Analysis
-
max time kernel
143s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 16:10
Static task
static1
Behavioral task
behavioral1
Sample
8f962fd2f9c81a53d4aa20b0d201c944.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f962fd2f9c81a53d4aa20b0d201c944.html
Resource
win10v2004-20231215-en
General
-
Target
8f962fd2f9c81a53d4aa20b0d201c944.html
-
Size
852B
-
MD5
8f962fd2f9c81a53d4aa20b0d201c944
-
SHA1
51133db06ef4c4c6df6e9a6c45efff6931f9577b
-
SHA256
9240fba70734ec4043b4418a849b0fb9a825958e2a1ca89d05a653f3e1a6da87
-
SHA512
f1bfd9dadf60b16e0eb954561cda9dd98480d05fe622898e1b8ca2f0ca2ca4fe3b986becad8f333bb17e1540135769609e0c249ea866a7833a3b2925dbaedc37
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000e338860e9779b7a3d6871b06cafeaadcbde771a3b8474aba328605982eb289ef000000000e80000000020000200000000c947a2b7ebd896b07558fe6c60b0b1d2c4ff55fa042bc38e86eae0a559c7f57200000001569dca261a44c481b8e591d806ff192e9db37c81684ff6d160fec4f9bbb2f3e40000000c4596d53b34e6dc42c91c307cbab0f2e9c6250b2ef3b301f158510e97db1060f41df5273ce7a528ae9780a73ac2e3230e1724d74f835262f1f1d35140694a9b1 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "413224889" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E1D6A851-C377-11EE-AD90-6A1079A24C90} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 509e3aa68457da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000000a58a0548dd409065e10d843646d3ace60456e01d22438acb1ab7d182813b5dd000000000e8000000002000020000000ac0ff6bb6d1156e261428d0924cf727adb55ddf9a4a4c15de452ca8b4639867e900000003e7287f10cf07fd6fc31c5e7bb182973ac86de4adce6155d659d39387ea0b1b98ad28cc958f68e43ba7fbb33511519ae64718c5817935a66ea9c098da06089a08d8e18ba85efbd03e9445b4d7242a430001037596b8a3123d592f7f7fd449c362e6b2e9b555b477b6d3f1cbed8f51bd2ac6c6131f96c1daf587093e2acee7c9fbe6da317cacfa3e70aa2cb3f4b7371b940000000786b534a4fdcdeb15bcbe04d4c73c454c57f626e57078cad1f5bd62d326e8d8c96d6c3a0320c44aaff340658b0b1240142360ef63a2c1ba109544b5111af4ead iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2360 2280 iexplore.exe 28 PID 2280 wrote to memory of 2360 2280 iexplore.exe 28 PID 2280 wrote to memory of 2360 2280 iexplore.exe 28 PID 2280 wrote to memory of 2360 2280 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8f962fd2f9c81a53d4aa20b0d201c944.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5a59a7018bc527b867199dd13abdbcbf5
SHA12a8e95dbcd211b0a7829a61f3baf83873fd69793
SHA256cc0ea41f8fb346578b6592e2a4549d2c0aebe8d6f2bf84ae5df5b8fa9e63cf29
SHA51235b77ec883d2bc5a95fa0f504ac94a279252312a78d87781400571ab04d949a9115f314fe676ff7b4b5f5ade9453bda8977b18f1b9d9d9b8eceec3b36177d677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5653f426a86781b6c1b930b628c6ed0f9
SHA144565be12859fbc56a7f5d0a767aaed2c74a7a29
SHA256701068cc27995d04093ed2d5bf4603bee083f46236ddb3ac66ceda0dbb939af7
SHA512fa5fcfbfdd369fc833d29e711b2eda60b577cfc62630e8e79b0a43e1d3b981a885230af26eecddb23fb7476732d99183414fd46358e431ae307a07d3da2337f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5162ea3822052079a1b2ead9163563b23
SHA134390240ae6163517fc47386172ce9426d8c18bb
SHA2562c74adb5a147bf8aa17e64f3fe88fb729de52b67d705914d7e72724ef0b10bfd
SHA51252ebb075de9a47d09a830330790f3a819ce11de1be6ab4d6cd74fd4c8b13379d70b87a4a23c40689a0d690f0aadaaca3fec5bd7ce867cb52e160ab3afec3ba60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5447896dc702abda3ea649612081bcca9
SHA1df3e122b1c1b9cac9d5711073df63d84ac796ab4
SHA256985a3796d14db46eba7f1fa677f299e1898c75e079dd25c5fff6e9c0cca8b28e
SHA5129f59af51844f44a65b9f377c90dedea217d1ea3ed79a10a24a5943ecb7e49075d217ea022d7581ea500bae55774887a8ba5e316c1c364f4e5dffc15be85f6939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4b87a30bb3b9c471d08685f4a071db6
SHA1a65e667cf6ba493f2a2f0a42f77330222ed4e359
SHA256e7579ef8089577c47a046eb94f6ea0776748a01dcc8159afb9b1e1dc92175c73
SHA512a22a08b84607e2bcb78ee6a519bc53747b821338325b3c1428f336ed7820101b33bef8faa4c13de16425ec6a0f69f50aeb35b3eb1ebf2b3ee5d2098e014b8340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56317277d87e5fd0ba62538ee07715014
SHA150077cd5cbbce78600004ff14481052f38144154
SHA2562236ed944c1aebe18378b6dce7fb66ba075e28fcb90dae2b557da329127b5f41
SHA51204aa44a92a8f01a0847f91921641239332e292c24f0aab648feb5bfc9a927a00f9c428005e97f519db9613814fa4aa5a100e851e82f754b4e49a412066aed854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594dbeeb8aa0ed6d9661914552dcc4031
SHA15a67ff3c009ee91dcb06c775d76ab7d805931467
SHA256fb2477216d0f468512b681e1890be7a1491649310d5f0e075adb7a64351ae464
SHA512d1cbb175898496694f91d982a1dcdb041a2d01a253e0fd64785b93d6032e9e94bd42905077df14729de95ba003bc00db3cd5b559e2a237e8308c41478b31384f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e212d05d9861a6736e1fcdb1709a3f53
SHA1ebfc6d99ca4b735312a52df0b34dfbdf5718c15e
SHA2569155ef443319b65417890da8e2fee8269b1f95bcfa22bb950263acba2c47dfe2
SHA512c88de14d6e9ea4c200afb1589d1cf5f048a17f40414464d5c23c606c8b209ffc88cb15800ae9dfaeb8f2d30ee2bdf693715380dea5655f8a9406faecfc57df4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e2c05c6897e5de6ebb71c9526a20ff7
SHA1322a7f191c21e3c6dfad701bce8fd8c021499b10
SHA256638abda0bb8e1a64773070686e55ac4da6281daa2bcae15e68fc62a34d7600bb
SHA51203dbb335a1a44f22c2d9966d4a23e2d2fe204b57a582dbf5d95747358a1464fef1df68cd9b2e9833fe1f3f5c803c69495a4b10d0eb1f29749e9c68d8723d73a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5723beb316c92096365c54ad94a34fa04
SHA1fef1dfdd64c2d34ec144128b1f95afea910414ea
SHA2568bbb2dc5b7cb90461bea31c59c595bbab591f83467e05c80855db1a31adb576e
SHA51201513e3a660f16010372e4c5dd5303a22ea13386a4057622614df9741636bdfeb1b1313a933b972c590bf38e44c9674f60291f5c618e7294bdb1ccede80f9105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5940212333589b7b4ee5689f1d0d5d76a
SHA195bbf5e15db7b90aac16b493821b09103a1c77fe
SHA2569f440c48f988e363dcaeae01290f94c86457c64594f132604c141d62fdb97a29
SHA512b9a203191ec9aaeacd3be28517eab1a5cc5111466f1261af4a21d79c2581a9ab312ed4001b1e9c6a1e1107fc17f959502c2b0e2ef32a13ebb1ff4e2ccc429f85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542f0ed422fcf6abc385aef8aeb5573ae
SHA1c14fd5e7f6e05c83094a8deb30d513e22bacc3b7
SHA2565152705e4264005eccac9075c25cb1d8570c9e3cd4147ad478791549301d3e92
SHA512af699277c33b06013499b56608d40de660e83fc44a7f496d5e9643ef62e06ccabaeabf1b9c92b82dfafc06162dcd5f60da283c3a5157dfb72d506c500738babc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534ae888c0dc51fb0ed337cf1be304432
SHA12ae038a510d0c3063b4582194147f81839141b1f
SHA25610ac8f417a97ac8fafc9f3545c11a514e5454872d6dc5df74e2d4ad21a43c266
SHA5123cefe0e4b4c0d60aad62b366ab4f6295e184cfa12ee2ba8f984c2fc2211f0b96391e0a0e5697321f540aa52e504d1133f8a0f5ef5e585b509c4f03886e56acd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e738f6987207263af1a7ded8a99deda
SHA18665ae871b98488d58a43a422ef3af61ca7c5a77
SHA2560942da2a9597755ef7304c1bcfcfcce529eb3129d8531bd36fb29251b3d20247
SHA51231a2fcdc2826852bc9bb00a810341e724e6d54b8d204af6a392a2269043f173a190bc502f082f4ddabd4906baea843682873d88065517f5c073b2992b5ce0702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be1e7123b3163366e24b1ed87d38bad5
SHA1e7232fb61cf505f57c2f8399726af7f87693907c
SHA2560fc48c3abcd2e2cce75b3c43d20de04c1714039ff2d8d1ca1d1ffcede93ce722
SHA512f73b9cdc7e009ad705038d69efe54c7b206182ff3f4b85f686e3726fa568cc78f231da367c521a87b93030e39d772af3c09b9696bc5b0003e626b5f7cf27974a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD57a66746f90ae5d0d4ff004656bb7c729
SHA1da645743beca51df27e496abb6c047b1e1d8c92d
SHA25690292b79a8a5b86de748cb5456f3efb7569d5d35394696327b19bbc42a960b07
SHA5123407abf30bd530727ea35f679a0788fdfb9f1614066605bf336b9c943488e21e593774f16282d92321b2521ada15b7d442f8d09de211a95739375614f0072165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD58256dbe11a5d8608ac41d69c0bb6dbfd
SHA119a82a7916a3f1481d02fd3bf590de39ae158326
SHA256b1cda00dfc2d848463e8eba3ba649e8a41d58d3f7f5143e141c99b3b3ac54847
SHA512979fe6b6cf6fdac2ed5b127e49dc17923bc9919ea8aed41a7166d8e7e07064fa3204a3cca2085f6ee90ad0a6ca01998bb2f91f2aef1cfde86d6a22b4248a8bb7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06