256447530d580fe34c4a3b6b437159c8dd1ae1f8d0386844689793094119fdb941a
SHA512fe0c2b01722f18a928c6295ba7c3232ff45d37285e8e958b2934761ba57bbd438dac9edcb87f355ea993e48fb4829d279901812ad2c3f9100021a2127c1cd1bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5663ae656f80839cf47907e5408873da4
SHA175e96c73500d03c29f97c7eecc362105b409040c
SHA25623159c1c9a81f97fe95d5a3271fe904d8b69edf2c2f13ec0bedc6963f39a5af2
SHA512d0050268072a1ef5c57f29c6df9df0def32ba09e0d7c0833822b4d0d0141708b2624604adcc7e355fa7bcfe308c5b7b1becff219813685f5eabb43f31dd29cae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fe09570f69484427c576ab53382eba4
SHA1ad87706f20d5cb5497cff4d11c5b9170270f596a
SHA2569cb423ae022d6a36d4b550817fa0a4821e8911728760a1d0390356ecd23e8d96
SHA512540ba26fb3ec33b2f56d635e3d661f9891eff83eee9e1f64c4481351effbb7abb06318cb6c505804ad5a2804f134c9c685704da22029792d75a424e66a331ac8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57aa66047d96a6ae8ad063c3a5236aabd
SHA1edb0ca2c64a08da6ea7fca09a83c61d1b5c3782b
SHA2561809224851d2e44501cc08a431ff051b50127456b5e029fe559e2696d8eac9ff
SHA512e3846f4e7dbbf9e86ed3b82235385408fadcbc7f5c3e1acae844ee5f876b5cdf53b2fbcf17438c428ffc8a8f95b8cca2b455c9004a666337a16e2ef31125d8b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50977b65b43dac911f017be11867514d9
SHA169686d894f371601abd964d415b36edcd6fc20ab
SHA25660b7b560589a36ed4e0b6eca46072f7c32dbdf4d495e6edb40d88ac2d2279a91
SHA512d1a6348de675e3185c3f176ec1273961c68f4bdb46275f8dfb20bbe6152bd91494a3da627504c17b9c8aae7d70a63e39610ceda4cacb8dec28165c75b65535bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5566e3d5464f26932d257ffc56b28a511
SHA186a2ec4103d3f1395670046cc18cf0922bc17db2
SHA256be455375e06022e53806d215db50ae86cf29a421a94eb8a431f6cb02165c84ea
SHA5126dc75f2e2d035fdb5b551a3529799569c16a7011f425f58def85fac00d400f61ed09e56e3b52a2ee8605d62614595433877b85e3796c68aeece5df2539abf6ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c399fca1f749283b5f7ae1840e662847
SHA143bf99fa14b372885810f153fb983e57c546be98
SHA256f91032acbae6b13b24177d90e3bf6cde2cc0d118de4d2f879f5b9ec0a397fd0e
SHA512342e5209dc28dc87ff00febf41e124a22670467db692db68583eec5b6057bd5dfd4cd8879d84431dccb695c30a93cba459a5753765465ca9325246dd5ebbb2b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516a393e4368a61025ba0a75726ed4bda
SHA1b65abea26981d11b33c0495a255c0e07765a98b9
SHA2560979599f60ad5e873ef198c0e9385896d8793d549f9076057657473b5d214a50
SHA512833ad06ba0c0816cc01aebc4e1a9eb4751dc62598513cd0d92a6a7e2cde1aac2bdeb3cd5f59ba5a05048eb363caf95acc2d40465cf2965d900feacc72496e34a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca1a25a971df64c54e12d6c0eccd98e0
SHA15464490a2f7a463d8b1b4108fe5fab7de4a40488
SHA256beaa9c3f1bfed8516c91c01c612ee3f744ff54d0279c26383b5826763d6c3ab3
SHA512dafe405b52e32f333b70e0b5e62251f4a02792983e058c0ff924766e61432545ee7e9211e0af9867a7c0feaff16bd372552e0ca6cfb0a28b223180ead5538c46
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06