Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 20:51
Static task
static1
Behavioral task
behavioral1
Sample
901fb418d469f260fc426711821ff3b9.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
901fb418d469f260fc426711821ff3b9.html
Resource
win10v2004-20231215-en
General
-
Target
901fb418d469f260fc426711821ff3b9.html
-
Size
53KB
-
MD5
901fb418d469f260fc426711821ff3b9
-
SHA1
f2471c7ae6c7ba6137f4550f60e4d5b8a782e35e
-
SHA256
e45d4a3f1d33e4850164aa1320b1b56bb20d080dc7dbd7dd6b1044b38db5c0e0
-
SHA512
430ec4b621ea9109a60a06555347538bb9cb5151a5cca2b698c18e4edb76149cd41c03ea42dc15c240d340a5d2173eb0aba3ae72e109bfc69eaa2f500bead064
-
SSDEEP
1536:CkgUiIakTqGivi+PyUhrunlYkM63Nj+q5VyvR0w2AzTICbbyoFo/t9M/dNwIUEDK:CkgUiIakTqGivi+PyUhrunlYkM63Nj+q
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f01ad413ac57da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "413241759" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2D537A71-C39F-11EE-88A2-EEC5CD00071E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a0000000002000000000010660000000100002000000009a8c13632505db7c6cf667ddd9b573ea9e8e4b29988172c852159200044b86a000000000e8000000002000020000000057c5c2eb0c90e24f977115a5edf760e92032d86916ba2651ce59f719e02268820000000f49bd9bfb97efdc30514e48c9988e80e6a69aa7451a66b9d3c193a3f15fb4bb440000000b3709ac7e2fbb9e9fc7863062197796f9ae4050e3c5bfa6c9c80f3d4bce14c7ea47a71ebf97d4e85a7de88395973b789dbaa763670cc4644d81818c05dd6385c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a000000000200000000001066000000010000200000003cc4ae8a497bd84553490ebf473cc3bfdd7568ac184098de85cf6f15fbd52c37000000000e8000000002000020000000f065cb7c234d7f03930beb39f47e76d491539bf175cd0aa4e3987695db4f8f54900000000e3fb0f1e6d16a9384669dc1fbafb2837a74b440b30f78fec8e73e07ee114656582fbda3de390e014d60dae05166241810a9b0cb12b3873c20ce4a3d475508d40885dbbeeb03d7834f16715079c41065dde3fc9cfef872cf307957d162915de9c70404e927218d183db5b9a2993fa11c512cc241be61a20ee53ea971a8323d1561efd2b4e1aebd08666c879c3563243040000000ebfdce9197faa2a35ee2a22a727ef2542ec95360bdf0b621d8ce6f3fdfcd04d8bffc1d94ade13d2866c8c16a5f3c81ce50096c80d57e87319804c7d300fd6468 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2060 iexplore.exe 2060 iexplore.exe 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2652 2060 iexplore.exe 28 PID 2060 wrote to memory of 2652 2060 iexplore.exe 28 PID 2060 wrote to memory of 2652 2060 iexplore.exe 28 PID 2060 wrote to memory of 2652 2060 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\901fb418d469f260fc426711821ff3b9.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a346a2ddfae91451f7cfa31ab2127c29
SHA149ddd2f6ad5ee0da33e0e17ba39da0c4ffc12e1f
SHA256cada772362a96d2cdeb08de62471a8806495483361ddc2b26ecd2ddf44b6b13b
SHA5125d4ec32f31438e1594458a44adeeba112b94a44d1f0bdf639536b93a5f9926b46791ec283ecfc69d6688453a097ac2f7439f346ab09cc6a55c033f9b0ef23d35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be09a47c887ee46c6311753be1620404
SHA136ed4f4601be7a864b2d5bf6d9811b56d3a0af16
SHA256493543f90489114800cf33d1997a23e9c6ace805bb3be3fb9b77c486dd727281
SHA51224cc3aacf300327cfa24f44f97d1d00263eea80f2c49b1f8e5804f6683da510347d617531379a5543663eaca4c765849f63e81edeb4bafeb7eed8d1234bb802e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52692733550762078e661cdc909bbd0c0
SHA13f35fde04450b3011d249109e86766d15a302950
SHA2569749d0385abdd51ad4a460a640d0f11e5036f8f3504e7c1b11d67dbaa7d8f79d
SHA5125e0f59b5680ddce065c1cf6cf9c298057087c1f5ee8aff553f14b9234781ef7e8e957f003b6b8c4e2c0c5daf5fc3d08d47c206b24a91d2f0898c50533331c06c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50732b4ca04b67da6644ae4921c6ebd9f
SHA1faf7a1ee902ea8b79aece9d51d167e26e6eca1d2
SHA25687d3c9d54d6050360c21f1700e02090178920222411dad653189e0197bee4c4b
SHA5128c130129d1373a140adc1602d1194f1662dd1c28825514f2b874ded1e9aaa669948a67460e19cadfa6478799d96d7dcea0d01e564d8834e0326ed8e65000646f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd38ace20c5ddcc0da719da02b8a0e72
SHA1671554e0697050b958a55f1148d576771b5d2c21
SHA256740ac035150b17923935a557c28b7dbd94dfc9626525f8234666cee73686d12f
SHA512d134297445fb7f2f9b1847f6e0c8a709a78cf2db9d99135592e495ef637f89ba0191956285f1975c26fb6a2222dbc53f2015a15640cbf1ee9ca5de154cece15d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f2fb0cc324211ac98498f4a3552b8b5
SHA15109e8b5c9bd59cb8a0c6498d45ff5bfe0ee8f1e
SHA256bce1814665ee817af46b8253af6f74d08e1fe320721f5919562d06d2c4b88a98
SHA5129ad2044210b4d2906372afac0b7dea66b59f83dbce1d2d08b6fb770044e1323f68f800ac8d5fd48027b390c8061d9a6b64502dd11856f21e9151e52cdb8b7981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f22013c2e216b96548bedf5ffec3098
SHA173e21a3729d3c22e84780b6ed5ee1574fe063e43
SHA256fa4c15753b9366614225b40b7d1cf7460c32fec5116f0e3fd06ab353bed56aef
SHA512aae580345e3eb8efdb5a6e7d7946a42684b6c50ff1d646bdbca3f428d55238d5f2006ef69e4807942d9b0a244c2b70e5d27f2b60621b2b50259c8e235f846ad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5470e73868d0d846083afc345a940dd50
SHA18247c965b05a6e0ba89b4ddada445fd875459140
SHA256ad17626e903b012bf9c0d8457189a1a9982f7f88ec825030212335eba5271a00
SHA51271459b25d55483fcf6c70ffafb72b5838ba2bb3e18a9d1d66ff3ec55911e8a308290dcfc9735936957e137c11b10415ff20ea1bc49fda1f8a08e1e35562d4b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6f7e90292d0f66e2f22fade92c6706b
SHA1d13f5be12e71b4f6d884bf095954bf02994872c4
SHA256af671a33d828f52de383dcd2a1b74c786506f98d54be0d57dba04c25ac2f7251
SHA51245967b732e1f3f310c7c427c4d07f22b832bd1216fd30043637e1dc3939d42253390b1651f24b7433882cde584f02fdc1258d69c1dd1cfb7a85678f09742b68e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5252ab57c7bc6936c88519d9c5f4437de
SHA176e2cd03bf122fab978255e660cdc7e49fc518c7
SHA256bcc31a875c8ffd8edc8ce383f18813a7fc5da54bd8afcc49e5eb55abefbeda5b
SHA51277d815204cf559f96c4e63f6ab34e90dc05b79ab23ac1a729ad18cde5bc335b8bf5835b4e7ea21ebeb91c88aa9b124c5c360fb894547fc6ecc8cdd0205763740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5cadf906a9fa1dec1d6d2e466d39e9b
SHA1ba8777193407c24c24beba53a99e20bc6ab25d06
SHA25687c1cab24eaff5c44c9736c01b140d9e4de49d8c582bb7e3b2c862cb1777d4eb
SHA512b5b8c1515189a0fa237084111b19ec3d61b21ade9804975dcc8dd513944abf0b08e1967c93d917e942919c2298995d45f01e05ac4f95dabe638e241ee88d12b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57130afdd55ab1b9b13324aeaf37df191
SHA11ded28870135c998fd014c249a99628ed50da147
SHA2564080007c4010330f1710f866e60ffdb5eeec30e470dddf2d546acdead41387f7
SHA512d7124cd6d6a511495e72e3d72638c34a2bb59475af3d4a15cab50183bc7aeea743f8e768c23506c8d12456f0fe20c6e096583fe326b3a46179040bea9cb70d38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57145d3971c2d619418f44340c8770890
SHA19fa707e9df3950bcee52b42277a1f304a7417fa1
SHA256edae0baf31fa5fedbf8d806131f527cc948a0bfd40ff7a1cc5ac35db8da35688
SHA512f7b1c42902e8ca9a9c1d08353cecf237762bd50b5c05d1fcf6830ade5ba1effa6c3ab6f7f4ef63754f761188fa9f6ef23c96619fbf1f041152df26a73242d5b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c73fbd0ffe1c3a327ee42c2df8d65c6
SHA1926828d7a46d919906356d086e7eec99a6e9ddba
SHA256eba69e1f059b19d64a3a41242c1cc559b798889984b39097781996f370610269
SHA5126fe656d733ff51681617c835a8a67c6ffdf8d73eca6ee6f8dede0ce9327d9d8b2c8898111a2fd48e7dd7a5d75ba1f5b37dc29c6ba2a050dffbc1f386245d7d3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebbdbb93c6597a78c3c672d0637a05d7
SHA1d3dc8ee923e600fb47d199ebcdaddfa12c7be91c
SHA256415616eb85756dc3101ad01c58e53284620577a2283cd89295028439802fdfb2
SHA512b724365bc025b5c71006d20e7e915153dfc7e5465a3636752fe9d7f5d6375d93bff2c9703e5bc5b9102a8e300755d2c93b97dfcca21c571992ad0df7931c23ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cbcfd28bc9247096aaeb003f9044a53
SHA1a8332336d6953e9e48ad791a690cadc618c27f88
SHA256190d150ddc47b1e599327b887b12457863afe58fae5d75093300d01490295511
SHA512a6d65f9fb83921a71a39f6bfd7aea71e2bdc15860323daa3bbbbc48cbecc348e902a2d500113ff4c55ab6009babd5f11ffc7f58663e5b2ff6373180c02910e2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a4486952e610e1766a599c5a6f1a6b6
SHA13a06fac73777661a6a28611e0cca3cfd05f7bd54
SHA2564d16e4fb2fd067312f60bf1da599e7e9ad1ceebe0ec0837181d0905ec8c830b7
SHA51225deb96a2541b15410f261818aed9d57ad38d0e9ff7060a855a90057e2ace4ee213dc00234fc6578341face19d5de542c362d243cf1b4fe27aa33328cadc4c23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589b84336cda5f1f44ffd9447d2c4ac32
SHA11f7fdac9982d6f94c5e6dd24f390055788bcef56
SHA25629481a94cdf5e54453b200ade080e019e1fa0f96412060343b05dd6157e34abf
SHA51261a2597ae5ed49ec1041a1415ca57cda86cea109b1084b93611ef22e18c0539efb02e3a9b421c3e8fc22d262406eee9243755ab4cbe811571b4ab0b89b71e1e6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\E3F2LH07\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06