Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 23:51
Static task
static1
Behavioral task
behavioral1
Sample
97f01d71b8f611a9b72b0a55b23918c1.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
97f01d71b8f611a9b72b0a55b23918c1.html
Resource
win10v2004-20231215-en
General
-
Target
97f01d71b8f611a9b72b0a55b23918c1.html
-
Size
1KB
-
MD5
97f01d71b8f611a9b72b0a55b23918c1
-
SHA1
b7542a74aee4ddd57aa59e843d00cf825311e5bb
-
SHA256
b6984b8436d5ad7c5158aa41297017032de0600b60f347549a55ccd75b1977f7
-
SHA512
9faac7177b2b0ea3948844153b698aa2d0b7f8c3e63113a72770c5cf2054264141e31065d75f205ccf7bbbdd6a91bf7a2ec863ca897e8c0e4c9074b6f7a19bfd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a883829c536588438b4279b7bc6c1930000000000200000000001066000000010000200000003ec97cb143df855f573a65ba75438dee409b4f1caaf52833651f95e6cb11b3e8000000000e80000000020000200000003869501f084d17794ec39042fe6c901359ef7cff1f893539ae78fa5247039d3f20000000b241cd81e56bd194395da9d63db3a788eff2681f2b2fd207cce08d46bbcdced240000000aa88d0f73d1bb4471fad45648be7699c8b3cb0228ad3448289b389ffc748de3e23a3f318e46e46ce0fefa02a87d2733ae76f4d2e8d4d9c6b13e4ce00946c2ec9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9CE02F61-CA01-11EE-8C00-76B33C18F4CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e01a7c720e5eda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "413943746" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1440 iexplore.exe 1440 iexplore.exe 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1440 wrote to memory of 2188 1440 iexplore.exe 28 PID 1440 wrote to memory of 2188 1440 iexplore.exe 28 PID 1440 wrote to memory of 2188 1440 iexplore.exe 28 PID 1440 wrote to memory of 2188 1440 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\97f01d71b8f611a9b72b0a55b23918c1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1440 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d398365bdcdc053c9369a9ab5ec6a011
SHA125ec51459ad82edf24624447e1bd93b9ec7b9e71
SHA256ed06142af20aa2249438b803be43d36c79679ec7064fcbded152c45180c9df02
SHA512788c01af32079c5bcf4e061e4dc5268a8872608b7d34a490b379d92e262e159e44cef66b80a74ae3b456182c29daf2ab618095d7cd3a7af6e8071bed03d6c7bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547f316d59c4ce37edd3308fec1fdada2
SHA1a9b5e8c1754f1aa1c06b53e65755307b245d8a56
SHA25631ff7da823aae63ec818e1332cb1b8949ad469625183fc759f6a9de07885b28f
SHA512e5ad11cea41d089d8522654be93fcb63a79ecb5f465de24f4587e7b45314502244a9525b50be29dbb3a28ac2daad5b1c0943ecece14216d633a8b7bd71aa408f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5945f7615c391f3e5c8462fb0bf16c875
SHA1ef0d446b316a06a7c540e051824fa552ec0196c6
SHA25689ad2c95b79bb4558c822a9884200906eca8171c34a5b57939377b5f092789cb
SHA512dd421090f750d933fdae6b4e8fc91abbf60b20ae2c9d2dd1629aa84ba47d082a73f3f6283ea31efb5386ba7638c8b5e1393d2509d4f54f2e29eb406f5c678cf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cca22845941ca4cd50281ca275261a9d
SHA1b419b444db949ab09a613b8ce7407cc447b75f98
SHA2568bae0d5dc763f0356c8c7f5117bb4c6e6536a42ba1f69e11e55ba5f360a9d342
SHA512b7b54694648b86c89b90c732eb23a1a45b7c2c48487c5739759917366e11eaa5109765a9e4dc9dd994eadfe196e8627083f078369cff544ee1dd6eb818469b97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58403e375a4ada73baf4bcc8383e42218
SHA1c4d25f78299d4a463736a2f69b1decbec3431d8b
SHA2564ecfd75dbf48b412a245e4f436eab552e3538d84b85757462d56191439601ac8
SHA5128eec88f035d05a716c0d0d2eb30bed109b0f3ff6d738d0eeef649548a30aba2ac3a66d80d528f809d3f5114377e6d272cf03bbd2713580dbf01b959419fb7771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d7075572347ac35bd45d65d4c9807bd
SHA1f90a7374efa880286d2a8e08bc8a74d0007569b2
SHA2568cc562beccc0f549ec03ad5738fa696473231c730500ff23600a9fc9c4472727
SHA5125f00e5aad48ab59b4fd114e9c3f08108ed7d0439f3b3df764a2c87fe4ab72fe7423b4f3dc64b08bc6536d0885211848ae0fcea650b0151d8330f7d79e8a6b5bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5675203b1eb1e40d098fd3d8a35ee6dc8
SHA156f011ce9ca9a9f4ec0eeb3b7004998502adc622
SHA256341b65f438b4920b20bc7f7c6ee1a77320264eccd5477a75f4fa609f0cfd8941
SHA5125438c04dc443511a4b603147577d72a547921f0a1233e16752142be16df35275c56ffe743dd392cf7e6f7f6237609f59e9f86a95b1569186b0797930701eba2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa52e2531f178e25e8bc3dd6f6f3af21
SHA1a4a22672d4ee02549e1c50cf13cc2e24a0d6764f
SHA256871bd1766d946f5c853c27ac1e9a76721273924f2908c277e65a96051e6280d4
SHA51205a05d5f2b8c8aa032a194ee27cdc5e97df3df879520295335e6fc2eabd5c12a6640c294371802d0416fa534e7c2d62f5fd06d3e4b21af73f7dfaa1ca4d9c3ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5065225c63d1ac679e985257363d9c460
SHA17a488a16183e9165b68e38039ecb6b887555748e
SHA256861a1f8ea3861fe777062e71d7e4cf2347eb527d33a3d54f9d8eb8371ef72c49
SHA512d87b9e70a464f6e7b248d774c9d3fe1938a758183259e73842dba531ff54c785191276bf2c988c623f6117844da317815aa7cd284a72f990a99bd41353e3b285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5975e8006da44df3a3b85587fd0fe6157
SHA1d69671c826bac9810b860a51658dce33c8c84b46
SHA25666df4b5837e9205f9b3ad4e484fd510267cba2500e05ba8932d8dbc9e34cc921
SHA512b329272cbd12bcf9aa5f5f665838566e4dc45dab05d8af1597de1036cb2bdff11e51dae11260d37c38d38bac98f83dfcad66a642cddc0b5e868a5b2560f063c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9654813290e17c80cce945c019abf55
SHA158e5fd1ec6e2d29aa93a0d151d6b712e0d5c67a1
SHA256e4e8d53b729b5662e4580389f6d65654eb5800f7247a868632bc2d966206ae9c
SHA512b26d3d4592a9f0419bfc4a7c57ec3b07737b06bedfda6fb165e8d5309789b80deb29a368efb5466be9cf166454f6bf75375e0d3b67618e0c66fd0e12be28fe7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546bfddba9e7bcb8f1aa28e16635da5ca
SHA1504090cd1044c0dd34d442b5f621028fe0384424
SHA256c7c490b6a5fc8d5e6a8cadb35a0bf82993e802d16581859db09a625606d01dd9
SHA512540066dad99cb009120f203e7bddc668bfda3ace537e8055ebd93d523e052c14674ecded76c1070a2a785a86a0a47da46bba6d55a52bf3452a44cb5d616f2cc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535aef3667d784c62018383d0466eabd5
SHA149aa0cfae2f2d4f291cf376ce2749b75a848e6b2
SHA2567e97e589542a0026c592e6449572bc124bad47d7189b7f130939f9a4afacf2ec
SHA512013448bfef9d51b05b89a6eab5a0dcd6f55c10ab8d0df718fc5a385b8722dff0eeb82b328cb323975e707e04c894fb9a77f4088d453b632f24f3a96af3c90274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ed4225d63a7566448b0fc7623e36de9
SHA156efd71d3e685b7eba8d7ec17b038d5ab955e475
SHA256e23c413281086d4e4149cbac7f180a5322fd2007b43bb9f5223d0e353d0a8ab8
SHA512d3461081a03a358bb46a058d099a05b2032014a9db0660655284d701af46d12d0142344f7380a506a86e0ec999f741f0e2dd8d041a0a2da65268bddccafe33c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5500da93fc7609476031e6e76ec06814c
SHA10164e14ac1b87d661eb4cce94a10688791cf538a
SHA256d7bd1cca041f893d433a15a601441c3c277c3b9873d4fa1e5a263426af179a17
SHA5123bb8da27ddaf37a0c01b11c43f36e1c02af212cb115b6a4c9afc358cbc636b03ef3caa74a47cfebc7f31807ff58d5489bb1a60abff4d682c6b678cd51f7b8a30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585fdb7056824608fc309d358dd3af3bc
SHA1e4585a1d7042ae94cc79f6d049e8265801fe730c
SHA256ad4754d6ffb9108dd0446e77b77a1f6023abf3cb7974149e524117a1c35c4d5c
SHA512f92a429e54b484d29b84362046a4d3ef46d71e639b4aed67b0fa81520198355827f3baffb5ac650186877c568b7962122812828d99b8b5e765e366f0792a9787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54beb433594babfe8177ea30bf0ac005e
SHA1de8cdb91c3f5a19f358385d405c5f4acd28454cf
SHA25624beeace185c4f2869ae8aa7aa3310cc69d8a0d164bbdb114bd6325aee038c68
SHA5122a00e5b7c0fd524a746fe29328f8c25f71b43487f3d37a150de47f14c644f140ff417e38510c7a4b851dadf14d967e2eb2252d8972ae85e57999a194ddb3c6c1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06