Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/02/2024, 01:36
Static task
static1
Behavioral task
behavioral1
Sample
8834c2ca0286bc230e6726b3b9832327.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8834c2ca0286bc230e6726b3b9832327.html
Resource
win10v2004-20231215-en
General
-
Target
8834c2ca0286bc230e6726b3b9832327.html
-
Size
21KB
-
MD5
8834c2ca0286bc230e6726b3b9832327
-
SHA1
bab466ec3d96d00384cf66fbb2fd73bc481128a0
-
SHA256
10b7be57fde6a18dc603ab42f6a488215d5467e22f9b30c72e631d69e2db9efb
-
SHA512
1a43356c66c82c11b138f08ddf910340c1a6554e363be44b27ac420c42a20d68bd5e4e255d3373a312a9015424d6fb014d51fefb5a5aaf5f8ab1f44a2439f2a1
-
SSDEEP
384:M7wsjNl0G2D5hRHdSbtgnzv1fTdS3fjHAjr8obSDGB:7ON6G2D5h5FnzvNTYfjHAjr8obv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{80CC2521-C16B-11EE-8723-CA8D9A91D956} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "412999665" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2672 iexplore.exe 2672 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2372 2672 iexplore.exe 28 PID 2672 wrote to memory of 2372 2672 iexplore.exe 28 PID 2672 wrote to memory of 2372 2672 iexplore.exe 28 PID 2672 wrote to memory of 2372 2672 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8834c2ca0286bc230e6726b3b9832327.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4B3D1CD03E2BE9D4F9CDDE390F5EFE31_7448AD2B76522D4003AD3BF86CAB6922
Filesize1KB
MD5c78be85518d0c28665e51b1db63eec60
SHA1b1fb8ac17533677b0b743db5ee8468bedeeb0980
SHA25662092c524e5761a6fbcc2809ad8337432422a28fa12ebf3e22b5b5fd0c1b7d51
SHA512bd72b73eb4390d5934cb1e4b687096b1085634f06a0755aad4de7bf708c4075785e17a18e720bc0587759cba4bf648d9439390df32355d79e1bb08997285c7f3
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5b095c559bf0c8352192c365aed374212
SHA13c1b6cc45faf515a0dfbbfe34b3f0ca63e27a3ea
SHA256c9e3f266524c4cac3275b18e1ce4b74bba75c146a114ac220cc55b9a54d0ba1f
SHA512058eafb811175e0d0f960df4e44deb4382fc1041b816d3b7a7e058b88a43dba831edfb01059171d8e4601f3c2cc6308fbddba7d5b009ca1559a36a3ac2eed068
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f061baa4a9cf1b1c74a270741f45ac7
SHA14c562e3371402d0d2cea62613afd9398f085a383
SHA2569f2a0397a1dbf0591b44aefda4aa178ab09bbcea9dd74426871f63dace14b6ef
SHA5127344f3ba56c1971a347545ea3bf415538c021b52ebde110043b809ae8a770ee3a0ab7c465866c0ee9bc9e7393f853a241210d7099a1b28e3979304b1c0dad109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5543f79e496cb8bc85c07b77c77990a2e
SHA16d0c53e39214748e0ca0c32292c618320cd2c1c0
SHA256ece847cb9c275aa81a820b746531a396929622c9a44b77cbfc2aad7fa93c72ff
SHA51215f50529701fe824c2ec7076fdf7eac68d93e11c221f08c412bb4fd9ed9c9debc31e8408229837c5049093bc143a06d0d7d84bda4c59fd01e2f44fda5e876b86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511f51bd63678e31029b828ff12306c11
SHA127980a1b719381c30ff81f484d85bf60994e5222
SHA25637da7748c3570d9da6a94298e09c1f16a399445bc35a99cb9522103f09b48afe
SHA5120a70cddf6fcfda62bd2128013ff5b728471dc7d96263f0faf58161c3192759c63bbe907a768016e38abfeaad175e158df72123a139ea348f1c149feb949c8edf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b491784712d6135bc3e81258cfc0f492
SHA1df7ea9acd57fc64f10d19c5e46b45902b40b40c7
SHA2564809506572cbf946a5b7eeb832c689446a260a40ff3445fc8339a62dcc56c7b7
SHA51291ebaa66c060873739e288aa5ae023357d70eddabebd01c48801762c6248ba2ccfc303ecc83e8f4159d36d993ac3f02796f89ccbf93ab4eaf11a2bffdd537d01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db0dc0fcef10fe29de6d17a66e49671a
SHA1b139e8aaf9fa4c643d0e7ebcd9cbc51e41e99603
SHA256f754e975c1bc2345e51b400250a6a085feebd0d7c01679afd01a8650fdbc2486
SHA51274fe5e29948b8ff5a6ea204b721d2387ed77fc133587bf1ab73c8e80bee6f1ecce97145adea64321ce552a1dc66f6751d9b6c09f3c0939896390a71bd7343bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b70f5db0e0504174317570a9323feade
SHA120c9b5f9333f75172a4675c12219e1b2f3dc0bce
SHA2567e96e204752cd97d4fc297f53fa2fb5ca1f4e0a1cfe4c8b46c575d3f9749eea9
SHA5120da3feb984e2b221a075bb50971bea400e298e7bd5d2fa0a16377e2ea01d7c8eda48fea28bbdb4e07497f8f4abe1551e20e83c6174639f8fae2aee6f37b3f903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fd3645345002e6ce5d3f0c119476890
SHA11911ed41fb8cf541e9001198ffab39c22f0c1692
SHA2565c8d8f4549c86e5e7b306e59d08212bf62efdc354b2d66ef8a241c1717ccee34
SHA5129a4e931c674dae3efe0068c0e7b2a9f7fc8b48569abd56a2ea716fb310fe7aedac7e7a82dfd349b34f1ab3c45aa27d8c0e7f6b169c970c368e393d06d1e5e706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587b0078d3688850c7a4ec34f79ece93c
SHA18c23f9d385661488922de58c1a4847c5eb572e38
SHA2568d1968750c42ebbb21cc2e8cd1db21e00c966c01ee1aed05b9e1ccc7f29ec244
SHA512abf1472748a46e14a880693fdca254f4b9fb873d07be8f9d8adfab92a75078e4e528786d8e3f30e38c7bfe866443ca9d5d44d484cd94fb3d8ee89459ccd476d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529494a51dc2d3154064a9f4371ccce19
SHA1168395cfc91c187b0bf036d36665803e184c6302
SHA256ca9c0ef021a1f4074ac67e514bc783104ade1a48a0d71b1cb8280001b53ecd44
SHA5124748fa4af12329055575352048f34da6d323d1a7fcb7068fff6d0a723270cdcaf051ea7aa6ce34c08ee48e083babf926d4fe0cba6984a7342a93efacc7cdfbed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e309605073a911b84297c9edc905035
SHA13736b456aaa991551fb29b908608b8116d38eb95
SHA256766df81670f60170215da382dbb2d92b6f38a7b8d3e812ab27cd5400c8529efb
SHA5122e2888ab562361836e515c12a5898b9e1da89edac1fcd172d009bb71f92f8a528e77bacba8acc22b37f44fc36d5547b6b9e105b9cae823cf8bdb61a207741c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD51a5500e92cd28a998a7ec6d12b0bbaf3
SHA1cbcb9a09234c89c4166a0abb3dbecc1f4c093a67
SHA256189c46c909f560d6c9d34ffa16abc32b02645942d71444f1cb84889a822ff8e1
SHA51228ab6de0fd3ab73739e5a21b1fd34ccf43ab2c70e401288ed2c114908d134ded07d9bb00d7fcc6876b818306d9a6067aad03e46389bff143b38de2c4743e0636
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U9VC31Q9\jquery.minBB7GPKG2.js
Filesize1KB
MD511689b45f4172246524e88eef9bab9b2
SHA1d600a0c985b9ae0ea9a9a9d4c13936d4a55c124c
SHA256684c48cea08ff2ece2f45ce0ba34be97fcd8b5e59fe2b45e855e588ca2084c32
SHA51211f68f022312cc98fdcc456af679003c1c9e97f87cd150d6a5d878086413fe2c7b9a083ea96e319c0806911767b210e350b765bc3884c247b8d5c871a7bed986
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U9VC31Q9\owl.carouselHBH457ZA.js
Filesize1KB
MD5f4a107cdfce87d24beea8328862a2b8d
SHA1b96890d1d77456b8fdd49dbb7748d41539d0bcfc
SHA2563897376033c8cc973eba31ec328a7472df69f36ea1436330544ee477e52e6b83
SHA512b891f8d45d16151b3d571d2fd1b986efa9173f9cbd5336db9c413ab77ea9bc661a769eef1eb05c47a7a9d5dbea9278741745b4442343a56bf42c835f3638f965
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U9VC31Q9\owl.carousel[1].css
Filesize1KB
MD556dcf96bea64fef435e48ca2247c5998
SHA13d4b3746dd70685819d539c707688c9de992716a
SHA256abf7ee8c88e2cb5ac573a7f52afc38a7c08ae7af1083ecf29159a4a414ee9c8b
SHA512bd2589fd1ec091bd5db1010abc1ece01da7af1a36850cbd26a745da0ced786b09e2a5c2263eca5f2c4e4dee894043ba3b5270f426bd3d705b14ae415fc039847
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U9VC31Q9\responsive[1].css
Filesize1KB
MD5079acdaa94ce6b308ff5c0afd12e255f
SHA17b500f7446fa909de639e31da99d7165a4659f6f
SHA25632053f9f75c7f669bc2282c1311ef92b61e92de08b9afb2cbb69eea2deec488d
SHA51206926a228530cacf062a51fb697d17df6668498aaf889341e29cd3bc2656228affdd8ef4379b31dbc1c742c01378e9aeabb5083131fc78bdc95d114b4ea0fe28
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U9VC31Q9\style.min[1].css
Filesize1KB
MD5a7e6bb4f1904b81eb436323119717450
SHA17bd9d991b8a2dd57cdf946230cec41b63f9b0510
SHA256ef0dc4086be75f65ca6209cbd0fe1bed114381e0b8a2df0321ab7a0853c42247
SHA5122c1ed5ba465db8ac4e62d0a7f7e70e1699f4539409c7e592884477ea2d8b320e6feeaf3ba1bb875c6cce3dfbef2c7cb32d83e36c746d75ef0c88d6fe1eccc01f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U9VC31Q9\style.min[1].css
Filesize1KB
MD52f5b45ac1bf9c292e3b27851f8a7333c
SHA12b9600326fc48280c39b2edc8e268853916bea52
SHA2566a5a33a66c5759ddb74150f850969986efbcb56cc1306ebc08859c9fb34a48d6
SHA512dde55db28c5d82ec59d0abf369e4a25106881ca4f363f700cb59aa65c039db085a01aa5556c91a7c460294814fcffae6f9b757144ee782f7f2505a50713de652
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U9VC31Q9\style[1].css
Filesize1KB
MD51c2f5f42cdcce369e8dc5e8fe556a263
SHA18a300a07fad55f5d704763e9e091398757d1dfb6
SHA25683e17c24c78bec7dfaf4d93ad13c796de902fd3e8f59b9f32fc570abb8ba1f79
SHA5128e8d0b270e85020af557b98649fbda6db28d8dbfacdf37bae414114380851d470694d4489451add05a45bbdffda9a84d7382361275e8d17288a890120c2e327f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U9VC31Q9\style[1].css
Filesize1KB
MD5cf7e9ba17bee2836c80da39723b80490
SHA1d75e8d5c70d7c8c4c9b69c3abb3d39ac5dee6fdf
SHA2569fd65514e8ebaed7401eaf5091b45bd74275714463654fdbcf72b639ed883148
SHA5127af4fdb45c5b3b3fdbc2c5368e6d9646c557197fb5eead59b762086f0777411a788a1fb08bd9d40d740c25b21348b8c2e24c73c3b3506bf88f34d702f3cda8e2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06