Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/02/2024, 05:50
Static task
static1
Behavioral task
behavioral1
Sample
86190640fb54543e0474be185d58d702.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
86190640fb54543e0474be185d58d702.html
Resource
win10v2004-20231215-en
General
-
Target
86190640fb54543e0474be185d58d702.html
-
Size
996KB
-
MD5
86190640fb54543e0474be185d58d702
-
SHA1
7340701560e84bd31db5ea1895db8adac79889a1
-
SHA256
7b55231da3cc680dd4d536a7bcddbdec3961a14ff25ad97ebae11a14f7fb160d
-
SHA512
c73baf8ceecce9837cfc91d21586d5eec8fa419a4eb152024424b205f4b8e1691f38a66e99483ba4f55ba0d3371b25c328fb81ea945530ad789f67165c8f4769
-
SSDEEP
6144:2B/d3t4NoDAyDfnLOLYJxgKaAhsAKVUgVsvcjZV/d3t4NoDAyDfnLOLYJxgKaAhE:2hZDtLWYJxgFDZDtLWYJxgFK6
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000fa73d9ed3351e288ec42270dc9700d593b8512c37242c774aad671cd8eda1479000000000e80000000020000200000005a5fa57cce3c843b261ba5c55ead377c3e6109f4f0586298a13ede9ad36f806890000000dbead1350ea8b2b0e7c91fc8004034cfa3180e00e2f753cee35eea71c930bdacb74f1cac360e7e2ca924cbe3ef3004238d75dcc4f8e90203263105d7705a42095f312a0d75787bd44d5a63e50c8f78e9f949834bf6813e43c79b53385f704d9687372f4e95a28bd50b8522e25a7f37478f5eefb0b8b428ac939e41350badb07fc9212420c7180dfbaf147d874cb1796e40000000a37b02b3ce7b268a8fe8d51387d51f43e23d91fabe1a7f0a86866cb5f05cd18f7cdcff837a551c6e4d4f6a9fc2d75aba0e59e90b90dfbd77f39f597907052b82 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d60000000002000000000010660000000100002000000023870f692155eeae17d5b14c3a41abcc63f6bafe15f5f9637146ec2084e25fa4000000000e80000000020000200000007360d96d7bd9bb7ea1788e519b170d6bce9177bd9c864c994d972a1c3868432620000000bfb836c4e58670885fe820e4b3d208a5125bff97025b36d891c78987f70441fe400000008c80527532a47cd4d281a4fd7a3f00c9346324c23e610441129e978fc8b854341b407320bddad83450bbc47f9fa2a1e864c1c46bdffa00098b35e8134cc67fa0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412928480" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 507e1799d254da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C4808781-C0C5-11EE-B751-62DD1C0ECF51} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2964 iexplore.exe 2964 iexplore.exe 1724 IEXPLORE.EXE 1724 IEXPLORE.EXE 1724 IEXPLORE.EXE 1724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2964 wrote to memory of 1724 2964 iexplore.exe 28 PID 2964 wrote to memory of 1724 2964 iexplore.exe 28 PID 2964 wrote to memory of 1724 2964 iexplore.exe 28 PID 2964 wrote to memory of 1724 2964 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\86190640fb54543e0474be185d58d702.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a661f60752b36c2ed3e3c0c627dccd29
SHA1ab57806e4863be08fa3b4bcc8574abd0dccc53b4
SHA256238f60dfe246c7554faf030b866cff7c3f5863f2000dd6f19a0b5e9c5b8ed5ad
SHA51201533c14baf38a5efb6c758f04d58b5283abd397ca407878b942efb51ce6008c9ca8a8e0b0349af4257633230ead556494175ae292bdff66a35260005d30e4d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5385a332fc1a465e1b4d99f44dd52224c
SHA19777765ddd8928da9fba9dfd7dad775794fcb991
SHA25696bba1d12da23b02835d1349bb07504929ebe12f2b43c8d909e70eee94a39ed7
SHA51212affd4a78c0f9047210fd65250292caeae778af4778a914c2a1a05064862e98d284fb8a90345ad6005faeb9846a919be858a2005e0f550d755632fb18509262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541471d524045047384b9dbee21146bff
SHA1c2228326cb74667a9a2d6986cf55525d18243740
SHA256906f57c61ff53aa92389babe6382073c9aa3acb9ec84148c8382fe94e33a9bf8
SHA512abc6f8894d63edaf1980bbcbede192aa0d6e3ca630848943f1ab780583c8478918a6fa7bb8cc69f8494a873f54801c72551efa24dc8895ebf94334a90f88351b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ea6451f026d98bb1b876b0c0f27de30
SHA141389a96d6e9cab9a925b69d9dec51ea8a36aaa0
SHA2561c426eb15ef87e4be9773c673a189bb912365652948a6d29d74fcb931f6e760b
SHA51283960c791eff176b0b0bed88da3542759f06007071e57f6b5872b84a0d864d4e2899d95e6c45f781cbd695868927434b38991e91a68909aa1042a4a62f2f348d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0a405262d23227c6217e991d49e2979
SHA1deb08637ca47f5e494d1f3288559c90f209882c0
SHA25687595b537b6298cfe0e286f404e3efd2e7acb369e842b15539d88e752ca1343e
SHA512adff9c03e7ef5a2e9aad28327f85f1a59ca91539e62b92ad8a987cd70205840dc7ee576830ab69e35292d75ed916e0f82d976137e02c5cec35f063346aa6344b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d0718e519e386c05c571cb7aae8605d
SHA16f93ec93e012142a79a11d40500a757cfcd18d3e
SHA25638ffa49314d5540e3a42f7afee2dcb7bf083cff0dcf82da50235bfdcb63be5e1
SHA512798065918084eb3ca3ad4065713f7728602b8629fc463c47677f06abafb174796556a244d13cc09454e8d1e86a8c0306abe201fbd781f6c0db21a37b0b71e696
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56208b44fc3130e8417432c4531538eb9
SHA17f7f45c82ecbfe1895ad2f4e5adc7688e05f0f7b
SHA2565889f63c75b352d8416e6e558d1960cc4d9136c17c17881a170911ff7be5b97b
SHA512d2bfe4c24f41a8608912e0abd95591ab15dc92371706b40957568e99d6b7200c24b210813266b5320088f415224e15b7a28a91c8b90d08f9ec289724ed5de686
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bd9ccc0e837b023a4633b94cfd5a192
SHA153d79356e9b3042336ec60a1b2b1882f17e86d89
SHA2561a4b5c0c4fc4ef07e35bfd9eab0dbfe34e948918f1886c53e3ca3290850b1d4a
SHA512bf4dd45821a61b26644aa344713ee8e37ca7077469e25a2418d3bbb35b44a2d3923ac08b2fb86d0caaad2f07b8a4fa67458f573782340daa229ac797881026a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb8e6203131f35b226507dff2651c021
SHA161b4c165eaf202318b07e90d1dff91324c10c3a2
SHA256db84655b49fdb29d3dc3ef13cb2eb74e2131c3982155a0b0d62e20e90cb413b8
SHA5128d8b1eecaef9d3efa529a519d6b5f21246d4c1c10d41492c381102090490f82b8632a55b4d5a952f0215f96c8c4b178bcf035d1a4b126d8f68f87382d941204a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b6b2b2d86db85752e919c5226505f98
SHA15b74cc22edd5600cbb848a7b9644666dc173ff54
SHA256163c128fa5a190e7726b445e66427e24b0d2b1340b2a710e53f655170a392337
SHA512e206c171a0d3363c1d2da15fd8e37d06c83b2f498f55e346349876acde627762b8166628bb817a746012b1f0037f592943a4e085d138050db3b2457e46e14b75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2238727f49cef96133fd7ef3b2406e2
SHA12028460a0b965f167bf42c127d83a6ced6bca872
SHA256a7856cc8179f13f05fe1f19e0d1b55e66991b8d5e8e6f42dd22972de0b801220
SHA5128189b627ee9ffa06a1a38bb8c1b6d36fb0fb4c093bff15cd8ae9ca371839f894c406e6b7d28b9da49398277a119345e006ce25c3a1955476159b64f1fdd1e379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59eac6b45279bdefa9f77b710a29c7b6a
SHA1f8238bd5b09a48a320c0668c9c97a1ecb62f079f
SHA256a193512c89684a5b9fbc851cfe882996813846e730ea6090f08122dfb00191d3
SHA5124b45d76ebef93a0fee440e90cb462e990bd3885dbc832f18c2c78a511f53605a2477e93c0c6fe033ad1a7a44f347c7c583371d210179f5321c38947c9927a51e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d95353ec5ef62331eeb02607be455474
SHA14959c4bf56a2bdd671aaaaac5441b3d879f00d2e
SHA2562b0ea3b8ff1f8de83c5c27abe3e08bbe1a4bfbda76488c0f5fa364ad3e5cac9a
SHA512c68ec443283b4654a45597f52cb1900461ebf6dfc340ed34a36adea16c897e2351435c43b247e52de16bd75d50b92e8cd76ff0353510405681646bf51386f77f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f215e30c0470dd8feaa7befaf8891bb
SHA1119a2ac8ba5ce2d0e12629859bc205db2163485c
SHA256593dfac5a85ef29bac75b0bbce5f4f6bd933c8733d65b17344b1a667a6ee1157
SHA512b887aa7d9f8f0ce7ff93aa75d96bea294b6ac9bc6b13f71a51cb8c3b908532c72b5ac5aa7fc6eaf1936ce27bf5a3a16112846cc156867b338727db60c7b9752a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5b30c467359b07cd154d09149b0855e
SHA1fa19727f4838e9630d20f67537237131f14ad283
SHA256133da2aea9e88a744a5fb87a8d18b0ff984a888ade1f40836428fada6abeee9f
SHA5120cc0d182e74bb152e4ef482c7409a67ed123b0c9ecd7e556b5460ba618ca9b40d499c0e061e98c744a45dbca0cfb26f8468a2727afe2a35bfab44c63d7c7b3ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f22f86e3625495684a07f7683c64c893
SHA19cb18784a1263c787646351e900b38027649f534
SHA2569016870c24ea36e8d6ed2159b128177d6430f7b4b7a2b91c34bb65a74cbbc356
SHA512225f1f55f42406672a9ff127a17fb26a0f4c21b37454d142842a97edf22a6dfbd91c723b6026c90eaaf3cc88507aae37087100d32babfb58c9d127ab09cdf480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f293bf733b15933b0e599ca93181607c
SHA1fc48268ae95410537ad1c4be13c15968ece9e6e7
SHA256fd101c364f55d480957c864f1b2578fcd0cc60b4253faf6188dd0677e3e736b0
SHA5122404b389e58f02f59ad882c920db2b31b4a112e7df40bbbbd58963aa2aec694989fd4834f85e7d3f31d518261c79fb9d311347c68ddae514f4e0518513f26ec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528006e776199bff49649403a5f798ed1
SHA1129ed4b0f2e289ef56bcc92b208a169ec1bbabc2
SHA256e084ee1a8c84eb7e673c76319ee03a0400ed3715b22f558c3318a5a87454b240
SHA512cc47c23dd8ce54b0d1942d6efc25b84cf9764b54afa883beb088b2fc90f4d420abbf3fe9f5b880540683affc842a4035a4703bca102dad171fadd6e3d91259e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5858092ea788f2efa58d4f5f8389fb7ef
SHA168326f0be407dc9c88abef373c632fab06e73cab
SHA256ec01da354e95a34f3a1075ec6eca84253e4a9fe9e05f46d87ff74805de519770
SHA51216cb19a9057bc59f6445f42da663a891ac3a58cde04372190ddbb471f3776ee615ffb5af8655dd90bc932de9b36cab96750e2bc69d0621aea91cf132ab86c7b0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06