Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-02-2024 19:38
Static task
static1
Behavioral task
behavioral1
Sample
8ffb2d03adea92878879c292f3a8b4ae.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8ffb2d03adea92878879c292f3a8b4ae.html
Resource
win10v2004-20231215-en
General
-
Target
8ffb2d03adea92878879c292f3a8b4ae.html
-
Size
44KB
-
MD5
8ffb2d03adea92878879c292f3a8b4ae
-
SHA1
3a85bc75c8858fd1ddd5408b45a1c890a1796a6f
-
SHA256
e504f9e5e223040d1215eb7e1a811a81712adb21114308b70a5368eabe2deff6
-
SHA512
6512168cf422db70e5dec8e95c336137f5f0a4250cfb84c6b5bb9e220def2e701a405e3f864a19d0a50f781c8ab120007bd33c2276c0dcddc348604da39f55db
-
SSDEEP
768:Zcd9QZBC7mOdMcopC5I9nC43jr7FKil3vrMXpB3lcgQvBW9Ywww1wblZxPd:gQZBCCOdI0IxCYjr7FH3Kwwww1wZZxPd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c00000000020000000000106600000001000020000000bf09f4e535ad929682d93ff2db7048c7f3b27249fbc2c53742e278ced846a3c8000000000e80000000020000200000009d3d826c5cc38c116a4ad6a61e7908e8c053c872e93d05dea99f441673b3b13720000000c2270ee5fdc1bff672d1dd154a770fd8560b8c11a27ea1c5f6965048f91570c6400000009aa353111f6cff3e1a9a14ba06c5432f19d386df8f9b0998c9cd1ebc9020c297659bc9f6a697cd5a98d5c6084db6df76ce05702bf47a68cf2de76be68e46cce3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0D9B6FD1-C395-11EE-BF7B-F2B23B8A8DD7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c000000000200000000001066000000010000200000003fa9a9abd7d1cfefc8bffe3698d31e387ea76c85bee207749b410a5467f41327000000000e8000000002000020000000d0f7c6e4267160c78e839242408c2e4448c3454b706299c9c7a550ca616e7b1790000000fff8881eb0f60c5580da6dad777ae5c7fadb1619f03c1052eafffda7a336637c2e946cbd49d228342a9cb3300ec917278331ae7d80839c522a3d1798e7f0352ba43c42b8f79160460c43fc1bd9f0a46fcd28678543b771895ae24b55355fc59bb8709b1a88e5742a5bf53b26672997a06908b870447ed329c83b14f86b2da3bd21820ab22a2a70a9cefabf7744709845400000009c0732e2652421a82f63410a88ad81066d8ab9818250be5a530ce374efa993ac091d0176a93dc4822c9c3d3f59adf3d98108117e1e532ead34901d01938a44fd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e08f48e5a157da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "413237414" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2708 2168 iexplore.exe 28 PID 2168 wrote to memory of 2708 2168 iexplore.exe 28 PID 2168 wrote to memory of 2708 2168 iexplore.exe 28 PID 2168 wrote to memory of 2708 2168 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8ffb2d03adea92878879c292f3a8b4ae.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3b69a85bcf1d3fea484ad7ff4e8ac58
SHA1c0f03facd9880c18a13f1f5a24e6211dc6fdbc82
SHA256efd2e047ae26b4467b2857ad75d031d005c0e556eab286e54a4b3f8d0a909ad6
SHA512d8985c0d7fa59df115f5cf4ffbfb85111aa3f578ebce22fa541e549c672095aa185641e1cb166d149f4819b94d11c2ada1884afd7b1d1c9f45c0d0dd8a698b07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5732549fa4ad7546c3886f61b87420d9c
SHA13b121f5b8891021d8777f2eb3fa6e2ea272b1629
SHA25642aee1b3ec1f9c7d4cffc836285f68217bbe05ed05b9b1eae2a7910b4ada239e
SHA512ccbe0e8c919f0baa551ad2ddda1b39b8dbc4d75084cc18b5333b491105d1a8d2967487adfb4a7b6b3341792f22239c02f1a99fb3b083e7a7f375627850929838
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550ba320b9dcf3ca18535dda2472f06f2
SHA1d6e240efa1d153a3065552e69b9164b6c7f05d5b
SHA2568381c51b7af213cea8543c55b24d7508d58b2dae17383a5894fffa27cf8c1447
SHA512db66897caf8a93cf855b118a705dc314253c888e881b64d91d019c9f51b2503e0bfe6f0ed0829797e791212d179ed0a038fa85a5b83274882bdd204df0b1bec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f498a588100c73c09352aad8791e5c92
SHA19cfc19f618340c942c213e20bd7b06b0d1bdf19b
SHA256f516bcbb2b702fa6172d89eeb03c966ffac3280a3475a37c24c00502ca574c5a
SHA512d64ebaeec7bdfe45627db03e308a4da7284e84267410ff2c4db9eba999f88f5ed4fda95680a2443b3891835aff1f03fab4794740e6fa5402772a2bbf334b7610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba0c241adae20dc2eef3f12825a0ffb6
SHA19b316d746e3cdfe849052d764550b8e7ae6917e0
SHA256eff05c69c5992ac6b247c207ec87b496a2df93a29d0eb9614dd7bebaa00075d7
SHA5129a1dfc11ce6e42d38e241daaf519893917480272eb9a9e487d62969189e0d59fc5ddc34ce1103cbd1719530c122398978ac69be67b510db5633e11c395aaced8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530b20d23272b2ac5dba6c501811d92a5
SHA17b39292a2713242ab9f7ecbb0bbd021611ea0e5d
SHA2562afb2d62e3e38197507d007a39c69da510db572dc8efbf10204bc3b240c0c563
SHA512f812fbffa1cd6bae22daf6d357e9614bdca50be44fbcf8a58c7ac5b5e9a64212d5373dc8fa01b9d731916dccb5fe1fe21cd1c731487cc73d9008153dcccc6f78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5609718de49d1dca42dd8a4b6633758b8
SHA130d0d63e7120221198ca38ba073d2f8d031da32a
SHA256c48ce9d490077d3408ad4a1c4a0947c35109f390a57f5301a622321c8066a7c1
SHA51206ca19f2d9a5719ad514dc3cf239e69d062781ebfd43346faac6ad9055aa43fa24b9352df8e9b421ab1deb6a6f6b5d8b6ce5f3cfc7e4d3d5fa16154eacd8c9d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb5d5a67512eaf00ae8631842388eb38
SHA1a136c8e9733a7f158de6cf6e3b1e128012fd5965
SHA2560a5ad990a7215cc0b2f646b710428d3c5d7b4c71099b52561b40cb081be0604a
SHA512067bc81bd39d0cccbd9bcf9a7ed23579b87e5e712aec745ba5eab583e65c490f4d4ae377497f09b0f10bcc4cbf12b8998d59763cec94cbbabd84d53f78595104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53211e6b86c46455d31923cbca1435dfa
SHA1cf270b103a4e0dc377706b7d07ae04d40272f455
SHA2564d96945d1b730903bdf54df7299e9f9c03b7de4a18e28b54bc5946398a5ba1ce
SHA512f52e446173e2804771e717417d7b59c1bc501365bac4b0019f067ccc43af44af45efb1b72a11710cf30fb4cb56a45590d88df3835bb7c569d9d216eea1804229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c8d2b1f771c3f1f7695549a816243a6
SHA1ad1c94014eeb2392feee37657ea4d75e5153136d
SHA256ec60882dbc794fe05e4f0f10edbd04fbefdc7a31a07c9534961385a304c53f68
SHA5127151dffb9e19e0f6231e843c8045531dbd2a828e6f8a53c1ca041179432ade5af2bbb0841b8462320ba2c8bd29a9a42aca3042bd9c179d638193217b79c3997c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5b040c67bb342c3972fa7b353bfc6e0
SHA136c853ba484208dfeeca156363d0b482e519f880
SHA256dacac5ba415d5640ab9db2a12bc2a8e3be73664b06389f7e723d867d390f780a
SHA5125649dbcd334960acef78f407c2f7acea5b7cf227579692537880025921271e435016f37a1d9edaf987c696b15d18610a6c46cd25d946e0352ed8ecef81adffaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffdbee6197742d7ae91f2a750e06ab35
SHA1d5f42f30bdf9eb91e62c7c2c7e2fc1a77f254b2b
SHA256124aeacdf60e3e648ff3b518543acf2df65a619a7bccd760f5834d0702637c36
SHA51295d36e483d8ca1efdac2ba2b58da7e0e817261ecc2d0d55ae4616faefe0dfae2da7d5c0f79df56c1d72327b31c405fb14e2b774aea61d0a917da58c455a5f670
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567c110766903348306beac88db943b15
SHA1207c1d720336edf90454a446ee29ffc0a45a7c3a
SHA25638a1400f572a5572a70f6e56a9b946c7c1c6522d67f697e684f5fb60e18b11d4
SHA51210a0e9af62a8acb73665f1424cfb988dd85f3c4a44d484ef4e35b753b3939bb35aebde3e39c6fd8beeab008d1b2bc6815a47b7e81da2d420923dd20c3b92c24e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e87104ed20f0d642ffbc50ad7ab13bc
SHA1d27e76044f59ce32ef19699e20b4dabdf0e0664c
SHA2566559fee66f45ab7cb4b6cd54ef0abf9019e0386b024c2565c874e64a9f6e482f
SHA512e4593a58be98b99e445aacaea402a1105fd14d6d1f8632fc44f7bd3678c0ab5ad9cf52b169ab3bdeecb28beddf697998a814d48215c95a8d258d687f8839f521
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598c92232a2cb6008eef37d86f4ad04f0
SHA1849cf7a75b72cb7bad257679de2347c379901c1f
SHA2565a98df5fd1fc9f664a839b0852c0446c9ded23f3e0c9446e2e1c5e3c6ec29a20
SHA512a91b40a9fb0f24aa025838e3ab1bbd7876424734fca0ba972ea4a33b0dc8d3c8cb537edf3725f30d6f84a77e410615e099b90c3466a0c950843efcddd740a56f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5629885a4ea4810a12e15b016027fbd87
SHA10eb9d34c09e92a8a703b59d7e1d00d4205d0283f
SHA25651ba1987f3d0ed573e69faa5662bf0e2012e2293727ae7ebc9f6ead21e3dbf7a
SHA51209fa2c2a6fc2dac25e4dc6392266912415d42bd7f8c2ab101158d92be6303da8a1dd5333d180569e8e0a9cb25166c898ad14a416d7709f4c9045bae2968237ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3aa335f50812799c17e50724d46ba2a
SHA1f0ac2e53c6127312c5796c621c4fd76c0eb14c82
SHA2563c39452ad3bb22ff5b6680e6209fea669fe2a7aa0466875694fcb9bd2cda809d
SHA5125f195fb80552c84e62b31a342041b6872e13aacb4994cd88df306577fb1d5730f413ff6b358b1576faa6be8d804e7841766bbe97018e7929d9daad03e2c11b2d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06