Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 15:57
Static task
static1
Behavioral task
behavioral1
Sample
7aa9ca64e6cb0d22e25570deddb330f2.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7aa9ca64e6cb0d22e25570deddb330f2.html
Resource
win10v2004-20231215-en
General
-
Target
7aa9ca64e6cb0d22e25570deddb330f2.html
-
Size
203KB
-
MD5
7aa9ca64e6cb0d22e25570deddb330f2
-
SHA1
e30e4b7efd5bf509669dcbf8f845aed53fe4e653
-
SHA256
bf985706a0c72ab47b1b62fa984ca115d564642e4d1ebb318298ab2cba8835aa
-
SHA512
3c1433787d34e825ed31643534e1de85c40a3068c97c62d2b9ed6a88e6f3f74cc2764fcd495e06430d6d3e67cd1358d9ddec90eba888abef1f2b440ec5ba468b
-
SSDEEP
3072:HHQ6xzX2yfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:H5xzXzsMYod+X3oI+YS1tA8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412532945" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000d5d7706d8391c893dbceebfb94bd011547683e879cf8fd120baad4de0133404c000000000e8000000002000020000000385858414f01b6224f1440c4fb5f5d6ba79e9ca0d77b84a0ae9568bea8093c9220000000de08ee0069731a35b34f7116c6c399126babb50c7bdf3624d2da62a5ad858bce4000000034da98642e3e9d204703b5ed9a16f0b2b00d64d57ca54c42836c05cbf85f969d62af4432329a211a6dc9032af16450cf1b30bf67653715e2a102e4dcb3d203da iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80cf4dab3951da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D6A592D1-BD2C-11EE-B0F5-76D8C56D161B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2536 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2536 iexplore.exe 2536 iexplore.exe 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2216 2536 iexplore.exe 28 PID 2536 wrote to memory of 2216 2536 iexplore.exe 28 PID 2536 wrote to memory of 2216 2536 iexplore.exe 28 PID 2536 wrote to memory of 2216 2536 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7aa9ca64e6cb0d22e25570deddb330f2.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2536 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5240f90490dad75b35c326ab8cf3883bb
SHA133e4685dd4bc9b16cdddc88c8998bb609d455a68
SHA256871dba7d0dc4dd50a0137b2302bd34ce8158b471b813b5131a4cb991f50833d6
SHA512019768c88ba03d4f2113a0ec8ef4283a79b7a85ce8e66c38fb4a0dd6cdd0a6e542be7bc6fd297bd32d199186d8eae70e99beee08a38d9d43557df2f505e14d97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5292384605477f8c3cf4836d60df52611
SHA1314aed9475b67443f6b11102c82a14e4ba5a51fa
SHA256e7df9032ed95c10443575a2f35749c5463ea47df211760e02cd6780646c1ec67
SHA512bd15577e668bfd9ccd91f29626a35f77890a2f595b1a0efe29aa159604719004a873db98d2138b6369c6ccaaaab3ee616799571da3d502c95a6a477af7f57e67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c875234aa50224e2dc6f60fe056797b0
SHA13b982b97704ded60772668484b1311a5dcb2c123
SHA256b7044a69a732fff8f60c31104915de88af2b6575fc9cc87853c2338adeafb43f
SHA512da23a2ec6b96b75641c828abb2dc52a0a5dd7fa43dabced66fa00c7bd9aa95f29d0132d298ade6f0c18d0c81943e6aa916532884614f9c4cef7be706a78e2fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558c87789bf01d58597c85c95374a5477
SHA12de23d836e002a241a9803c068c82c8e093a4983
SHA256578fa4c15df6825fd74951d9ab23872abc579d16b9473227fd81164f863e2f3c
SHA5123de1267eaa7c71df67f9e91a24f94bafa4487ebb6c2fb1b0a9219734c65068cb869838f7114792ee78ed621279da1be5ffe011877df4bb6b1cc903fb58c77ecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f77863e35acba2d1078415e04d951c03
SHA1abff716f58059604f268639012031db2c4dcec9e
SHA256732ca8661cb8ba5fb38f35c03d696270fa9bd60442059854a844c939acea5f92
SHA5129011ff12d179112fa1c45bf86f3df13004784d597bc95da33881857e7c1ee8ecae82e8f7e233fa9004a4d7e64da8163b260262fafa3761e25e6cf368c384f96c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f238e2500bf0cc894239cf230e3b5316
SHA1273ce691f99c0e73945383960e30dd376d8d4b33
SHA2564692bdff622c29ce828b2d387ae2bed4128766775d36da531dbddf8f1bb073ce
SHA512d75193c097914eb37712f9ee9874980cd29a84470127470edad081f13b33e49b4fbffe97546ed3094f124cad0862cea80395d89d2deb4ede68c29fddecacb430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c5c67953b4f618bf51846206125dfef
SHA16986e2a27435a9c1e7760c4c4708bf11744ec1ee
SHA25646b8ae6726f3ddfaa6b0983e35cca8fb4168a93dddd217811f5122f221d70a08
SHA5124a7b77c8cffc6b97462324485b1ffcceeef74c58a4051d34c852afc07a934ff56f63c354e9496e384625a2795d1b263547da10a84c6c785d2fb125c67f83f210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d82172481fd2990f8bc1df0cffb678d
SHA156d4a5a88820792f82b9f37026d4afdc6d3aa3de
SHA256e936576a6415fbc3b442581a93b49fc44f9dec72233090096b4c463a3fccb3af
SHA5120ac8f684896bae1ac674c422deac56f25aa5a325aaa052f2361f65bc86944527e1926b1307518f45986e292cf79abc9a09d772b26a4fcebb3be69afcaaf401fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c6589c2c2c10401a969ad68a12908bd
SHA1d4e60865d43fc8b64d7457a3905f77cdcc5abb81
SHA256e9214a643ae911171e9a3bcab24880e54e4e451f89f4763c92bab581c32d42ec
SHA512fb95fb6315d45299ccb67b76c7d49968e37bcebbeaa369a940890f2206282602869383fe384a276087f1aa15cc633ef338f57327d245617b3e4b2b042b35ac33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e222567b5ab55028dc0a47630c75f9b
SHA186c0c6920336523bf2d9f923299b2e1587768e8f
SHA2562c2d733fda3c43a0f2f575ee8d0ff7c586fce7ab26140eed8b98a294ddb905b7
SHA512b311f3d67f839a8068a3dff0aa968c2f91952740393b51001ccf8557da830c886abf0bb1d51e578dbeebdb4bbc989cd4ea06b0545729a1955c87b0a24cf0658a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596840cc36f62a71e4317cba9090fb36b
SHA1f6b8be6d171868966807d4d723191998e9e400c4
SHA2562820ba5735f046b2cc21a022cf317785c697aa80c7aa2aec4c94e04332f06022
SHA5129e376690a9c747034e55bb25395588ed3eb88a5174cc74cdd93ccb6ad357fc4ba8db90c01261cf3691194583686ef25172bd20c5e3050f6134252e31bddd2e4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50284b6f997f633321537458a43e531b8
SHA1398c5c098fd038dcbd6f24d4587b032ba650f640
SHA256075bb6b48fc892becd920d6a5ea0d520e531e0d8c779625708b7809fa927a886
SHA512882f4af0a36c500ce03daa94f56c6cb262f4c129fff2f58b23909b8567401b4bd2bb4dc90e6b72c86b4eae425b0eef23087788cc5a04de40c00ea134a6b712e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c1cf09e69a879b3b77bab147e3e97f4
SHA16e883708cc4af6df05f46af503583022864e2536
SHA256b7d130b447d1d24e16c31d4e359749878c598c221fd7da02a19eb1ddbc94f272
SHA51233ec9c113951d0ff660e09c2c373cc638b899b30e40f13f8485157096e21512c31d19b16fea39216a3904fc0b1b45bb2a87b8fcb999ccd2e4eded2a5ef99dd93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d9cab5f7540c59eb6a4ae5eb9f314af
SHA170dfac103a847537899c48c0a2a433f5e5b90a04
SHA25678ad11c52c2725b9e57a42b62e55e0bf4f9427006d98f5f3ba9eb21b7b14e8f9
SHA512f4996ebb706629b392d9427f98389210f222737c4834d11aac404d6ce53c6110eb14bd5fb510b109b71606993f310e4542956be6b29e521121266284aab3733e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52283f3cea33d997563ba581dbf0de43e
SHA131e1b525c8ddb1d230639b4c24b6da6f57c3accc
SHA2564a88a4d610cee1b2779c8b9b0741c38211a2d59435b48c5404ce53558f3942ea
SHA512dceb1f5d07ef624b776529eb9ead89b16bde1c7a2d6094d7e750a8888eb8bb827df5d781157b4ca07aaaf39ae78f035a2c4a0e7d2b945e74d9d0119ea0b0a4bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd379d64a88339c85fc9b9aeef47b799
SHA19ae5d231992ada2833424a0de1acf02933656e38
SHA256f109432659b850fe3220a8194502975ec27d413e1244f7291780dfc20ddd7456
SHA512fc4fcaa447e9372ffbbb2d479ad30b57d0c6aba8abc3c4f636a573db67c40ec4df95b5aee39214c6c49903295319bb5a60982da763eaeed3da7b62f2faffc2ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546bf24c644368c1f6b31f38dd63762e7
SHA18390c69c1d03f9180e8ea5da759d747c8e72026b
SHA256412da4cd23e66493a78d7004f4c92b81352ee2d249a797912b084b0b3b151626
SHA512d75f17d333c9f5aee1b8fa1f9590adf1c8bf895b30afce2cc97beaac51bb2106780d27dbcdd3df24b8b5fe1e6265d07d6b51caefe98a6207353ddc3b7c98fe27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da5636471f8ab453c89fc3eaaa5f5030
SHA1c800465f086635fa220dd6f374a4cb9d4e1de96d
SHA256f94a5da6ac9f4b60e7bb0a2b483befdcfe06104f75a29b9d0b6eeb501880178d
SHA512d8a3b0deed1bd3ae1895347b51040ea5269ad19c29d73a58c5b8a628ba24dbd52f660408271d3c844d8d94f0a306055256ef2a882728934868d1050198836937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1b850f5e78ed2ed9532b5182183abb7
SHA1636dd8ff1744f3a25d9c3268bf858dcc9392dfde
SHA256b848f9a9b9ab3bd7af0c4e7cddb0e96387a217119ffdf7b97102a3bc0c5dbb0c
SHA51208b7c51f6a0c710f67481adad21a0878d9ed4681af266ccd1fe62d91f5454e9add8819a512ea4b11fb2ce0bcc6d1d0a87f0653c83ce5d78cdf7318c1270760f3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06