Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/02/2024, 16:01
Static task
static1
Behavioral task
behavioral1
Sample
874d2a1033b3699af020e596e4ebb469.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
874d2a1033b3699af020e596e4ebb469.html
Resource
win10v2004-20231215-en
General
-
Target
874d2a1033b3699af020e596e4ebb469.html
-
Size
2KB
-
MD5
874d2a1033b3699af020e596e4ebb469
-
SHA1
6af8af8bc875d5960ba0f10ca1b02a5db4b50c7a
-
SHA256
e2e838294497d525281f47f06df5e43df860506283bfd9d753e5b0b73ea17bfa
-
SHA512
e5249e002c6c18834609ac27e8f5f5acfc66b4db0dcd3b655b9f51113fdb0d26e3df0e65a530234c9390afb8cf44560d119e63bbe7d3681837006c9ea390c3cb
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d60000000002000000000010660000000100002000000001d04f4fc403ab1a15fd7191f8cb01bbca49f0b2b0c18e84eb1ed8e8736d9d28000000000e8000000002000020000000788738a2feabfb5abe4f37130d162092e71b3b1efeb25346450d1821b58e35e820000000aa9f5613f32e746cecd3e75adb089bc4a6f29d938fd7961dd53617e9eac746444000000019ddee6798a107a6ba3f1282c74bbed7cd9e08e6a67bf92b5e6ed7f0a2e22284fa11caaa92cbf526ededeabc0ad2a9fa306171ef49012f3afd1a345d9f6fa0af iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412965191" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0cce2112855da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3D622501-C11B-11EE-9BAD-F2B23B8A8DD7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 1160 IEXPLORE.EXE 1160 IEXPLORE.EXE 1160 IEXPLORE.EXE 1160 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 1160 2532 iexplore.exe 28 PID 2532 wrote to memory of 1160 2532 iexplore.exe 28 PID 2532 wrote to memory of 1160 2532 iexplore.exe 28 PID 2532 wrote to memory of 1160 2532 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\874d2a1033b3699af020e596e4ebb469.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e2edfbe9e2011eb59bf84c7b9f9dd9e
SHA1246fb3167341241ac780d9664cfb5db51015ede7
SHA256854e58f38541ccd6ec306314b00c0f5ac3b91291b414bd9fa4e589530541eb8a
SHA51215c6a3e38e6183cc03409ce7edf787d1060e99d760a1705d89a596738d9fac3cee1302bdc8eeb8951ac58d1cfbb70c10a956384c465e046698034ec3aa05dd06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59750f99ce870ebfbe0699dc1b1c85b9c
SHA1220559d94f8bac48156c9af40762b058e7eb4f21
SHA25677d6725b377577c829e2a5050cc912bc43e15148c45ab24e82adc5c68f9f22d7
SHA512a2eb20a486ed0e8e720db4f80087c5fc8a26463141727abcc14035fe37c91e6fa47f602c3d731061a7abfff8e2ba4cb098291cde1ab2767665246f82b7d6c728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c7fbe20f78988de3b87c8578022bde3
SHA14b779b1c335ea510d5b20df365c9434ec3fcae08
SHA25672cf6db07b2ded3cf61dee13990848a3ab6f3a8a80cc7d2de6edab1f5d19ff9b
SHA512a3d47935b450f88442ce61efe539e3502d8e7ebed90c0ee90399eb4c693a76642ffd42567f4eab7f5b3e690055444ad513a2a1f542cbed9ec05cda9b69f400a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9df9f7691f3f054afe4523570f375be
SHA11f06ed446a3d3796660bf83040e1840f444a9ee6
SHA256ffd9f9e8af5a59b68a38f5d24ed4a719af221a6f4333ba8164084999a0389230
SHA512e8dad877d1b2dcca932d75cf63638da2beb7b1984b3b60990ff6962673bc7cd670233d450269a30301af0370042c28fdd44d867034045ecdf8ef284e9ab0ed36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598ede37eec1ce619b5c81a8659d6f465
SHA126679baed1333d24bc1e20a838f505463aebcd50
SHA256b1b441ff9a7fddfca87bee838e89155a6bfa758cf096b1fea35f8ee2cc070853
SHA5123ff34a1a6d62775b3410c96a0cf977d976df5f90818976598c72102e56f80874174092eb8ef7ceb866593804f56df60467616d1742fa6b3528e05afd26592ff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512db58b92aac8d46c63ecf4b309eb75e
SHA1219f5de04998bdb778c53505471b6de82b13f89c
SHA25666b22476cae04070bfb9c6e347221d489592a1466ecf5fb4970084044cecaa43
SHA512fc001547253c6f396739e1884f3a782af2d4472ac4555d83b85fe958600e38291360143973b84d7af8ead09698d47a44cc6806fbf39b625bb0a8727d07e0c4f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a573e64e2e2c2b76f01bbec1aa4e72c2
SHA17f23a4e236676cc61aaf438540658a63e3dc4635
SHA2565b560142aae42f5465fa0f617a7fd65a72fa6710de76e0a94b92109a699eff5a
SHA512885f754780f21008128dff8dbe7ee1385ba9ff3e3f023d0485636440c7674304f86790c0aecb964ca0bb856f24eb8fcc2e86fdbea3fe75008122fb7e36c9ae4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512f9694a4a74cb8c864496b8376cf999
SHA151cf7a6ad45b3c93d5cc176751b8aa4a6c6746a0
SHA25695fdb26244521e23f2f1065ba994ebc3391bced65fd0b67e099270daea51f0d5
SHA51299ac1a36d08ca6972e3ee0e68263af9fe52478ab5530ee247a0510ce182c2cada0f2f52b0dcf3bc39d93f2fb181ecadc8e19519a53938ef98f1c34503a77aee3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fdd2fcb40d7ab7efa4b51377475b188
SHA17c58b77c622b746efb11c5a6e2e9e691ae7b199d
SHA256d9aa1b0270d109f2b06c6f121f319238fe6808e07c74f87553e24d73c90c3c49
SHA512229df44cdf2346cb5b6b56da5a8ddbcbc54b3acfb329e28e3f3bdbfe0de5204c46d98a1ec7ef1f8925f71d2234cac070e52130c35601d957f802525b0dc67f6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1e8a10cdd4fd123f398e04c5ad2438f
SHA1b0c83772ff44b62276573949788a4a984ac17ec4
SHA256cd826d1288e3252fe20d0aac5571833082dda75e12156b6414c66d9345b00d27
SHA512bbe0d3772b4e7c6dfbefda1419373ef040e9b045a8a12c496354b1f6c206c2649749418d0bea409dc397ce47afc4e353249709bcd5e213f2d0bb9bc79e667c9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50081e6b6dedd7e85498c5d025cf58bd1
SHA1f1d8f1594d0744d7085f45aba19c9c0ea4fc2f75
SHA2561e5534d0ac068a03ba92198f7c49109dff073262264c2f08806fa97dc0d4f73d
SHA5121f234fd508c3dc0cb5ef29b9ea0da8960ad473b3164365b68628394bc9ec3aaff0b7a0d3ddfa654734435be62205ac50f975588e53f7672ad99c569437c97e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53def5ac26c2b85fb522259a19349ce67
SHA1aedfa5580c7616a209321deb0be45e4b5244264a
SHA256a1926856699de4311de4741c532d269e859fa69dc3e0604d6d3da267746b0194
SHA51226f4b2dd31323385bd79a792875654ba24c410b5857d5a19444ea55818f31bef48e3dc6942939875cd97494b2e8c46aaa344bc2e4ca88d6ca2a56cd9397a6ad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5482ddee17a8ca5af52f83255cc1fe6ca
SHA1d4041a270321a21bc80eccf1eb1ccfef1be7c589
SHA256cddbd5919794a96bb4de454062f25914bef9064126e57562db1729b666647295
SHA512aafd5467fdf8fd80b746912df32e622d98ba8e1c4b9306aab4c519bc76be6bd5cba986be404f5d034ea1c939892e0c1eb1efc3be6f4a97933f1d8a5d5ddaccda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e42cfa0d417022ac9bc7eef7ec380479
SHA114b1c2b9ee053d365c94295c0ea170bf3d4a4f95
SHA256659cc59cbb8886ddb9ed19a158871ec50b0d540a4d70edc208458a69a9699b02
SHA5123a4eafe7dc811d85f2fa162adb49a2e69e32eadcb9d053717df972d2673c0244f3c770cf402ac26761dbf8d05dff532272496195a2d04792bb5f7eb222531aef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508509359e296dc29d3e00025275cf5a4
SHA195ae912984ba083291a139486de213044d3888a3
SHA256db0746665fcf85a4376d9cbee7512920673f215827a828dc38627799bdbdd51e
SHA512f3654abeea26a7f2f38ab1200e2c7d9742c56d5c14bf43f2bb49da3fe03360b4ab6fa3e22d9b2da2984f66b574c10ecb6591f515054579d8af6298173487ef4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cca012280c1c8df942d8d54f149da08
SHA1a67e3b1f609f75ddc1d3a2234543caf95a339e07
SHA256434a7c7c899c7e317272e73c9c4943e8644e94c6eb7154cdedd5326477d4ca37
SHA51240bcbaadb42ff28957ff0d5864ab2fd668ca3cb9043e96782e710d51d73819f9692451e9fa3ee280416b7b5cb9268d17300ed956460152df300f9d8f3c41807e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8abf59cdd5d5c186a190e3e68e33034
SHA11c7d833894f35663456e9f7e9b082e3b3cac39dc
SHA256689c011aee8df328f6c4c262ced2b6befa429ade255d8a1ce436f873775be059
SHA51271b97a8a70f3c9e0eca106d70b5b12e903e1cd76077a2bc77fbe448442ca8341ce76bd8e351f20e3b7a794d3120222ea1315c711f8597b8b50ece900866c9cb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cc40c9bb514eb797aecc6809f193902
SHA14ee7e078747f1d884d48570aa4c0c7c7a844a4bc
SHA2569c5344ff51ed86170f91a7075ae839f2a4e6f45c7fcc7da109835a529dcd28cd
SHA51259f40a4202bcf8167adaeb4bfd8c6e196839eddfb09cccaa5b5fcb4209046af8f3e1a4006a7832903dcaabcd5612a8ab75334664b3351e28991fa9bc7b0d755f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba50aed4f1d18a8bd170334630470213
SHA18efd5b4f48ec689d2f7550bed16790704b44dc17
SHA256c830dbb1ee0681b8cfcdc8efac502b05ce02199937f64d04e9136ab196fb2d26
SHA512458a1028812840555ececa73c288f5fad80381c588f9bd7b6acfe60c786fd9c06a36482426a93f1acc2dca65bf0c22d0afd9aad740bf26f1191b63f74b8aec3c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06