Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-02-2024 22:58
Static task
static1
Behavioral task
behavioral1
Sample
9a230df729f12154d7c41011f4cbfe2f.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9a230df729f12154d7c41011f4cbfe2f.html
Resource
win10v2004-20231215-en
General
-
Target
9a230df729f12154d7c41011f4cbfe2f.html
-
Size
2KB
-
MD5
9a230df729f12154d7c41011f4cbfe2f
-
SHA1
8a6560996643763854bf460f09f37c4f182959cb
-
SHA256
dd278dabc934e2b82d042afe9bf2b84d53c29216ab5de8b5c1273dd763b46d78
-
SHA512
40760a5307b487cb51fd891dac53dd4f7f3e3728c47cc91e7736968b159affcc2b8295589936f38b87907053ada9d904e38166090e83808fcb84b04ede30ae2c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{67268FF1-CAC3-11EE-91A3-4AE60EE50717} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000969d72c3e5a03a40a0257479feadc03a00000000020000000000106600000001000020000000790e083193563d78ff1473609a6217b3da0f57b1cb8e833beb291c336f02ff30000000000e80000000020000200000002855c65b43a529fa385ac9e5bcfce34aca8fd70bae0f5d12dee45fe4f53e655720000000046aed9ba1c11446d498d3b1d30deaa7e6057ddba9d52b29d3b05251444523d340000000da441f28cb43e3d8cc89e922aec4ec498dc245aa22a3b039c3e17e25ae6403387e209e342c65a7c93bea40a74f73a505ed6ef32e98c3f603475f1664f443460b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "414026976" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60f7983bd05eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1776 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1776 iexplore.exe 1776 iexplore.exe 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1776 wrote to memory of 2468 1776 iexplore.exe 28 PID 1776 wrote to memory of 2468 1776 iexplore.exe 28 PID 1776 wrote to memory of 2468 1776 iexplore.exe 28 PID 1776 wrote to memory of 2468 1776 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9a230df729f12154d7c41011f4cbfe2f.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1776 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c60b7d0eeb072d1b6dcc3d7e72f25434
SHA120689769228fb7eda296e2808dfaeea671652271
SHA256d68429596925ad2ad4d25a260f2d096df0e1768ef2fcf33da16fd45e95a851c9
SHA51289d4ae5a225a3049cec3e7554083f11448c68ffb862237598742b170343faf4effcb76eb9e4077abd22a9e40dcbc7e2cadb15f81c2cb4b7c143d6eeeebc0ce99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b02187aeea3bab0efe762e63fee4f8c9
SHA14720fc5180f408217c0496c098631e6ccae2645a
SHA256161042fcc28ab6013f08886b5b47cdcb9f52d822377e57439fea1f4ddec2a001
SHA5120545eedafa232561f4af28008e70b5ae64ff72fa035058542439c814727b0b4cb91845857b79a491ecbf3444dcc8eeb2f9e1a330e6cecfe2157dd7e06789487f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558f41b8c7caf1210f9a3c13aace99f08
SHA1aa5ed801bd702a1794ab47a9e0949e9035b57866
SHA2566822e5c3016f7f792b9b090fce49bbdb5e3614b0ef9727026ddcdd618110b8e1
SHA512377127ac4fc982fbdadf291706ce8c688fd977f0f44b26c8a0532a396a6e9613b3d50d50a0b3efe086dc99d563b5cd0ef7748e9965e43a1bfb3d803ed2f3ad85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5deea235ad730b504c75458b8fd63e669
SHA10a325ca4de157848022f122ee978043450d424cd
SHA25695e75e468cbfefc32f97d1bebf3c09b6ddd64fd14275ba85eeaafb84d79bc024
SHA5120af2fbff3e7dbcd16414b8979f74aea5e8ffc16234310fdc1718b13d942cc9b5ad34d6bd112aa68847d65f9c3003dab66426aa8b2716db64cd9b8b688e22bff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea75377985565fe30f161e68a805beb6
SHA11c8ee521c8a94522d071b13a885960e2a69494eb
SHA2564c1465e2e9d0211f7c7fb538443ba56fb38b91e7552d2ee87b1deb9bff81824b
SHA5125b7042d474bbe5e35bc5966263ffbda9d5b314c341e48521790a5034d8526a0a0983f9226f4903fb873ae1b8be271a5c25561c45caf193cb4374d123985cd655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f82cb195b1bd1e85911b4fc37bf65010
SHA1842ea4321e499dd9ea45beb75dca8fa11d110805
SHA256e7ee095e12ac45c722860c84f7100088a322cdfe851c07b3d16eed9cf8d0240e
SHA5124c9cc44e28ddee2caa8fa92ceeaee2468fd7114bf858110894151844d63dd16b2a686040a4d2d4b3ea42f680ba8c85de2026f13007314a694235509c7496dc2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598f78796fe7388601d9f32a2519a00ac
SHA190b8482c99f13b92ad8a66d0a75411e29049f081
SHA2562b3a95bc0892641ae977027e35fcd5308d4885a27fab48bffb7ae62b3e9fe2cf
SHA512ed674810f1e106f2d620cb7069b40ab1f1ae20dc8d97624cba614780e488dd021fa28dfea915c4992100ec14040374f133f59725607891581e2ecc8a68b83a40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab2c5ae2ec5604d77c8813d65d56e0e6
SHA1aeb80629ca6f0ffaa6196840c2aee1c468477810
SHA2560b64cc7976eb2fcae73eaf544b81173e9b996ab4a4702e33eef78d3317a75d2a
SHA512a9151fe5568ef7764a0115fef2618942e05df35b9b10bf611ea496ce6c7a2d1a44af7833aeaef3ab41bba5a536ea7a5879a0b298ebdec2c6be7e25e99262b78f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5423909d90da817707b6918439c053da4
SHA11f5d87ddf8f7ad7a4f6c2dc1807bbbcc7ab1565b
SHA256d47194553757e9f68479bee626550bfb432a9f89382c7cde7af66ee962ef42f5
SHA512eb113682e4851186a5f9b2e2f84cfe15334b5c3858dac7eb615aa7160babc31c2c2ffee38a532e632e2ab52c16aaa1eb83b588c4936cde7b7e0bb54b1938627a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae301dc121d65a49d4a743048b4d9079
SHA1418a20b9af4f86103c72cafb95bbd46f4390dc01
SHA2565b04959f457ee5133495d627677b0da6fdfff91ee28ca7b35ee4b4e1895aaafc
SHA5128f89821dc10780d633924fbacbf4c012917cdd569e42f35db2fa7f9b32be1f09e068215b34580f49be5aba8273e0a8d4c47e56207313c1ad5771732dc0d84edb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c31d961565bc1664af4713722a687bd3
SHA1101dbf035123e7b68d694fb526b08888e105c38b
SHA256dc253680a2dfbc441ea9839e2cee4b9fda11ddf50456052d41e2287f63334f98
SHA512a27d8e347ba7cc32c4cd46245be741935294c6d0bc3056c04824ae46b2e2eec19d4e14f85bce2c98f7cf3cd061e8cfa7ca74dd4167162de089c54218947fca0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5730f32489530c2998d85b39f2684585e
SHA15343c80dbef52b72212ba7e1b6017929582be82d
SHA25699314ac123760b8ad934de5aeeedbd2ecbf205460635d3676d3d10458f79aff6
SHA512d1c64e58e0a673a7e5bd04f2b6874aa1c413627da7b10c4982ed41857a81ddf891f0aa84ae556a8869f38fc3dabfeab6ae4ebc3e30c0747f8c3cca50c24c536f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ebd277dbc74e7d0645b5d24793e2fcd
SHA11f7e11cac6c4f29f63486d904656fbe2e1337faf
SHA25688061e36f2a6a8dea0a88d4331b9510b6e52b466889315705ada342b29f73e99
SHA512aacfd09411ffb1feab936716b0536452e1e0555e3ea762de44e99132c4acaf1e408e8a01c0af95b8e78378bef3d72fece9798b13fe5b3f8ab3eb0bacf55ac63b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540323c5f5445a83a271c6dc4e22028ac
SHA1f7265a026e774a8bb33341a78f88681c50684686
SHA2567a2ca2c6a825e07b66cbcad08b739e19e829f5fea436957836b0f13813c23710
SHA5120b2cf29c159c1fc909e3d55ad103c21b73c4bac04452f836229dec50ff205c6c1a8f6e25d5e227b082d66240373c824aec609117426e9a9182458be5bafd5ab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de73cd4d18fd6dcfa1b2d9563455ab6e
SHA1200e04eb3cf7b2270ca2a770bead8348e37f27c2
SHA256f5f4bbe42f445baa5f02dd76370fc6a3e36dbc809b7a8428e673da025e115524
SHA512a2da699f5b6bacb0b13aed067c72b5b3a6b5c3c7867fc00ae10f89129845e01da5a6e6a49d3c1c1185b8188d7ec028b59323097a99ca2511607786343ae4ad97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d1b9ad90f58efecb3149af5f9e86ca2
SHA1e3d2311ba0775652ce6612596b10bba27bab732a
SHA256e994342cfe1b7b5ce04b6b4b2bcc2349209cb09f235ce8cef56a8523573ad403
SHA512f59a94336a63feb6f844381b85e2b6bca41c3d4db2a00d5b9a251d82a76ebb4d54cf5e77751b7968e2038e1de25c207e17861baef492a2d7af42c80f5c351b19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e38d7126b8ed58be3bb6bcd3dbf51e20
SHA1b5ecfacc7fd92fe569b7e08082a86fdfff1a09c8
SHA256c176877508c57f06cbf7ecaa4bf80bd23354509a560fdef9f1aa47b605ac9463
SHA51209a354b0fa76462a4d68c94f392c1795330591acf8fd13b5769f36cf1c2cb081f79d6cc41dfccdb69273f17a23aa093c124f1fe4a6964e4a1f71fa7fa8e5d7b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e342411590112b5ba99fd472a20945d
SHA1223544ef01951b2c833ddf630e350b90c13baa63
SHA2563787ce5156edbf54782a8599cf024c38b8e9dc3461316df907978f062b18a11a
SHA512dfea886a070473ea72810481fae54b186e45bc5a810fa88f98480e095fac875092abd024ea7350dc4191d2069f6aafee9f890840c00da844e0e8ab7fc6fc4f86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a35044f8eda4ca43bcca40ee019c338c
SHA16efa5df50dce2c7342346cdaa779235115780283
SHA25617bdd16bf884575b3cef6ddca1ad2abd06073d84c23ea362325e4f4461671385
SHA5122b80c1b6368ca79bcf33027dc3436848d9ceff04e3174aa7857bd601aecb90528fd06425b52579c583b4f4b9ec957abc51142bfa07fbbbbf44644bba8e8c9cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c085d991cfb1322982fa18c41bd8da8d
SHA1b37ea37ed5238b14c95ca58c5445a54a28552053
SHA25661932ca285e85a2a171df9da911646a837f21af9406a20b082eaf9795227a46d
SHA5123a2597b1cc79ba036f83b5a2fde754b7e520b53d6ed940423363b49fb4a8fe7722c91e0ba0ff1d0429288be21c057279ea88bb4dc7ebd4d60f9c54e7cdc93927
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06