Analysis
-
max time kernel
136s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28-01-2024 09:53
Static task
static1
Behavioral task
behavioral1
Sample
7cd19b16de5d92ba01045dc2d6d43de1.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7cd19b16de5d92ba01045dc2d6d43de1.html
Resource
win10v2004-20231215-en
General
-
Target
7cd19b16de5d92ba01045dc2d6d43de1.html
-
Size
254B
-
MD5
7cd19b16de5d92ba01045dc2d6d43de1
-
SHA1
3afccfefb56b79cb835b788397db747906a4ff30
-
SHA256
5e34c6e9dc5ea9468bf3654fdccf29baffb32ffd4f13ef60b74dbc9961499555
-
SHA512
1245f15a5319d8c5ef15805d31792c0cc6573f554725a3e7af19488ed113801d0f9ba7610b229aa1ed19ce8ee9edbcc1aeb46bcec4a837ffcf05fb740e1fa778
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2230CD01-BDC3-11EE-B187-EE9A2FAC8CC3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e917866400000000020000000000106600000001000020000000ead29ccfe74376a64f47f49d26c40d723b48d1fe99ad6811b7b066e2674f4a19000000000e8000000002000020000000812d6131018f827d0278b9968980d9f86ba0f9a8956718d8f8d748e06c2c064020000000faf8ed4a974cb747667181cd30edce4ee80d4e2a9f0de6debad4bd51adc7e299400000005ed14b53293d9233d66d7bfff7f0096e973c3f763862fd97e096bc2871f3490d445aaf3eff05b74c65c8b04874aa1d891b7f43c98499dce5f1e8812897797417 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0720b1d8642c344adb870a2e917866400000000020000000000106600000001000020000000ce2adc29f04d190b14d9742f7eeb343c2f2b2e3368c7d6624cab0b4211f7b50a000000000e80000000020000200000002cc0626de1eca40ed435033de19a2897ea089c7202e4c01d9955a168a12f9f9f90000000c41acb752d326a759a7e629853c11bed215493b3cb20228331558747ef92d46a685aacf8779908df74915aeaf76b6658054c274c90b767a5c4d33b3e7b29f0a742637feca7d6011c63a89d400fff3272e5beef4eff84fcad73930957474034fc99d9a78c1a641076083b48856eea8621e4e048344bea1926b1d9dba7544c99eb7688b4c18105493dd9ea77f2503199cf4000000087f52c00fe16cfdd58f344650c02aaf4df811c2a55c7b6da48ad97496451e9ac1a9d989e7ed72d5f8c0873817100b76a055fb58ea669e8aae0c9ed07c94dd63a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412597497" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50a001f7cf51da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2076 iexplore.exe 2076 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2772 2076 iexplore.exe 28 PID 2076 wrote to memory of 2772 2076 iexplore.exe 28 PID 2076 wrote to memory of 2772 2076 iexplore.exe 28 PID 2076 wrote to memory of 2772 2076 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7cd19b16de5d92ba01045dc2d6d43de1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aed154d1d427c9e74026231885e49f70
SHA108aa2e54bc1057a6708c0873d194ed6209d9c139
SHA256a576d3092b0b810bbf3b180a3d26ddc58636d754ea0f78c9a7190f82422dbad1
SHA5128080d66772d46951235e9b564ac0773892562d9f32a07c550f0b910a32cc838470d7595a18e725e858bcbb3b297987ed4cd04ba1f18142700607af11796ff0d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541fff49340d425564e92b61368e8cf6d
SHA12f5c467e205a1101d269d2ba1dda679fdccfb234
SHA256de616b683de4fdc0f27f230c3eab3acc8b36b1fdb48fe9a51537f5376a87b5e5
SHA5120f929159c4088f72e89299549de033bd907f94db7941f8928e3340b9e6b2df63cfaf92540df5041c88e3bb3247e30a13a865587b00729b20dfeeda6d2e211818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5687940b0c575f455a89372442fdd50e8
SHA181903712f63ffb1d822496a64b04e8e36752c500
SHA25689692338c00ca9c8d4f85f5bc61f655e59fa4fc81414464d44a2421caa24ac7d
SHA512ccc357e8a45d34fa27fce6f1e1db2ac0c6195d76421222585f56e7ddf79a5b44f81398e2bb07a5a3d1a71c51d2f06c15c4019c67dec886db968c5183ff551111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e9b8bd0dfef0c89eb11f57a670b275a
SHA1ea4bebe11bfba96b4e3bbdaaed63e2413c0e95a2
SHA2561aa19898eef79c785457a58e67fd742bae262771c38401741d4a3ba4a91c12b8
SHA512439ddc9ef7b8e66b7b219ea23295417f7c5eee2995499c7989d4e9717985a40225a34ba484d97a99108614bd077d8b3e92b70b70db5206b63a55291463d48130
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5299889a8d7ce6f84988969f327f6a298
SHA16672f3c47dc3e353d12007c62a6ec5819c7b8ab5
SHA256aab13704c0989f6de0164f1252b9ffab6d49a9d11e59a1a45944a1a2b74d80ef
SHA512b74101ccc2c694e3f72be887bb77d28f6aba5614c09cccba458132875deec9d129bfe0171a5b520354c0ba01fcd5d5c9fedb3ff438f12a47917eea0186e1c7a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b84d681b7f437369e5cc2b93344986b
SHA1aa9639b52dff631e9a46e955d8817f1e79b2366d
SHA2562fe82d6509c8721793597ef090d0f00ac004f4f8615d8c162b0eb2d9f0e823cd
SHA51228b91980b955bf5dfe83e6a510f624d96c61e5cf132d715c7e608b3cca1965f059a2aec76ac37b8ae838149cb7de506bd2a3e18dcd2948288bff1f81b3bf6641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a69752aa2dfb22002fc37728ae28e14b
SHA142b9ee22ea2ec3f7b67e4b4f688361fec377995e
SHA256cb64f34a3c7e478c5cdb3b174a0baefbd3cdcecb3f3ec7336f0f737fc83e6996
SHA512404099359dd9b0345ad519e3f0aa6af5f07ee8548ba4766185d728e0b08ca6c8de5422464e59112204df8d031a6db510100b60b44c23850910c934022215d65f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587c843504204c76c2e70505fd89b0812
SHA197d8001633189c53867c8558aee34023c0e93315
SHA2561e5426a230059a61731b5576084563e3c43c6a69fee3901c13b6b34a629f7602
SHA512f187a21b7b75cf70d2d552547b8744a975419e605b9a00c3b173564f7f81726ae3c976705623ba8e1f7ef3aacf2d989690ddd2d3fc3128fc7659ed02bbb374ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59440085687813bfe4537b79dca8fe38c
SHA1d22ec2c565842016374b4ebaa81bcd6e78216f6b
SHA25626f7fb77ce917210ce80608b44bd571d6d083b21d9a2af1af7dc729e8515de9a
SHA512dd7f9a7bf69c88d6b812fd1fc22ed3a4a59d74302776753dbe08498fd4b542c878ae22788fc76a4918a43cde216b41ea10747e3fe6a66a30d9be2fa6abb34d67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f9fcec43fc3bd161e30458eb3ab41bb
SHA163793cfe791d8a2073a8ee0998a4f01ff03a9424
SHA2564405306d81e2f98b628562faed15147c1cf0da77316beb38870f8d71ceb802f9
SHA5123627144731b125e43385b8156740e75a7201e7da9b888be756c5524026d838ee6050b5fb139075d017cf7ac46bce107a435650cbf78642425ab2f523b2e983fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52966c9cfb99acd9253a70e2cec7b298d
SHA10564d6f6fc28f95e6dd885b3c5880822129dd431
SHA2565d7007df9c0c565f2cdfd099080ac977b0d5e623b2a2b3832d3dff00291d2865
SHA512a99a3828f3c43c747e15760c8201f22d871c756b9c62abf6f9d5dac23207c87aa2c8b1cdf0558358b44e186eeabdda7334f06d8ea407fd235efee1bdaa66acd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568176a908d16feb0683be4d952de5c4d
SHA1977657050cd874ea37547b6cdf35412599eb63da
SHA256440bf178047e41b1b3f6ca5fe8bceae52950ffcc06e1834a61c786b6507af67f
SHA512d103157e4a7b4b269ff2270e6db4b20390df29ed6f98dcf8dea4aa876d2b5ef6393086499a3792d1216aeb1dec1e3f3e23b998d2568c57c346188761bacd3003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4c117d50e0671fe0525913caa9c795e
SHA142e5912e739cc906ff440afa0ba1eb323cce1910
SHA256326dce17bb1b8ae374f7e798320fcbe971df16509dd2ff14968e4c68afde599e
SHA512088d63859a54f257cec6395944d6ea54d07ff3f96849da6ce3362f160cb3514e195eb4225e579181e5b8757a059e6e9a22b0d537e77c75b3358900ee1359ee0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4aac600639d9ddcc37cfa8949d0a6ba
SHA10f114d996272ebc25b50eddc2af5e2d76e4e4881
SHA256562a22af32f9037630d94d0da4128b92ddd12abfcc700ceaa5ea3b7b90ecbbde
SHA512f67e9ca55359cfd1f8c185ec0b19d049e18436b324b29709176ad4ce8330a669fa3621320243eab931fe770a0ae4fb0ac159beb8e1831183a6c8914374ce25d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff985bf31e58343c35f0b97a46ed50ee
SHA141c9da2f21f09c023181f525bf1b07f3607eeeed
SHA256c0ac5a46207e02c989008c38d5912afce2abefcd57339629eba387ed4b36d7bc
SHA5122fcd3793eec4630435d47dd6b20cc81282180547b4dfa23a618b2cde4117f592d5bfe5e328136706942f012e66f00c37428c8016e7b9eb75a4111b0cd2cb7d0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580a16e4f7f28b47e19a1f1dcfccf07c3
SHA1f28b943878e4e6958c565062eaaa833f9660fa07
SHA2564426435d7ac9c87d4493cca6aa8bbb0746a11c8a0c65442230c75d8bb2355421
SHA512819079abf4c54d81c4e543349d1770c5d576ebf30af36b5de7d082600916e6bbc11e683a8c0dec71489ae2b844017725b7fd264a23e8fd919c3a6df23784ef25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5047bec089ed4f4feeaa89bfcbbb3d14a
SHA13e303cb938f0d047f3fd0037f693bc5469b67193
SHA2566d3fe170269a1f4bcb39c97a21e097878fd361cd33755c3375487799678e8024
SHA512b725e8310a52fc2ad33af8fc6ed45904971ebfb5a4d9c027b3b1ab35bc993d402062ae9499fb9f22db388d32557347836b23bbdab3c3446f5c108becdd5309f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e350307380ced75c27ccfd1ff637615e
SHA189dec75377c9436170ba3618a09296cda71ee1d4
SHA2565ce44005572d7521c117da03c80d8a72058db0d0f846202e169270052db0d7bf
SHA512831a5016a84fadf98271074552ac04f8800596a133bdf7e905291b0312af579c20443d0b37424225919a3cda7725dacd7dfc2d11ee9f49c7e911f8d98c1e5e54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5589ef8fdda0167c37fa41cc6abf5f3ce
SHA11189fc1935e5db21bb6d67d54b454d8af9b9861e
SHA256c8aad8a15c84e67c425fb105c247cffcb27aee56e341dcd25c875c59c8ce95ae
SHA512b04c1ef3f020cc4fa2506b3f2b0ee186264c7092bceb3fed2d0eb61723ce8fdcbccec270b990973f233c62e896c9c1e31e76d6eb5a956cffe5cada6eb2afdbc9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06