Analysis
-
max time kernel
137s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/02/2024, 05:37
Static task
static1
Behavioral task
behavioral1
Sample
86116eec37a0cd597d3c0d25f743c047.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
86116eec37a0cd597d3c0d25f743c047.html
Resource
win10v2004-20231215-en
General
-
Target
86116eec37a0cd597d3c0d25f743c047.html
-
Size
1KB
-
MD5
86116eec37a0cd597d3c0d25f743c047
-
SHA1
225febb94aa2d3d181cbcc6b90fe5e1667c5bad8
-
SHA256
a94e102a229cd1cfeba10cc4c7b763f60ddeef5e137c2da920e72112035ccb4c
-
SHA512
44f9793915e098568947f55c4cc168d51af6c943945f9e2e4a0bec2110d422572b12e7c7133a023247d842671930e7478b9005acd15a0ddd4091d5634e2692a5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412927706" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F66211D1-C0C3-11EE-B696-EAAD54D9E991} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c00000000020000000000106600000001000020000000f62f4d71a461ccffd85e1ac07ec9f6ebc883be044f433ca7eab84f49cc36a2da000000000e8000000002000020000000dfe48551b80a987b7a98b0d129fdcededb562d6143a0fc06f6a4c9128f008c402000000020cf5f31ede50f908176ee54427753a6f724ff914702a8e0fa7ee9063f6afc194000000062604fc80393ffca11507f2fd30327b1ebffaf34b16b6d29988620f573649d4d2ad15b2078e53795bb4cf20229ca451b19aa42e515b228300dbeecba24b87380 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c09695cbd054da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1264 iexplore.exe 1264 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1264 wrote to memory of 2720 1264 iexplore.exe 28 PID 1264 wrote to memory of 2720 1264 iexplore.exe 28 PID 1264 wrote to memory of 2720 1264 iexplore.exe 28 PID 1264 wrote to memory of 2720 1264 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\86116eec37a0cd597d3c0d25f743c047.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1264 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553df255087954e91a38bdd3bc6af37fb
SHA18dfc59d8c701643e92d4748ab96ab2268bb99c96
SHA2562ba597b000e8a77daa6b8f237f31f2a6c6a98e5db05d3d3770437e1e2f3d2f88
SHA512cbfc66596e0dcf762cd928575aa7795e7452f042862eb624699231e4e833747f0a23bd68771ab7cf3fcc2419660e2a074d8ac4a46fa786dfc6119cdd8572f137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8315107f8379822c6ab573a2631acf3
SHA17e19f3ce039a7552f96e55e9dac2d0512853c839
SHA256415c9a0de509e25ef38860eb41b11c3debfa5ff0ceab96181480c04afaa1a71c
SHA5120bc838b9b7ac4a268cf5d2f91e41f05c3cdb8e043d3cf816fb04bb9ec0b45785ff0f6bb15e6ce14c591de44f7cf3ee00afb4dad89521dfb846c131f7ce32efaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561d1e9c8476a4ee11f25531065df4876
SHA187c1f2061c83ecfd6e8971dc441395cdacd78917
SHA256089a93ee4d3d241a7cef16314aca11909c4ca6bd48184fa8fad42ac9d955e54d
SHA512b41821aa4e5ce973d110cb0b1746eaf3f9404c8a7a11e4e65836c29661a8ee3c9d23c186dc6a53e8896dd569c8941a0a8842b0ec849c28adf0e67cda831b6671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c7b199cf315152f8d7afa624fd317e5
SHA166faebd028f2a4367d55b977215f02fbcff6af1f
SHA256902ac977745b0f5a3718db61f20182325f74be8c93c32c3a84089b9c0ef09259
SHA51226b6905a62fb643a01b30c24e6f0e6308a2ad669cac81edc4bfc84b99822e11087e360b554980863b0f0dd34bd6302efc626479a4ca878d98bdb4703e48ef72e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0de4786ad4d57bf405864d2f4495b61
SHA114f6f05e6b5076398b2405f8b2f03af276b00ba1
SHA2563bb480b5ec1d747f0f62921d8286ce3f1045513bf55bdeb22f6ece6070389845
SHA5125278ee49af83060ef807b61d6b4dde336d826ff039b2ea400964a00ceb43849e0d0f94ffe6c6661772c2b26696fd42135dc2b0ead30bdd04df347d95c4807320
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558d5083375b633198f5df168704b194e
SHA1bf2b34bef13ef14e9973d3e873a896fed308d656
SHA256de092fde0b22dc098ea579bc82eefcbc3bd5b4040c21400d1d1fc4cc5c2af918
SHA5121568854e55cf4ccb7862326b1af60d25ced3bdab61fa743a12224b4d4353415b1e0dae1c389b23f8b635a15774fefe7d49bea5eb39c2c96de04759a6eacacdcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5932b753a08dfd67736275fa345e7320b
SHA1dda6827eb49849ded4927c0aadd52922288752f0
SHA2562cfa6926fcb633a5806cf701375a7f57ed4ed1e92835ca69f0429e5029f695d0
SHA512fb2d9f79ab2a2a29acb3e9c1ec0e4df28b779be44e20b91083e7e3cc3ddd0ecccd9c00e554c5fcaeef2fbb159b2494a373febddd9bf6d933e30d8efd8ca7023d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b79ce7b534c6fc06cfcc095388bd000e
SHA1aac00bf4bd5ad54479abe3bb35f5b537299af4b3
SHA2568c5b2a55746ee0887496ca1426f784889b01d67cc6bb01e4a7c439c79b81416e
SHA51219b494103fc866044575e7fd52d7baee916c050159e79563f9080ffe75c59ca64a1c08216a2d6d45cb67bd19f2ac16924cc1181777d37f42e04f30402a9f5731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5853f7a6b6e9bb825546f0d6949fb1d64
SHA19cd8c93903c8b04821be0553455f68cdbb93bd7c
SHA25642ef228313b983fbcd1172adcf48790017322ea7c697a887c7c381890d285ab7
SHA512a2adabc0d807f2fb66f193eebe9754d57d93548bf43904066de4af8c529293c2c3c8f44d30f312c505ceb5475d42280506cc9a1b665d346236aa30cf3d655453
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590063e0fe040fb67c23a3a691d44894d
SHA1e833128c9672182bdd5b2563f2bf593b69e229ff
SHA2569e0665363f440cb8241327497356661681e4d0de4cf5c52b0576e1059b65b28a
SHA5122fd900851db086a10b12ac2e47b66a8690e2150873d764a650b6d8d6ebe4afa4871b130aa4a427da86d89b02ceb5874b7f299211c96ccf81f172bdff69610a6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5801f1d019f89169c3a2a19a0e4db4e7c
SHA1ca6a43556205a5ac70e849393108e01ca93b6852
SHA256ed73565789cea59fc2e3c06cc6321fee4b1f507c0c30c56211893afc296c8c65
SHA5120ad9eceab3b758a00805bef11c92dbdfda84e2c5bf8d757a41352e2b85abf600c036e11b4fb6288f0acf5a91cb0a6fddd6adfe6681a73812fc979db8a85d7e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df601deff252eafbc04f7f349c5c76ec
SHA12ce9976bc40389e941109a90c7baa9b683d1f333
SHA256c117a0800b13a907b27ef90abe4bd07b45466ce5038ca018860fef89583e8164
SHA5121dadfc4a45111e56908b57639690bc6421230b8990db15983e7516fa9f878987b965d379600c18beac3fc089d5d861532c02ad6e01217f1c5b08f5f3fbd498dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f3630ac238d29d705ed5090c7e2802d
SHA14c2021b84b846f9366ff088dece1ff75d2dfbb63
SHA256396a78512c4656d827d4802b1a878a93d08370834417bd1025d26534150fded0
SHA512e0f705fd76d60a9909f12f17b0bfd01129bb5b8e822779be5fa5beb1decdb91ad988342feb5a652eb7c31a1997748c99d516ab5436f825256d97a1ab9c8433fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54043bbe75b130d8773764f62752dafee
SHA12a9cf4c0ef5bc2d100fcdb9e96489426514c50ca
SHA256e3b5bfcee2125681257fcf746db6dbeed006884958a93558fc2e829f5c53c14e
SHA512e8a73db984f334ab3345f74b433852a2e2685528862beda95813ff7a5c344326edc3ae63f22fd0b67c2f2e5e1c4fa045c548acca6a678c06650c78873437cb80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d12097eec687ffa53af3195d7fe8c0d
SHA1d7d2f9a0aa9bff8436a1e1dbe752a3fdad67a896
SHA256616657a270b9c44baa4b3e49fe3351a68b7511e176906a723b9afca6909cee84
SHA512dc7366577594525a12ef4d2cf4d5762f2e93952541ee610b1d39283a4df2af70e1ddd27968d88fbca154ada8b2a530399e3920f72ef26e1737f4c5ae5240eeff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542980591f0b2c514bcd255ba48144d7b
SHA1108abcce8f5a504779b6853dd47c9dd12c0a0cea
SHA25637d17079175be4a562c92e58437d7bc44d1e2cbc88015c9dce6dc4d82893f22a
SHA5127a997fe22dd4e9f6f7fdb881b68e471e3efc0a171a93bc93c128135aed44d131ba685098ef5ebab4d30b632bf12af81c37f41e707abd20bc53f9ed9bf6a86bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52544e3cebf58d5055b956d60c8128f20
SHA1660b3fd547bd06ae5a21095b9a059489d06d856d
SHA25666ab86fca28d43d1e2377a982e4831decc401b88717a55f363757bdada562fbf
SHA5125b9ae209a204100db676ea0f763fa97965d261218ca2f7187741521814aa52dd18215e30bc440b107c5b972a8de0d08c9e1dfadbd40ee7169dfb2330cb079bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5706bb92707b12c343ee24b2729a175d4
SHA1d1acc79bfca2606eb50e565367a841404af622d2
SHA256984bf72e9019ede3f94eed0d24ca542e09dda45e857f62888be2b3bb85320acc
SHA51231076225ffade2f0a3e6d1bea30a10eeaf7e54e3dd122970126771a47e682b55ce2f76dbdcb169ab7192c19f2e53b7f26733ed928fdc76691cc7dad8259f0950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54733e903927fa798697b11604b9e13b1
SHA1654ba7937414ab9a15b9caa4b8bd7e2f24666810
SHA2566246e4fd6176f2ac647dfbf55f2f8cc2b631b033a5c4058a4b564d2506501ba6
SHA512ab2e93351bbf0e3f1bc8c9735ba910791185f982ddbf95ecbab43813b6c65834ce982e0116dfa89a015616d2735f6c2137a4002ce1589ddc011895acfa9ab1ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d619bf636a6c48cd5aedd1ba49270f64
SHA1dd9ea455991d5a588aeee9069b6e948d78761741
SHA256a8a9778fe72f880727cfce364ac24a852b6d4094c90cfee31e8cef726d2ff7a1
SHA512cf0d671a2fda1d8118cbf26d957a4a215fff491ecc2623f59ed461ad55c0a973457f1564692d871c8799ef717de2ce1b581e83c7d73cfb5047584739d574919c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06