Analysis
-
max time kernel
121s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 05:06
Static task
static1
Behavioral task
behavioral1
Sample
9651f42677dc01855489031da0affb6a.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9651f42677dc01855489031da0affb6a.html
Resource
win10v2004-20231215-en
General
-
Target
9651f42677dc01855489031da0affb6a.html
-
Size
53KB
-
MD5
9651f42677dc01855489031da0affb6a
-
SHA1
6a2926d71e5433dfb7a9eef70d9d450d2f32fc98
-
SHA256
e4327b23a90492e7e5acf36b134706772d0063161b7461f0b9ce6877e051cee5
-
SHA512
e857c2c766f6563b7de166c72dd2212c3313ba4308f473059ab2076b6da65133b4cf196230f5937fcd22607f551c78f14eee0017ee16fa9ab6ccbf90e4d9bcd4
-
SSDEEP
1536:CkgUiIakTqGivi+PyU4runlY763Nj+q5VyvR0w2AzTICbbQo0/t9M/dNwIUTDmDj:CkgUiIakTqGivi+PyU4runlY763Nj+qY
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "413876259" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c00000000020000000000106600000001000020000000a5be58286535f8a58482f5e47607cdbad1a2b44f0a840e7aa93eeff3c6509f8b000000000e80000000020000200000001f7370f5fb6ff0a3e3f64bbb702d97537bcdfa16b2962d5a51fb89c3e392e3dd20000000fa19ba24d99c28cd74c07dc52e02476fdcdadf623c2ddd0222beea6325225b1b400000006a1bbe16a6d9f16116e860b1ada1490fc0203bbad65e51a5c5dbfe7f4829580982241812d9970b797237c4ccf9cb50913abb321ce7f0ff149f75f8032485f42e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7B7371E1-C964-11EE-8B00-62DD1C0ECF51} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70e99051715dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 536 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 536 iexplore.exe 536 iexplore.exe 1108 IEXPLORE.EXE 1108 IEXPLORE.EXE 1108 IEXPLORE.EXE 1108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 536 wrote to memory of 1108 536 iexplore.exe 28 PID 536 wrote to memory of 1108 536 iexplore.exe 28 PID 536 wrote to memory of 1108 536 iexplore.exe 28 PID 536 wrote to memory of 1108 536 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9651f42677dc01855489031da0affb6a.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:536 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5018a0c47311710478b79a55015c405b8
SHA10fae5125d4acf83fab4e855325320a5a85176a4d
SHA25647ac637bf6d3ff5c7c50035ef11be8d6c2f01b5d0ccab27daf7401174a7eb15e
SHA5122be52305283cc7f9b23a43b302154c3c8b08cb342fa47559d173f13cdfdab55d9be50c77b6d89c573680bf94438eab1f5c74f6f204fd8dc49a7f6f61ed38e6e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530135a4798005c3f6cd019b439a95b97
SHA189a38ba1d86f14237d0434c2d20be0c7d2df83e6
SHA2569392745b25df577bdaffd3e56e7f7956c44101bc1cc3d44c1fa0e16959a4ceb3
SHA5126d90e494d0d4fffc59643a46f77908f0a0b47b1e1a208121ba4d7a92f359ab7136667fe5b490edd584ddcc1126e0c10c6416d9b3285dacf182313cbd61c73f9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5197bdf6a01b5c5d251b021e30248fee4
SHA1605a24daa22724f1d562706dcd337d7f1f1b829d
SHA25660e443960bf3374135fb3217c5bb8cf013052ad4f030e0a73a8bc227481ae52c
SHA512652c7e4e50f20ea4836024709a36c8ce3323b834ff2561acf508db874c58a550bd1cec807e39c0cb4ae4de7fe482162825260d095756443b8698d50691ef3724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d7c080fc5de5438df8b4cc1101f7564
SHA1f864a2c45f6a056c741526ffc07bb00606d15cfe
SHA25681d2d10e3c0abe79d7dd3631e364702643a9361137955036cac55f18c5ee1a76
SHA5126eee55a751d139ceaf51cd6bbfeece01c1b2e2c64d5815b49777ec3367aa85b80b9de389e515cd0654684f7eea23511272145782bc0600b8f4b0679a57a36789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5983de5c5b3209a00917964c9774147d4
SHA1b3cc9f6e17e2304ef823350c1650363e68b98227
SHA256dccdf23dcc55d95c56608bd018a9a439902dc48ce27c00f6bf40fd7b63c1cb6e
SHA51202ada184e3b80cd44051a34ed2f851a87936b67c9b83ec4c50c0046db5021b4542baa474f6ab87404a2d35018f43e4419a2c083056661c5dd37aad80a0ab3f1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515e0b1483b83617454c868f0365bf402
SHA140665a831b13ff17317fcb11a780041ba1863585
SHA25667de1d749bb118bd8fbf93c3a925699959c426afa27701b9023c46b3d291eba1
SHA5124c542b51fe6fe90345e13492d41763e44c40ad7e9f8a4d72753fde599ff6472aa7d74c23f52383341ee760c5775e3e8e73cc462b0f226346fe7839487900ea2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5866090c5712e57e174090a1fb28b8920
SHA12658f25e3592605fbe99b6445065e68f7213c9e1
SHA25609cca948a4bfdd1fb07285c9b4a6acbef91a3a7075a599a07a6a9e4f79d4603e
SHA512bb34d0759dbf1c131c3831514b8a044ab37c9970368ba2b2656e7fce6ec06b29d055ab7cadd0214c233e388d4813f9f2494b07e9ad70afd977385ce364fce22b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58044bda18e8d31d5b18299c7370d570d
SHA125f6f30eed1311a36acce2f46ac8cf2e703164de
SHA256049b3b9d45d28be385ff56f658a752671eb3b74a4f733a87f53c47aef13d4e99
SHA51254a71b2c67d28b40df313bf0ed7eb5534fbb52ff1776595b65b3c1e7aa64521d483600bf7f3e71790f67ef7dbdf820a84d9c53ea4d576cef011c57c289b8ab49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c16e30f75a44b77c1b52adde1265bd1e
SHA184cb200436d346855a55ca855d962787e7bb3af1
SHA25699ea8086c95e5cef7947f3ab4bc560486a205c6a1ca42f81cf6d2864e1d185e9
SHA512d554a98437a3648ec1455ca6f793eaba20efaa737646c1d16a4a563f5d186ac9307f0dd449bb6451b89378118163f1fcf105e41daa343ff4aedd8b8b2e636881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f74c72ef7ac66fba0025432eebcb17ae
SHA1c7726c4822d590be49a2174eed15ff7a57eecef8
SHA256467dee3a7419d7d31cb314ead83983348cce535a5a92efe7518aafd6e32a92f4
SHA5125cf0b46ead9c95086e51ab3f15b4adc5987c03d27d4224a0d46ebb6c26a8a249a11b4a80ff48ceef03efa28d840643135efb0fea54cd496b091482c8baeb69a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531bf033743dcdf6a3071b17b1e37c9d7
SHA152bc8f0578c1817f4f8ca5d06030e8caa7316268
SHA2566601eb0f17744adc31e11bb50c0b341b68e62869563f7a9edc01479a9efc196b
SHA5128af3d171c45bd2f65dd4a21045001ddbf4ebb51a857b2356369bd0c5a3faae331b960044c00e868ad57dd0ba6afea2e3ddeeaf2d223a08775915ba0c850d5981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f66eada4d2adfeb8528ec8b4269799d
SHA13a133e943a4eaf61a4ad39039f564c774d357622
SHA2567d403d5dd8be3e63574f1600caac094f16433d4f0c9574d6a89bf679715d0e59
SHA512c9506e67e36a1f718c85652ea25a0c690b2e872ac3c2afeaf24086b65e59910ea6a520f7e3b82478fd5c60d85718c55304b2269a35b729e953472bcae7a9ba97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e04ac5248a6fbffa1aaef3467bc25466
SHA15731bab4244487c0f4bc6111be242a07ec430db6
SHA256955e6fb847d9da7b0345bfcdfe8edb8c29d74778bbd34dfbda2f6bdafb3cda98
SHA5122b697891345d864c199a7a0917243305ae35f8d04bcf34a2c80fd07a4a4ca151b4778fd78686bf940454145720e618568c1f3c5c9428e5d5d145e8d1bf4ddb22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542ac876a2cb882e5fd18bf80cd9f14ce
SHA16e52553cd770038ef5741b79cbded17539159b6e
SHA256a4c0d8d4004f472dfca313b29cf4be865e5a66cbc1af56a3ecb4d52e828c4f5b
SHA512ebf6243ae4ffdde1b7639faf0f36bceb2741ecf63cb825e30190a2bf30bfc60cc49cdbe1225063869e9cb0b272f42b4cfe0ef82ff597a491fa234e6e7009a445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bbfb3008cc6afc83b94e50f7a495d00
SHA1da97e2d23e2211037578c4621f2354f8feaac656
SHA2568ef20bc348f29cd7e448042f05618c384b6de4d7d3aa4f501a8e8bdea42a4598
SHA5121d5f179e4cbbac90ddfb8452478ed104eb4fc68010c6a595b7821b996c1366208dbc6059a835d0a50442be0f4aa29dc4ed4e20952dcedaf429263278fd1efc31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555621ed093b2b5c2cadc04c5f9265dad
SHA1a59b390423464e72fe9080b9ebfe675b83b36bb8
SHA256e014a6f7317b18094bfc4e3f487927f4966f8cfdff81995c34d18da5dbae36d5
SHA512bf0d9e2535bfb92f225124b02912a1a6986afde390c887dea6d520764fee9460d49a5e3d3bf57e4d1af63649cc1eda3db5752af1e2f61fe3e45acf9e209e1a0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532cac35077931757eca29a5b5d94b7d0
SHA1001d0f63e142b7befbb5d902286115ca221d5ee2
SHA25641bd8f4adb01a29782c8d96c02852346d06f638e0809de829df9fdc3e7718b4b
SHA512947581e0a46e68b41cb2c96fd3e4ad207ae0cd053d563da32d04a2078da23c0175e4a354287fc4882333e27b942dd4f6e21315c616513f1394de8ae02f6a6237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aeb39094a1f43d1a8de5c92354d6f436
SHA1acf832265f37e4e259742904b7d81fdd6f97acf9
SHA256ffb300dab22766a7571e7f06570eff2337be3125e90336ec5800c51842c58e0d
SHA512423892c144699e64469af2687ea1e5d879283b6332794962385a23e7fa47bee91d66a6b7b0ab1f65f045da4e6167eedbffbfdfddca3e4f8e7c92517a28e56468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c07c1042a4a20be844dc2c4634c5100
SHA1c629a5c4c85d0c232816f036256b787068335459
SHA25600926a7a91d513cd55761d4d51cc24c7c53bd74c3600e9251e1acad953bbee46
SHA512fdc6d11a104ce35f16fd8c3d9b806119cd3bcaab1db2394005d00869f3df904162e0a8cc1d45cd76fba0b1d322b4a73b940b8ffbad66224789b3313080ab53ec
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LSNXCBKV\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06