Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-02-2024 18:36
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20231215-en
General
-
Target
sample.html
-
Size
217B
-
MD5
659a1be6801d8e0715a737f4d5d511b8
-
SHA1
122240b49ef21946c332ae52b4a25c999d3b18cb
-
SHA256
b1f8e1d15ce220ad29a172a072d804da5cb579a3672dcdb541f79d2f34d10451
-
SHA512
c605894c76caf560edcabbb9bcbbf73d23958593fde3fb0a573716c6d65cfcf8e6918bce8abefe30a0862f8045eb3e6f247a7a2e1ef7119c978bd1a7099099e6
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07bec65e25dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A22419E1-C9D5-11EE-ACA7-CA8D9A91D956} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "413924857" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c0000000002000000000010660000000100002000000035e06201526d988659a83e39bff61a09c6af4e499c2f18987305c2fc13d4f7f2000000000e800000000200002000000011391d568df80fb5a07c0b215b2ac6a7b2999533cfe55e19fa87d23049c54d6720000000cf4ce3a746f0387f916ffddc6181dc18d1103a16fe86aa3fdadc45d80b7e886140000000554bb746cd9d85ed46ca9afedddc228daa6aa3eef1eba3b85d41ca7fb2629bb4aa89f8e32ec2cf87c65ba1ec440c8b2d906ab0df9a3a8ee86a45a014bc614db5 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2844 iexplore.exe 2844 iexplore.exe 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2844 wrote to memory of 2136 2844 iexplore.exe IEXPLORE.EXE PID 2844 wrote to memory of 2136 2844 iexplore.exe IEXPLORE.EXE PID 2844 wrote to memory of 2136 2844 iexplore.exe IEXPLORE.EXE PID 2844 wrote to memory of 2136 2844 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acc7a22c792a1bf18795ddd62c3f29d1
SHA18bbcca7913c299e104778035b4490d692444069f
SHA256514edbc77e5730018e03054ab5180b5025b0f00a23d2e180caeac39e47c00ff0
SHA512b925f7c37bf09ad2c0f199c0b84bb4bd24659f8ff42eab6b8f364d39b64c06de0a2cf0a7e85704e551165f49cfdf2c643cfa28a6483baceef89132c948734a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff6d9e44a82cf9c2932259b3c5134591
SHA1e512d96acec76ff87e619dda2764b334f93d2814
SHA256cfced53d61137e440b40a3fc44632cb36a36b900c5b54510b846f67379b34493
SHA512af6c6ca2acfa966c461608dca1633e7140536f220ebb3e68c8011576f45508f8ef82ced32a7ac6d5506d1ab656a2e62f084bb1ee5a5361cd9cc4ab5ab91e8393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535c1bd3bc9b9e7e19ebea09c87463572
SHA1c270ce2b3ab3a2e1e0847fd64722e47417eee56c
SHA25610dc0805bf0e4f89efeb7903e6a86c772646fb26a619ef2b9b11e0105fe384fb
SHA51260c9c5b6c1191bc59d6ba564f6b976748075d52d25943ea2ee249840e2d909a1f911785bf2155ab1873f8e948934555d409f590837b054e93a8ee8098345bc51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563aca9e29306b73a6fe7f26a6881f0e1
SHA1b54a2fe3952f5445020597500f7875fd1917dc4c
SHA256643d964e65592547c716da6d376e83b76d9b1ac7225fe8516b599b2649eab682
SHA512ada4e5e58d86af22aaf474ba2b6c42850e933fc8106cb4a82f18811532cd35f3d974663522b190d05c156ef95c4ca1ef3ed59668f783c1f219ee9b34ffc40e23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55749f5a45f179c55bede0f3b1c9e0b26
SHA1286a88dbff4dc9965e5fff7cca5918bbd08e2b82
SHA256da4d39c925eb537737ed46a0eeeeeec10ced14bf9ead2d4aa25606fb2eee858e
SHA51285013bcac4630eed980e868581f84cc2667e81475107d085a00ad8fb00f6cae4b8162cc7357f866092c53083316ea086e0ecbe3606f2ac820a4ff93f25ad05a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee69a3f28ad4a11edc4c60edad74c524
SHA1f56caa661b837633da6aed509e07478384fb22bb
SHA256206ac1a22e20d9c230e7d8a6cbe6bbd10143c24d51ee1a9c2c06e476684b491a
SHA5123b1ec2f03b4ab5caa2736bd4aba156ef17ddfa02c559ef67897238f5f94b68fbfbdb06bf41d8933dfd7fbf880057ac5e17e86839eb848a78cf81a3435da2ba1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bda395ac12ec7f1d4dee0619686069f0
SHA1e46f528e8229991e19640d4e952bc218b691f419
SHA2568efe033ff8760279c9953031f9bd24a43887c80990056cb7e3e46ba583490503
SHA51296c77fce9205e8cd184fe4480da3bcdcf7480dedf8b1e2dbc1bb5bcf76feda821ba05fd4182142d0990309ccba8df5c8153159f31d0a5078b3ff04a00f3f9300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c07bcc427ec610c947b7a228211417b5
SHA1b73d1f7471c4b7de4e8e1bcfe231f4485aa96281
SHA2568829064d60e2497d608908612f4342e6aa4913d2fd8df70d6f47f7d257584f1e
SHA51264d31a9ccb1b9cd0bf76d43ce856c4b1d403e5d9044a356c03f711b7d1c35e8bc874caa36ecb91c2556d62eea48d0b34c4210b8eac64a13beef9509b8a27883f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5984afe52b4cadb43ecf0dc8877d8d7fb
SHA17f2e1bccfa51938acc830fa355fba29e2f0a7a7c
SHA256c26f4a012293d81e570b5bc8a18fa67ecf4fe56d5f1a9235c68918ab7d7ecaf2
SHA5124a0a94460f03c3f30406178e18348771b89342f9e3b39d2da1901ec42b5dd40453bf0e3dbaff142bc56a4d518ef6c8d9bf3072e5cdc7ab9ce84a2136036f068f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c1a2383e2662409340aff3796085511
SHA153ab527dea5dd556cf7744515c50e628a214890d
SHA2567023d7246f5f76989d5509f8be460c03295949b943528bb8a8317c93f78bce51
SHA512f4be070a015da275ea442581d182f3538dfd949113a2478ee1a2ae0c16b45edcae8b9de84486defb824f10e9521121921011bb8beef05f844431bec5f519c38c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c3a95b27ffe8f385ffb98d942160573
SHA1fbc1c690cc28397e299975156cf6c51f82175d59
SHA2566468ef15a524557339fe83f7fbca8ed56b4df769ccf8603c4754538a06d67c5f
SHA512c26cd930d1c124e93c5424a1e5a2a3d854bde2572ccf531b778a995a14ad0be883f0feb4b7beb1e7b7c0c0cadac2da4dc55807f816be0eef01895b4f59045b2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b925036fad4de39f9d4a64647c2641e
SHA11d36ee56eae86c8df664e94a26e53cae29dc482b
SHA2569e7d6490278e7915000a83e41f5ca3512dcf00833bea64c1de7c5e230edd84a3
SHA5128399c11743b1df68114eafbc09c119561862789a0d417cd081e889c6996814ae2f7d914fa1405a3b49ac665d3fdcebd2488161a43fe85ee6f0174340c37d270f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06