Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 10:27
Static task
static1
Behavioral task
behavioral1
Sample
7f9b55d94f90e5cbec5dac174828eeab.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7f9b55d94f90e5cbec5dac174828eeab.html
Resource
win10v2004-20231222-en
General
-
Target
7f9b55d94f90e5cbec5dac174828eeab.html
-
Size
12KB
-
MD5
7f9b55d94f90e5cbec5dac174828eeab
-
SHA1
1a3639a9a9b502c854326f6fc40fce04c6efa9d2
-
SHA256
3d031c790a30994aae7b2f2c085e1c3bb1c25b8365993665dfe9e5a44fbf9932
-
SHA512
61846cceeee90c3ffcb8fbcea51aa1e6e22221326b3366ff0cd4f499e7bdad3966b99e4cc3f1fc62e09765e7830ee2935eb7c8ee1d11255586792e6c3052ebef
-
SSDEEP
192:seqyXgeqyXkPP1v4AdWAG5iBDPQqop+Odxqnqxp54qU5UA+c2:sLnLpPt4oWA9BDPQqop+O7gUp5gPh2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000046332ab722508540bf00312f0a24f120000000000200000000001066000000010000200000006a5d6539e853dca7079cab887623dc193bcd3cc87cb307b94f23aec056a7da12000000000e8000000002000020000000ffbd82f63e10816c163905dfad4c41ad5d966c3268640fccbc99f70977f79cd220000000f4a217c459d2bcffb16a32cd055214399c1166a429f8a89de9a2b13e50040adf40000000de16b607ee90807748313cd34efc326e7716492d06891e9eb8ee63f3c41fcbb25adaa571cf5779034bde93817ec6300a4c648206b6a121cdcefe3c27533fb619 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0C6B5C51-BE91-11EE-9AB8-F6F8CE09FCD4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 409c4de69d52da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412685935" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 1584 IEXPLORE.EXE 1584 IEXPLORE.EXE 1584 IEXPLORE.EXE 1584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1584 1732 iexplore.exe 28 PID 1732 wrote to memory of 1584 1732 iexplore.exe 28 PID 1732 wrote to memory of 1584 1732 iexplore.exe 28 PID 1732 wrote to memory of 1584 1732 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7f9b55d94f90e5cbec5dac174828eeab.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD522480c9dea08084f031c51e803932ea5
SHA1adfe1bd1a684075224af6378cba7ffe16f66e807
SHA2565676e1fecd39b43dedc086ee3eb2dc4c901209fa172e9e8c5d503a02f4973990
SHA51239546965928b24171f3e960b44f66b73a44e10b1addbac18e177d5c6ffc7c97e28b443c5e66b5450afc78cf5d4ebd8f9f9508d9ec5b84e870141efb4ba44f7c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52068a38098329cf8babb5e8dc65bd539
SHA1ea67f0a3a6b7948e4ff857313d2fc88c9b1afb63
SHA25673b6bca212f0b6fae3aa7399fafae56af2ae480e53d4c0e1eb21cbad5c4e7dca
SHA512302be011a40500eacc39cd56e1316f20913407ce097ddee0b7b16040b69937be61634bdb7365e3a5328a86d8e876c9acdaff44bef39af5e2b45c1058ab311b29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb390e799b078c527d73af7cc6c82ed1
SHA133382c4685da30f5c5339b3b13f86f0e1e4db0bf
SHA256da7a81153580294e4967349e57372732ededa72d9ee64b9c186ecdeb9427733f
SHA512886e398469304f339e1c311644474f05363afc85a6b506060b7f9f5452dbe04a4a3290d60a69d9c4a38db24deb2801810e96bbb8d5f1a76bfb0341ccc8a5c517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de542f2c9839dedc883bbeb4b198c290
SHA170c958c570a3095f353e24bb9472966e822ea549
SHA2561dee2a06929a39e8932bf7e0828294fd49305c091e06f8e29310766698c0d400
SHA512fb68208958329f5cc0d2068cca27863dbfb019e8975205afdc09b76a2017ea559bf1f172784eaf7e04f6504a1fe14de3e0ff5f5095c08a918f1247e677862223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5f91b1672b69070180e463b3fe280bc
SHA166966460d7dac1bc1667c157c706da0a27352027
SHA2568f41f8fe29d41ca145cecf1855849d0d302652df1e96de8d3b48c36d49e521e7
SHA5121433504ffa555c680b91dc118098de20292400b4921d107a54376d290101acecd177ff4221f7d1d0a496b16bfd92df64892cb27e494e2ce0da7afb19e6179f13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588b64854eb292f3c7c6f5d170ae1e7f1
SHA1d2ca995d7d33d80405cb8380ca1be7c66c1d5bbf
SHA256e70e9ecac5049200c3956e35c52927bd6b35f539e82c756b3d2dbc3e5ec486bb
SHA512d8fa9fced37ac10a104fdb8646a9e06399e9c0c338bf2ace5df68e1e8dca192f522b3e953b2e8d63afb936f583e60362ef47834626ba1573ef05a67fb8f779bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f5108f982ac23c3527049480536813f
SHA1ea5bcf764beea96a5c67d4affcb3fbc2bc39454f
SHA2562f781d486c675f371c75f30af6bfedb6c7c82ab1c476d232fe3fac58b772401c
SHA51260f1b82f67f8101e12fc725293b9551f53f9c085c1f82d42c729a45d4a962c62da8798fae103b49fe4070589fc0f77414405ef9ac72777d06d36ae0f8dc9dcb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5375a00eefa80973ee15d8505601d3ed6
SHA1df81ee29ce6b4378822928296d540975ae9f17f6
SHA256a41f25030702e61673c9294dfe2bf75948ff41f572318b9c122cddcf6d8d81bd
SHA5123bf49e9dc04ffbc32ddbacd2238c3fc76f962a6aaf38ca3803294f247446dbd207f926c105048d1d339556bf5c38eb6f6c9835c9622edd20282103ad10185073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d01e85671ef8364f5f7ef8b4a2937250
SHA12df26444d5aeae5d3908c5de7e420ede4b6fdaf2
SHA256893ae75ad23e4be3ddeec9b2a3c4e20f2e4bdd861904d426aa0e641996fd80c8
SHA512de4d1dea22c7ed88fe0a3217280c3829b0a4254ebad984b6f90f64f903994dac1b5a5acd9fb8e42a23c5722e548676dcdc62aca368c4e3ce3cadeb3a7e3b4f79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d97dfc0a93b625d50fd3b643564cd1b4
SHA178dabd755558c1e518a6221b857073ee6a7ae561
SHA256d6ff6462659e0d9084d324a52db6662d946f609e1a48b028ad0371999287a6ee
SHA5123cc8965ac2988bc4b6255ceaf203efa5c972e0a68df20450333ea4acf1da62f7535ebd0670eef8c78823756e5d86617335fcafc1585031d6cb5a310414010c77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaa76040300a5bf7ba6fbf603f8a47e3
SHA19d6947056641f3ae3d467dfe38fdc0d86edfd64d
SHA256fecfd2febb94cde83b3063919998ff6c58c4f302bc317537bbfee08249175a04
SHA512e002188e44ce58048198b88a8f95183ef0c6ebca10987a9c10ad80376a84f5deb1afa84ea1f39bd74388cb7ed4838de5c4cc0351d6226daf3e797f2e6af66afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc02acecf6968189a08697cd8271b4f6
SHA1f3aa937cab6922d7f19e5f802a65e83850ba8aa5
SHA25675d023e2305d28b8d442cff6b1c980da1ed709794a7baceb337185219a1b551b
SHA5124829e9dbccaa47b695fddd948ab064ec894ae3e8993f77bd7d433758e9d970aee7b175ffe19183e76c654ac3191eb0fde98676042b8452158d7b92de2f03da92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5fe1b1dfb05e146db0fa6aba6d2b679ae
SHA12708520ea725fdfba79e34562545935cb99489b7
SHA25607881c8d658fd7fe2548fccc617d12faef0ead52243aa0de3cb3eab9df6a14fc
SHA512b1a691e68a555e6cdac2e1f8573c26070869b7ee4c7afd0ae83fe33e5adad8e10719685c0d4c0ac60f8a5f63418e0bdcfb5fb6ca060c553afe71d6721695d109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06