Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-02-2024 13:01
Static task
static1
Behavioral task
behavioral1
Sample
997cb460e296ab9fd9333d8ba6508f97.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
997cb460e296ab9fd9333d8ba6508f97.html
Resource
win10v2004-20231215-en
General
-
Target
997cb460e296ab9fd9333d8ba6508f97.html
-
Size
27KB
-
MD5
997cb460e296ab9fd9333d8ba6508f97
-
SHA1
9fa60c231a2f365597869db57fd00a1b20cfe4a9
-
SHA256
765da6944b77a02146d87ac90d3ff36bfb37e12db5c7821e7c183e650d108c4d
-
SHA512
f5af4bfc4dfeeec6f29dad8e1256d1a1c1c6a071cc1514baa596ba2c8017c08565fdac00fb6de0f28d5643dd7f9a9b7962cabca77d43b419b1923c22ca268737
-
SSDEEP
768:xjebhNfpBS5ciNz8nn4hyW5tz8tancHvDwGvtRhVnviO6svasE+vzgiwxY4TYGTi:xjebPhBs097hRR6svasrh
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{13BE71A1-CA70-11EE-9B21-FA7D6BB1EAA3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c04bfc037d5eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000a99c80180d9317edfc5134d5282b21bd437fd64ab95dad6e4b255010f92b18c5000000000e80000000020000200000006bfd4c55a48eb1ea4ab741086ae4ec41ecb7387cf6fb821c32076877e5a7ae84200000007664d407af9e05c52c9edda07d210e7b8bdeb381baa7908a73f6b91f57d793ac4000000035fc3d0aaa50b4682be3609ef5dc897a95624ef00f0a7409032d719d5d534530e90bbc47a1fd2e05fe6e1b616714bfae8c24760ee111f3c0d60fe4c19246980e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "413991190" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 760 iexplore.exe 760 iexplore.exe 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 760 wrote to memory of 2472 760 iexplore.exe 28 PID 760 wrote to memory of 2472 760 iexplore.exe 28 PID 760 wrote to memory of 2472 760 iexplore.exe 28 PID 760 wrote to memory of 2472 760 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\997cb460e296ab9fd9333d8ba6508f97.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:760 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4eed8fe5cf2df10fd8253368bf5255a
SHA1d1a38b79f76a87e82e729aa5f8beeefdcb53e4e2
SHA2563345c86963ab9c57466b226b170c0aabca690a0ef70a1a3db29195242f7e4aa8
SHA512d2e087f1b812025c2a6130568ae6a0bb62db5da8041f2c2e2af978a7b33c4857f8f2f3b66d573f648d8b9299c9f0a525619989a55edcf9844bc128599f417cc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0c7eb20f31820549dbd6ddc4f55d0c4
SHA176077621d3997f25a9bea050733b1ab3c02ac439
SHA256f7f104b3ed80e8e3de7fc92f997892f939ff283eb45089cdde76c220c7309e39
SHA512c00eff3f90594895e9b6b5d9cb206fe17cf81583d2aa2af36d2e466c9ac617703ab9309f7402d757bcdf39d86b2b4b535e57a9b5701ce832b305120c783d577b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6ec39d98b9064ebfcd743dacea8a848
SHA1ca99bf3dffb16d3cc47b794c91b4ed5ce34b2d1f
SHA256277fe5ae10e6ee23b10bd58f67249f33cc887a65cc8e29698130a0c03e6b8e13
SHA512474e3fb6f10dc36956747bc626c4d54eb4827668e90fe2d7d143f2e39b386f4ff7311452c5118338d1623b1721c28afeb88d67dada4f9fc60106afcf56e358ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573b5c6aaba8fe7b24d8d1521cfccbf0a
SHA1854a6a3cb3bba65d58d8a8d60af6dd047c8e101b
SHA256367b69ff9e6a8c15ba810f3045041c04c11eeb6922081fdd2fa498aa63cb2dc6
SHA5124b67e10c0a117214da6500b45a0a867dc7976e89ee77d958bdc6c04fc2e29be661fe029676e5885854c4b6d47da0062592cc8fd4fb3ab59b80ae8ab2d6e6d402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564b97ac9ca134005b37cecd90b8c3bb0
SHA12bf816e344230caf24b84d2e864dbcf0ad1fc59e
SHA25628466395440c6600e27a7c921f9095c27cc09483e5eef5467eca3a3c97478b9e
SHA512720eef5323ff5628223982aadcf50a69370e054332fcf82cddff15fb2968641845cd13499c19a0dd61c10d57764bb9c55cf4189a01b2fc3b02f99d7f5320ecf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568f77a35901685e65a39427b06b9a798
SHA1e374a8c01f072698abb8962e00af10b71e95f936
SHA2568f7c6025bb5116388c889af58eade3bae35d974a7aeab8607730485b8b1ab3c9
SHA5129bc3f5c8b05b474a251dc7feeff867104b606cb58579bb76c7d4f647144e346803cdb21f3112393bca4f5d494b2a9fd430e49a82cb2a27a5dde71c3e20fb8797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5676f42bc94cd99137af4c0ef556115f2
SHA130d5f94220a78d7c521df1278fed0c4b43c97739
SHA2567b3eb68c5b87bbaae7ed288caf8fe1691924d982634c114202f1f9b552300c2e
SHA5126b66b26060552e2d8b09b4af7264ba7e5a3065352a854215b74c6771703028474d35703ef38359867b77a93c65f6a513e86764e6a3d9b1ebbb8d40c0c4e504bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edc7872b0a76ad7dbf16911880aea0da
SHA1f4fb605426801b9c808ea37d4d11d65054c875ba
SHA25614f3e5b0d04619e03ed6bdffa151f3eeae16699a3a6e7c17f694264ad6a0ae58
SHA512c7747ad206667bd58e9b1be819e8a10bcdbb146e3ab4350066b9f699afd095dd3a20e91700ce7bae3ac442cc05e2aea3e2ad92addc199099d421a8cdd6469428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d8eb808c708f36aa9d3f19750a8c762
SHA158e257d7ccf73941ce04cbf97495ce1485ef5a6a
SHA256b3430b298fd4d2c408bb02c0a7521afe847499e6af5d7ec345a19ecd6568c718
SHA5127fd2e1f3b15d7ae05471d158adfc6c3512f253159e6334e8443cf5fface0bcbabd3a944d93650575f85c633ecac96ed12d47106dd88f5b947c5731871eb20938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59629cc87838fee68b3c9617c50f28433
SHA1014ba34c5f28d7fded2970b7c0af353c5df7a291
SHA2566c6471c5030baebf63439c36ea33b4266d2e26e194defee85643e1fa5a7f33d6
SHA5126b46ff2a5795f4c88280d76b1a68d6ebc4f5d5cd0e9e5f56ebfcb844bb184b35d5f7a8aef7a7e4703a6644bb929a93ae7560c0670b2227ab3580f72ac9552936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50916f869c60869a2428dab0f9a851e90
SHA1ace7836aa1bebe086cc8528a74b0f3ea09daa110
SHA256ad7e3f6f5903aa105766c50f1b862ccbb0a59b948f06aaadb0b3af6a3cea4f2c
SHA51217c4e55065547dfda9bb82e5a72120edcd276e9c105471d4ae70a2ac47844e4afa51627bb90a872071749b3bbd83a71622625e7bf7c7ecfb8dbaf8e0382a6aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536ef7323c84cb96b0a80cbd903b335a6
SHA18fff08d300a132a997ced4c01a65584b486335ce
SHA256eb2b71372ef2d49a1be72013938d88c9e39bc4e7d036123c74a69f18f530d5f2
SHA51298378e1b6a6189931dfa463a5af04f7ce5db06171bacc48c0f263587b765fe44f4c53cc4e401857bcd5208022f46e370846976286218ba959214a4d929679335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d06b3b65f96bbe2d1b34b54b944088e8
SHA18239716d7e7a7c39f33161f0d358792d0a82ae8a
SHA2569485eb82c12f5fe143270efd16e60b08c0248ca69bf102194d8fea528487ca8c
SHA512bbbc011eaab889b4917a7a1c526559cfe7eabcf68cd2af91a2a01f4cd447b9359643c78a657860820567369fc275b6b9639b93ceac1bc95c8ea26b05dc8b11a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5bf9946c4219ee006529573d005e63a
SHA10093c9105c9385fd8c9a7bdbfc9fa36f9a6689ae
SHA2565f890be6eebad71cac6078dc52b87a44661c8c9560302e4329d69050a939c320
SHA512da84c2fdcc0bbdd654b6e09638252089eb2df2c2ecded81fb9d56dd36b82cdc114d6b93c4200ad87165b9db7f9ef1be2544552a712d85bc0f7af7a0e20101dd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccaf2b614771e616a1b6bfc695d60e48
SHA1e6219903437a3386a34b1acd8b1da4ffaba2c914
SHA256b97bdcbc4737ef47ba618f773f47a493e145d4942b73f4afc714df0e8c7fe75a
SHA51293b713ad6a4ac6c21d6fabc2285a1b6a68c37a28e6e6b2230982bf8a3f9654e330c8eb33fc6847fdb158a2e02ac8226b381b97b81b8ae3eba64a7b05a5564ce8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586ae4d0fd6776c0f6d66770cdcdfd3f3
SHA14a8f21bbf8472fe73bfb1832f6f70364e0e82f67
SHA256917545b665a054e57e95b05dd2a1b11e68df63fb9ad75aeaa552d506e14142a0
SHA5122b912511a2a3f1b27987ffd1a4e4ba25f6ebc61f4506ca0e1acde0e58069aaa654e07a5be7a4e6d28ee620653b8ee7d81acecfc31181b89950f30380f19ae6ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540c845239b6b9d0b02515f1f7f9af440
SHA1e5f10b9edd625b6f778cd43845a8a6234ab90b16
SHA2568e42f04cc8a694ac44ecad7f793d022901291411895cee68f726ddab36c973ee
SHA5129d1501a5cd853868a148e0b971c89bd6ba017ce3696b55df9e086f2d6a60103b87fb1dc737572e40606bd9144c3d524f776ff0e70c63d9ba967caeadf06706d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56da8fb11eaf9715b42e3789cc714376b
SHA1d734f8da5eff1731eb8a4364e5ad12332ba7cd69
SHA25658d94b5a2c04ea72edd9d80a4e165c2d8c376f9b67745765fa7dd04bedeb5312
SHA5128c0fd4e03990ba96e31415b289b3576e692c3a3456095d5c2c6b8e0b2ad4e8e6479df46f79cab6e866c6fe0e6541d5bc7dcde11b709bfe8ff42d09d56fe29d0f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06