Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 10:15
Static task
static1
Behavioral task
behavioral1
Sample
992948fadd6a492248413984ddd6ca49.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
992948fadd6a492248413984ddd6ca49.html
Resource
win10v2004-20231215-en
General
-
Target
992948fadd6a492248413984ddd6ca49.html
-
Size
25KB
-
MD5
992948fadd6a492248413984ddd6ca49
-
SHA1
6fbbec1cf9ecfc17bd865d31c3dcf2eff318a9c6
-
SHA256
ce91a5a23e50d34bb27cac425dc8cc64a0c76a97cf562b04eb5f906f85e3b130
-
SHA512
b9dfead6be1312b9853afc2e431fd1a6efe4a4a1bece44c39c83ebca4ce9f3470b2843a9fbae72e1f2b0f40fd47cfbda5808fc43e1724cfce98249a5f165469b
-
SSDEEP
384:bdg2H8om/GwCExEOUtxKTeBfKTpY3VVwCJpcwLgWQQ/U4yhoy7jfIWrYc51IlSAL:xg2Hlm/iltITe0GFVbNG9p6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "413981202" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D31FB761-CA58-11EE-8E99-56B3956C75C7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000a0ad0b6b64e55e5e9e1fe2d9a0207f8a11a167dc9a3494bd706163ee4a2ee307000000000e8000000002000020000000e6b42840fe3f25e3f4fc16cc6398e51e32c7da9a09826b01b8b17100bbd9e1e520000000e359e89d2316c23f192b2d9b6106687f2fd59adbfd7d62ae4255c5e373c88ad2400000008693020a25bd6fa1331812a2a10c63a622a4fff2bb4c053fe55fa14e91f8ec8e5d1c47e6275540bca8fe338527cadf70a6a2d8a5840563a92ae86934cbbbae7c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0f4dda7655eda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2108 iexplore.exe 2108 iexplore.exe 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2344 2108 iexplore.exe 28 PID 2108 wrote to memory of 2344 2108 iexplore.exe 28 PID 2108 wrote to memory of 2344 2108 iexplore.exe 28 PID 2108 wrote to memory of 2344 2108 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\992948fadd6a492248413984ddd6ca49.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3aab5a8a559887c9636eecf2a009b16
SHA18ba6d3fbd4969c91b9648931f9833086952c52d3
SHA256d814a57aa57f199f570eddf1a0d9ad7e81f7667e01bee8ac44b7f25e2ba71daa
SHA512bc6e60952f8f09e02fb7a2705a319c05eb045203abe6131aecc9d7e7a8b986f7543603c66170af004b082e230270b1a99295bb2d0b6c8ea749863d2a9238f5e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59953d1a4a0ae88f512371f5cb5b110b8
SHA198cecec3aa2ff4c88361f615e4d69eab7788f7f6
SHA25657e0cd7c282a34f2d1131ce0d8ee1d7c495a82db3a13d72b743b8826285a9d9c
SHA5125b8b056e8615e6d69b7c85770d4e0e7c1353cbd87b7020d1a6e0dc6e6022ea84f25a2a8a782e3b2be8d273555d92492f3871f24d313e3b8de3622959c2e01b3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a6ba28e9aec5630a83513a7dc3c843e
SHA1cb5f72bcf0c6a22f093e760f13a9ca9e6ea12624
SHA25638743b9a8e4ff4e6d061b9c0047bd5a52be1f2bf2afb2c96c26d9815868d6a79
SHA512ffb2b2dd985b829415c73e0b8a61242613637ef4523516fd3833f79ce70f624c8b17e319cd337b7e0b9094c0c28f7d2781015d2b6003846ebe21dab6960aa07c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59afb0e9b7677804c14f53adeb3d9ec51
SHA1d291768b333bb82345716e37b9cfa35e791b88db
SHA2567e7b4adbc6601969744993d7a24266826bb4e42d84126cc84808bdd5913e0b68
SHA512b6bd6f663926c8e6f2b4db6af8702fe6659499264ebf4b227d206daddadcd0a359559af3af2f6e3a201f34bc46f09b4b98c396afd625adbf4004b7c6f0e09c45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59996ae74c6a546b65f1fb6b4291613f9
SHA1ccd18aa80c80a22076bdd739bad15c5ed596d78d
SHA256eacbd1dbd866e4357f41220caef6688f72f6c7d1cbd861a322426135acd8630c
SHA512b33866e71db85b2753d8f679cf72419e53f8878a00d65c684ea812bad5a4496dd4ea7c455420902342ef12f31d662a4aeae5b4c50f2f4363f3d0837149003401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502f5324958d6040bcd6f098523be3b60
SHA1f0055f3746a746b01ac701836dee353469932e28
SHA256a5b743a97ef909c6379a65b1330ce09226d9051c0f65241f20fe4dfb41bd2e04
SHA5121b5d17bc377a96f9e7176d5136e8b396e8007ed95fab56a370500dd9b3c88324818d9c982ac86743966bb0b9a3ec8d943a182b4400a2e525e8a4ca0051fd465c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d54c076e746281cbac2c7d907ceb26ea
SHA1ddafb8488267d505975a7f5e55578ff8a6420122
SHA256f92fd4833452ddb663aba92b72eac75a36cc6a4987de0e7f44ef76dcb55016dd
SHA5125a604a6d965ca741dc8b3d36eabc33d8588027a5177fc975bb0a8c5e81536b0eebd2c134d762f42f2894c7c18b54dd94a4eb822dffc8c80d0404cf3d45b403dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5552fbe064635e52c15bae296d9c45b2d
SHA1f5477c97ebc7cdef1f8e7e013d774d235d8722a7
SHA2569326a4807bbfe318a2104e0e582c7d701728271681851a58ed5a6fda805f02bd
SHA5125d6774a38537a22ca639b77d0ef37cd2c77f8726337813426ed7d6f88bb3b99dd6d85f53f559f26cab634ec891790f252f893b218d3d3953de12c1069b01e067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546c24c52a7c7627fe1cab351ef968728
SHA1490a3106ab948cf5816ecb11e44fe698c5b837b1
SHA25629a8e5f1c053fad2a0db72c3d1773a30b4a2aaa039ef8c35aa9b09f5730b6254
SHA5122ea0edfca1e4047d52483ce8fed408420beb1172e5cd398ec57aae9059ca6afaf4e0bf8d93fb9f711448f40a4039a74294c840f27634ef36ae5f30807337b920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a275dc27961a1643fd7093f0b3de797c
SHA109b57699e03facf5fded08c26293bd70e83db44b
SHA25652e22f3581e4330a814cc4a0b5243d59e6a5917b8ba9547a9ce68c5537b390f0
SHA512b3a335fd48f47d7836b75fecab68aa8ac5fdda3e066fc3f72efa7cc2df56ec6321fa0e623ccf1abd883bf759c60630b59da29852ac2777c507b7ed105326546a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aae6ff1e9886106d47640a72b7cc4fce
SHA10e497812899bc91fae9414b969fedd85debc123f
SHA256b1f69cff2327a1e240909885f73d812956a3e62736c720de65672b3831ab0869
SHA512e5fc61efac4ca67a11fecb1ce54ae209a521075386f588a5e5d90837190452b804cc70aec9f37e6aab8dcb9e2aae7ca328887ed9d864cd67918ce1ff35241db5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55591b9911872d8e5ae3bd74d44caded5
SHA1b816660d06d3baa6ced6e5cbeaa720d75a774e2b
SHA256a6856842d2fb9e3321cc0b072742da8a7a687d18456cb80025554462ce857a77
SHA512e65937f9df73983cb3366dcdef61072bbd23172392ee63a5651387145163119f8d0793339a726720717800224717550ba96ad6d440329eb8c4fa2edb6c3a96e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de5b772690b2c80b09500d1600aebf5a
SHA158627cbf47a01e2d91ca3cc49dffeb90052e0937
SHA256c1e5a105f8c3d114bda9b870bf49368c2bf824dd088b26265dc5a763772ad7c0
SHA5122d6bb71a3c4835565534ed3e4db71a421aa54f2c37ed020d4ef494493d7250098736ed1ae1d23942722217d209b8f25b3f81ea558308a564876912e4705adf72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500a98bcde8721ca343bbc749713b2ee0
SHA17c4c4bf43a7266e59f9e522bc61890dc64e08906
SHA256ec97da5d7318de97f6d9bb3f73bb0c45349acfe5b57ada64bda759b903a793df
SHA5120bed48bd7a9ac6eab4221534a256e25134b5613eb52440b136c55a58c5514b7b88292873d3f39f109f4c59c202668d57cf1dd7a22208c4f268b8dd75c62866f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553690d6b0f886d3c1039b01e2d402c1d
SHA10e31e3b65b7f61b8f97b4c0afbe24b89f9451446
SHA25662fc8a123ef5b98c0f342311a7bf495266815bdd2782720e7419e50c502e476f
SHA512ebde9763b56e44f37cba11d05ac7d8a05584fa778354fe4688b34ee8f5cedc6f79c2a116c2bdb7bee2e4af711467aa6d657e9d880ec02e0d56603e2d2d131766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc2b7015ca885e13d5b72cb932599778
SHA17f721f6c3e98685020401b2cd5239507e4279eaf
SHA256ffe83001635aa7c6a8cc7cc34f632fe644ae704fedff006d20f9ac042efde58d
SHA5120810cd56e5ae702157ce4707427e2c7ff1c26b0ce94eb90f3ffaa622d12a09b616e8b7fa1a2dd73132c31cb9445f2811a2edd052b948e0b87e50c8e97c69fc9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fb41a411dcbc113f2fc5da3be2966a2
SHA16088b94f04e69283f1df3ea3a3fec1740f47734c
SHA256268dcdb4ee45e03fa89cc134d42679a21fb6744d08f433797a3f4c0712caeab6
SHA5129b68de034ef1b6ebf20f6500505e415be0c5cf81d9d12576886f3b35d194ec525118906fd93fdc451e568e5c633cfcc384d433297d129ce80529b08d2686ca37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560b3842511946a017b95f9109a559afb
SHA19f9a1662e41fbbc08c15f17ca51827648e44b665
SHA2569eb493cd0ac1c63d91659bf72e2e415244444196d2d6b0f0e144d1ca137b946f
SHA512b05ecc29ba6f534a5ff8cefa1b3ff256ded03925e2e19dd224d04a6d2df602901b162b8d699cef225465628265b31e676b1afa508db5c9a7b646e68fb86d504e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507fe2ad99fe27c710971296f95617d55
SHA15fe6ee229ada849d26217e0842b750f7a4217e25
SHA256d43f2c3d00c8553ef69d0931b9ba20b41d5152343f960070cca056ac3d905313
SHA51238f0d9f910d1c90a5c7659bcc096d52e3692ec36f2f7d78a4c348370d700e97b971a9d8524f4dd773d565c52d6a93bd9d66db0a3a9e739648890aef59d811817
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06