Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28-01-2024 09:52
Static task
static1
Behavioral task
behavioral1
Sample
7cd0e8d384c6126e1516fb45940097d3.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7cd0e8d384c6126e1516fb45940097d3.html
Resource
win10v2004-20231222-en
General
-
Target
7cd0e8d384c6126e1516fb45940097d3.html
-
Size
1KB
-
MD5
7cd0e8d384c6126e1516fb45940097d3
-
SHA1
51c0a06d73e2f0b3a8aac6e7021ee09ce0c2291d
-
SHA256
c6fe1d97c5458af6b6a5e31430164c289bf3166e8be3356d007ae88cd953af2f
-
SHA512
99e8c30f2a60723d489f892fe7094e66d90842f2791206ea494c7e656b3f8dba75cd5a87599cd069e70022a72804efcdd5805d1d75568911fb5c6680719bd1f4
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d60000000002000000000010660000000100002000000023859055502d8d2b93f2cb29c26bd396fbf007679cbc3804944a6a3f5d0e0e40000000000e8000000002000020000000033e5c375052137a2f41f203c0ea973ced78e32cd296fb228f67a130e4b6d687200000006d97db1b65701c6277ced0409b780092d5d36c95ba84720351fce5e49b7f8e5a40000000c67d821d3934af848c11a8411a0196a547de5fabd590992d1f9b34bfb99b83b0235fa7e508b4779cd18a769a15ce4ae22436f1e031bfb7ee7d32b7fb3e3c75f9 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412597406" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EC6AC771-BDC2-11EE-9BAD-F2B23B8A8DD7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07630afcf51da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 1160 IEXPLORE.EXE 1160 IEXPLORE.EXE 1160 IEXPLORE.EXE 1160 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 1160 2532 iexplore.exe 28 PID 2532 wrote to memory of 1160 2532 iexplore.exe 28 PID 2532 wrote to memory of 1160 2532 iexplore.exe 28 PID 2532 wrote to memory of 1160 2532 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7cd0e8d384c6126e1516fb45940097d3.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ade68316e6d05221eecaf83ff9eef86
SHA1e109af4fb4d94e63f19596f54f4ea9e2c4fab40a
SHA2562d8fc3f13aa2031bad7ae58dff74efc27a725b88caee98454229d9d053b00214
SHA512a2992fbf987a38f92b5cbef7e9c270ea9bdb3caa7e22814e6891f42a4fa7d997a732ac1e8173a2b9bf7fbf47323558a8d6a89aff55e8028318a71924ad8d8010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ee7f4a499151c16fb9ad141086f85ad
SHA1abf0bde5818d60e46358a8be814b308bac33949c
SHA256334d6f92265e79dafce42e19d136c7854dbdc8c96b264235e16541824f2b050f
SHA512892f44e51b967032a420780424e8d21c902ffd2629e60a1ff8bf03ae899b059426934e4b9879ea8ab6e50c4ecf8a3189560fd6873ca73519c840c13aeaad7ec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5863298e4cd5ce10110a1e366cac74cb0
SHA1b6162dd787301494ce62bbe2fac9b0dc604c4f47
SHA256e86819aabe6189693614fba63a0d64f49c1a7d67dcfc299314d3f45cea30365e
SHA512200c24d81d912e94ac6a124b6e13854d5182c42b9a65ecba6f73bed0e14cc22fe4b1ddc269d3a234ff76ff5c030ec08a1033de79e4702c17ec225f5868711c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536f669d6535c9b9898a5fe2cf0fd4218
SHA13c8a0af6c541708ab66b8597e34b4b6d7e8102f1
SHA25657a5ea83962a58ac71d848310e9cafdf777efcc3fcb823905e38092c00b51893
SHA51243ddea663fa58f44ee5cf457865ae47aa4dc7d24beecac4532e3e9aa45ba5ac5e086d6d5ad7bca2d4b20a607e151715f610f7ac8d3c496fe23fe658b261cb7d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a9df361c03ab051e9439c577947dafa
SHA1a48cc66977cc5730807b759847c216e3ce6666b4
SHA25695ab22eca9620f7a52b8893c85546d4c7e1418cdbb9f05672a2d14f84d617105
SHA51250faafe57f5fd91d541a30c4e7e06652046ec2d08a3db81d83766b81ceff6400db79cc09089f9474312429242f332746097603be7c648bfd0f69ee3c9e1dad04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5881667dbc76b4b70ab14e5e8e857f734
SHA18c848f60c793855bb498a54c23da83b7bb4f0bd3
SHA256f8d898afb08843011812e3c0f67f6bf924a25e57e1cdf6c93fcd86b1192f4074
SHA5120b2ae00c96012d05785dd4c37f8b3bbcddeb95c4dea7dc7f773a9977f982d41ecc397ef4fc17fcf0056b08209904a6bf9e4e4ff52940cf0d9327070b11ea3fcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4a257126e0462d011914340f3dc0b6b
SHA1bf6a5091e0c22538b6f4cf08bdbe843fedc7f510
SHA2567a4b0f1a3077747be615ac065ac2bb4f4549c6ceea214755ec2d44c490b36d85
SHA512b7ab5da54d92085af181253c9eee54cd39a961b5de9607bf18311f0fd22a653c001eb544c248bfdb4decde79790082a43444440b418eb73522ab1781589dee43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5236d5f1745c316de5593027d8cae151e
SHA1fcfffb74dc8f92e96102709a4938a2d592f63f1e
SHA2569b9c3e907f4bbb379af1c11d20d4a2daa00a0eb9034643b47e576905a5867bd7
SHA5122fa294e0d328725f887035b10c7f5c018cc5b4be6712f596b69a33a6d821719ee83069523723081a4ce6842cb96d8b56cf198831f31976caa11474dc5a554582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555240fe8c31cb9750722019fe38873a4
SHA1debefac341c7eac641e897bd94e99bd467f606f9
SHA2565f937131c1663c84110999f0026dd82e72a01ed439dde9ee38bd5765d4224924
SHA5125615727d385a38262af93869d550e3ab327709f432ae46fc8021b85c916a23cc198a874a88b8fd295d513f247c0d1f5dcf1fe47b33ecc46961177fa84d71d9a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc9101a79fac71c20e2878353d909255
SHA1328f8e66af03a99f5bcb0257b995bfb0a319f753
SHA256d1bc47a23151e79c9024eaf0dbd1dae688a867f35c1b8c810f9031649ca729a9
SHA512683bfa031f8f6c173b4cb2678e36c2bbc475e3458421305e4571423611c34bd2e15cce6413fe70eaa5a60b2eef575103834a92a8bcfda9e740e46c1004efed49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b38346b5b1485afc4c06acb095116a39
SHA1480ac0dbad5199dc5b999614fcb7a6c6cb623e8f
SHA256324f763ea9c8a045cbf4ab1a812ef0514820616938e937fed06249a12f9d4fa3
SHA5120fca905ea8b1805c43d159b8fc0571a4324ec54c6b7b2b92deb5c7ba7d831f60ab8aa0dafc1f09cdb339b92e87388ed7092595a3759b07a2cc126a27f76948a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586faad2078b5ec9062f28ffb0094e686
SHA1454a5fe8b9a24dee850723ac4768bc8520cf5560
SHA2562151844ad0d0b8c052263f68367a4af28034b073ea6a6efb7253b0eb52f90e62
SHA5125fcb44aa108f0d5eb0f3394d94cab6dad8d36290001c322fd6cfea281b8f61af1d652e6bd0ba43388d498ee2570066af95427f2bc09d99b7cfda1d051555e002
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dd8ec7e5b916e8a49ea9d7b0a534e2d
SHA12452d562c31e5631d18401d7898f66f901f0873a
SHA256c7fd92584e1b3b5492d2ee513f28863a3ff02689f8d01e6e1b677974f1dc330f
SHA51251a9441583a32a57b24545456b65241a7fb9f2a4df6a17298220cb129389ea0823838044ceab93990526ffcc188e391f2a65afb3e6ea2e75eeea7f49fc5e2ff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8cfa7da7ff2d86b1b40a36022cfc8e7
SHA1a0b2b97845bdd8e8f9ced053a7a456a31de493b1
SHA256e5da300fb6d8e01213535f993812a9f7c257b1e685f5e6b640cde4dac78609aa
SHA512d411a3b29b482bded19bac9c717890a01929b56afe6feed82e683147f1ba02dbb8846bf5f86e7aa21eb66a968ebfe762aa279801e62d7b9df56adaf06002ebb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5096ecbd5a654ee5c448de73dcf032f1a
SHA1457d373e0c013eec6c0e511c6fd79b9ed21fa3bc
SHA256608d8a31e34defb1e515b04f8e3aac9044e20659071644a3d81055d16beb0abf
SHA512bcd6bcec0fd4cb3783f98f97f634e663618ed87d087b0de43976eb1c1cd0f00a56984d064b919eaeb6bdb7420c454408ddc7576bebbc1b8f02ec776e9dbadc07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fd2ef13429238bc49a0c0662f7f1f19
SHA126b03008b3e170cd3d05b6161b6489970ffdbf72
SHA256684b8acf3b119a1277e86dbc576a5f9039c941c3433a4a8ec6b45e32f6461ea1
SHA5126fedbfc1ef62ca8a30809b6c1640680d5d076c0c4364529964366b4a2aac1f9cfe4c1aa292a6964284ea9525091fe98f68ab7fb0ade86b97ccfbcdd1f83bdfe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4e091c3f433b56f3f86ed70a2f06170
SHA18d38acc63d90ba90b7f0bcf765d14640c780fdaa
SHA25678ba9646aeaa116cab38a5da1c619b63e91bce6af003210a53a5e960311d4a21
SHA512c7227fcfce27f31ae9e93fb5e51d174ab9f3ea6fdb67752a835ab13587d9c6e18e53a775aa53629eaf9998c8bf6532e2d5cf81d0da8a13a3bd569da8321df89d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d394f653619477ef4cc7fdc7a4083393
SHA14a3cb2d8c872815005a6227fdf93f3d8b85d775c
SHA25662aa4ba5d650508a51c583d2c573bb0dd9d66e8479faa6b5cefbf40fd4f9d0d6
SHA512a3aa50bda45d94473229ad5a784ffdf94bd5199057bfb951f081aca347ec1d18e9b5ddff8789ad490b337815f3d6cd78ed52f39dda5aef418ec6f7276daf8269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594cbb51e66ed2895176c139b07725376
SHA1dc716ecd095cddf18906c2043a82a8643fafe7fa
SHA25651c49c587beb0ca1f31fb6bc8788c9fb907c7a96dc5bf1b36b32d563c71ff2f4
SHA5125dcafabbf84a7de1a142524ff0f12e691613af4fd3077cf5c5f8f0ebc268632a24267b903c7ab0538a64706ab2af2b014f0e835093db08a92d404fecf97e6bfa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06