Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-02-2024 09:51
Static task
static1
Behavioral task
behavioral1
Sample
991d2b687da5f9e5e9638e983c5bcba0.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
991d2b687da5f9e5e9638e983c5bcba0.html
Resource
win10v2004-20231215-en
General
-
Target
991d2b687da5f9e5e9638e983c5bcba0.html
-
Size
3KB
-
MD5
991d2b687da5f9e5e9638e983c5bcba0
-
SHA1
7e34c845006372d5966c3792eca2c51622f293a8
-
SHA256
7712a1e10d2902a9a172934d06ad633385bbdc9cae69e711211ad3ad3d1dca03
-
SHA512
d0eca7209f2b3e34489a702c18498ef846df994a2cfe56e593c30a50b3377edb0cada99103174179eb674ab9aaf1489470376a0bc35b64857c13be9647c21acf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000ea78a4f91ece9ccf2af1c752085562f0c2d60b4c86175cee0213f5733e047fe7000000000e80000000020000200000001f4a4bea34f442ffa40828ce71c9f107e58274be488f0639a4053b6e8ab50c5d200000009d5c16d645135044c4a72b63ceb4e4cac61f0d642fa1f33a0aca17bb753d2c5140000000ede7420d5e3c0c76661de8c2dd97954ec2b7cc5308407464526659d1a25853f8d0f255e2b8e42aaf73795b7bcf2f55d07646582c0e5e32b4e330b542170aca9f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7410EFD1-CA55-11EE-A5DE-CE253106968E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 803eb648625eda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "413979754" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3036 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1032 iexplore.exe 1032 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1032 wrote to memory of 3036 1032 iexplore.exe 28 PID 1032 wrote to memory of 3036 1032 iexplore.exe 28 PID 1032 wrote to memory of 3036 1032 iexplore.exe 28 PID 1032 wrote to memory of 3036 1032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\991d2b687da5f9e5e9638e983c5bcba0.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585c2c52f79c66b4b6eb709e23fb0250a
SHA11ac6985159aacd5999a156bae39cd8c62c679b98
SHA256e4b86de0bece105c7d8251e2d603a3a8b10e152e24852a938ec8e26a6cab2470
SHA5127964378f7c78de06836b971b0072db1a2da7980895a417ac6371a22060b1f45c1fbe0a8b6a547e95fd29ed143f660b80f1788975206f7d46710418d037ae773e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5903c97d7ad14d93e82eae512eccabdd4
SHA15bf23d32c7723d0797fc250aeb5e9483bf6e9a32
SHA25625337ef2c19d5a91a72896a0fad94de9654dc0470cc853619086c01647e7fcc6
SHA51271651837b8fb159d1dcb0eff694add26c1bbcc16e9beb1cc2f2c23e27b5fe3fd65995a6e4e23fef4099044cdfcbecb155484978b46195b7ba69d40e13ff9a670
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595368bf0f196e6e0e39b83b8a27893c1
SHA1bad548091c24898a61b95e13de06cdb88004455b
SHA256a05701f490db1bf1819147e25c83b5c3639dad9a20c23cb282e39d3f5810a825
SHA5120cf70be7dd77e17915183bcad50882a48e83286cf3d46e5b0bf46f6aa9128078e748141137adc13c835dbbbbc0440e75ad4efc7bbebac3ddfa6187b1c7205616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539b4f8c3008ba3fc3cfdbf85f5097529
SHA1e929c229feb2facc1f64cb57eb5bdd8a4358923a
SHA256681154caecc383a56a78e79b53d00b1af37d9ed242b590bfb15b0fd10e93fed9
SHA512dd44a2741652a37ba9c54de4bb9fca1293d4c5f6c739947ca23d4c533f613bd2235cb3615dacc9c27732e50b4dcf2b002ab72794e32213eb5aea68fa46f12b99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526a46611145d311928262767de78e72e
SHA1f76b7115d3dc2225d9b6071cd8c3c2ed758c6199
SHA256a8457943d2d5f57f5fedf3ff2bd9f31f0ad0dfbd69820211ce140cea9a9adc57
SHA512663df1ba27544f1e570b6692f0b2782be1113af29d4ef5bb66b1f012858508f71b207cbbd1d4ec284f4fadf640c0e508c6a4302385720175d7bad4179f578963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5963a29ef4e0df7a8c70aad490964f520
SHA1924af3aaabec27cdbbfb18605620fb34b644c4ec
SHA256be11f50acd5e414cd99f46f797ead9226a99bb4110e63b18b5788352f857b5c5
SHA512607f01863abc0d340a004d645976300b1de62f1f85b9a47e3005ed345ba8fe5386f59c231a54386caa5d2de39da0ec1606527f89498a95bee37c24cc55c86f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590ea1841969460851308bfc001780d57
SHA1762c366f227021c3239607874c2e167286256b6c
SHA2568d927a4eee63cd14dc2c10a5def74ca1ee48c6db5231dc1c8b6570d4ab781ba0
SHA51268c76b501661347be2b7ac3db0e79c19eee6bd72385b64f88a1924bab13bdfe2e4f90b645527e09ac3b0da99daf3b0a3311d9bc6925659fff2d351084635a6b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d63120ffb56f3638aae51f9f4fdfaf65
SHA1b6c616c73c0958c37a40023e5667131267814d04
SHA256dbc6c8ef29a3120bf1782350982eaf09d4cb05480fe14309f0026ddd4fc24ff9
SHA512cdd1e77372b50f44af1db6d15de36988cd7a01b97f91340cc4035aba8a25ddf1fbe095889b19806e83d610da4c17d3f2cbc924621add8c03561c2428b109e74b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe7dd2b69d7256bf7871d651e4733919
SHA17bfbfa35f39af4fbb5f1962219b3b0b838dc9e58
SHA2564972ca0612759dc2947dd8f5ca21f7d2e40a9aa88abcd435dc7d1a3dfa05df31
SHA5120c657f8a13b65455ed7c0105bc0351212555394a85643a1a36df3a62cf842e5ee3b125440fa78d6accfe5f8b2544870dde1139bf7757dcca2efe211b1dbad774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e2e88180425c64aaf645bb27aa5d543
SHA12a0eb30c35a87f54b7e1cf3d4a8e6b514697445f
SHA256a4a551ea59a872482b92df6f75fb893f44ee909a4c869392ee2844f771236942
SHA512bf8edaee578d897f7cfc6f64aaaff98e1718fd587a481f8d2b80fb97a6a5284bf0672241b69d8b65cde4e1cd7d41158dd0f3b80cf4d654b86a58803c6d3a5b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af98c709ed9d92e8169818e3711f03bb
SHA1a12ca0c6ffd66a834a9dfacc31c734b329441f3f
SHA256eb04eb4170c3f7e9c87b8715df959fec299750a73ee6619a30cd88f9557e0074
SHA5120bf79eb946b99accde460c8b5683b8af22127f5526399275affa294b27606b48be63f5efdb0cb2fec010bde3458a02892aa049bb1b34a21c0d5b99d74144133c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e25ac7ab94770a2d94b1c34c365b1866
SHA1557dad85c31703ff20f6dd9d91b7d2af66b5eaa0
SHA256811a69974173388ed42b9e31d2d08e23fbd7b2a91c1c5a6885ae463669a3868f
SHA51228365362a46c6e34f7b64a87c7d5cad09c24ff215a8bb1e8d60b3759b53a8e1de62483402f515637da2818d618e8f5f55957bfc7ac53b081b1db320f52513ef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58918354018993ee819eec45cca892c91
SHA1de0d12c4df79fc49fe2d5a1a3dcb0eea31b33edd
SHA256f6da5b5caedc0bbf63e1b2123427fe5d3c077276f09b8fec1c2e7d576075e823
SHA5122e116b0109685864d6dad80bc78d37f1c2c0c91b6a32904a70461c918d89086770318a608f094a525228e1fb475036db5875b3f5556400d824f1149661ff31a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e382884dfc12bdaee977f765b4482fa0
SHA1f631912907e72a1d47bca0692b0ad0a0c9badfde
SHA256b2a91b2d7de124c48775a5cb32530be509737500f29de4b77ae1b8dda85cd7c5
SHA5128baaa5a4396caf8b6c57be9957f1bac5b544ca872815e71ef240c02008404c1872ffdf4ff3ddd8ca26b7d07176a0218aa7c8330efe8a2860073bda19b4967403
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527b7f9955d3a35afc789d3183fec3d66
SHA1f9dffb5db39fc1cccfa232685e8ed85100fa7b33
SHA256395e75c70eff165a4eef290770a17420b9d40a85431752b37c621f43c18f30ae
SHA512108f1121b71e9c1acd9b164d1a1b684bcc29c218d3c97ff24aa4dbcb87f799962ff9c0cd1718cd4e7074fb0aca0bf9e210616bf9c08ad2f597e9f42fd6487f12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584bffba41a79db34392366cb9e9dd72f
SHA15228f0595a60d6c307532113daf82b38b34b003c
SHA25633b784cf8b0c8635050a85e78de92ed92fb5f2757322aab3d2fbc8c670919f3e
SHA5123a87d898e0bfe48819d04be31a45251491dfe865994da3d5f958b9d11d7178f37ff882b72d26986104b61d94b7c14d87dd0c10f94c01d0c11390bb5820732a55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ab7767ecc1a4d083b9b413d692c9271
SHA1a4d3c17decf85543aa415521ab7cfe043012c795
SHA256a1e94f15967041d79928c637a4c6ea5abceb84d339ed03b6ff254aee8a0a0588
SHA5125c7b44ac5e306b88d4ab28f3fdaeda0f8fb166c8e4e156e4c7d232ee025f20067f30b67c7122f1bb7865cd4b9fdda83b2b445e83dd697d2d69abd67fdf5ddeb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ba6081dbd01a6860815a17b5bd0e0c6
SHA10fee48d60ed4e415896de9a88f268b48b2eb16ff
SHA256abc1e79d190e343526f62ad526a7955421955fadb3a2556ee06bda49bba38242
SHA51206df7b1824cb8e2be34f394dd160adf5fd77d5ca1be24665907576ec784d3d5fb87a974ae7cc6f3a7107825db68f7c292242a4b0d460bdad805f00d0ff3b1d55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52497aec4e24d61f220dcc50371c838d7
SHA13f327a8ccb9f2460a2476b6a51214349a3a71201
SHA2567de9a2d05e136da4a262435c0c0e534b908d35dab30f68053cb808570a0acbae
SHA512f4c694223a274a9be8d823a8f48da817f9fb62198015adf0419e2e39bdaece3fbec7ef11bc7c8163e13298eb2af3376b3694035001f498018d47031227ad8c2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575cd3251cd142bf9a955cc54eca67888
SHA16f6125e73d9663d3b964295e4aaef18940a3be2a
SHA2568d91788a98d57190d538ca8effd9c8d23273a03382170acda9249171380a1bbb
SHA5126b0c3dec2194fa1e32a02997b07aed9a5945a0126d719135fc05413b1ce1504c10ecc68bd7fda3beb0de4a80e7655b206af0f245adddc38dff301103c046f597
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06