Analysis
-
max time kernel
137s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14-02-2024 03:41
Static task
static1
Behavioral task
behavioral1
Sample
9aaadb2a15f75c0ba7ffe489477fbea5.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9aaadb2a15f75c0ba7ffe489477fbea5.html
Resource
win10v2004-20231222-en
General
-
Target
9aaadb2a15f75c0ba7ffe489477fbea5.html
-
Size
16KB
-
MD5
9aaadb2a15f75c0ba7ffe489477fbea5
-
SHA1
d2b308ed16e91344853266ce301b97adf3ce2664
-
SHA256
a5f013a38b59ab4363ecf080745accbba8355a276294b744e98c58a174b91a02
-
SHA512
90e7b1df23fde9bc0ea6471e1caddd7d16afcb2c62752db9ff1cb0705cbc1018a74b39ebf653524115e2781f1349dfe6651b2d808ddaeae1ebcb2bd619a59a4a
-
SSDEEP
192:F4/fN9Na+Ot1Hk8VBd8d16RWxqMMq/9JKjswOwpuqSojGXyEQMawNd3qYP+x18o9:Fws1EynDWxjKjswTsqmXyEHrVP+x18tC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "414043936" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 905b5ebaf75eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E22F3271-CAEA-11EE-A371-5E688C03EF37} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb800000000020000000000106600000001000020000000e0f8e09a27d75d2a9cdace60cd650afc87625822aea122bbad867432136aaa1c000000000e8000000002000020000000e4d93fe2206f9c8bb445a0662ae4b98edb425aa1cc85b950099dcdac4286626d20000000bc8fd5fefc4f6e41e6913d03db609aaccceeed2966bf242223787107267b2c9940000000a86788b9549ff5bff21d013d4b0f0c5704cf2dc807ca4aa481a4cbf4294229f80a92f0e4e41d7bfaa33d2518f302e8f528bdb27b594c2f5e3c4f2fba1af88436 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2448 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2448 iexplore.exe 2448 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2668 2448 iexplore.exe 28 PID 2448 wrote to memory of 2668 2448 iexplore.exe 28 PID 2448 wrote to memory of 2668 2448 iexplore.exe 28 PID 2448 wrote to memory of 2668 2448 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9aaadb2a15f75c0ba7ffe489477fbea5.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2448 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b60ffd0fd4e6269cc824116cffb0f533
SHA1bb60d5277d5d0aa56f616b7342bb4d40ee5a59b1
SHA2568b4769504ec752061de2069e21f856a124d0966296cc2fc3ea9efd568f8d5a5b
SHA512c0cf63f0b086f5f447576bd9af66e21ad8435e0d630c522821e6baee00e927b36bade45264f7b59362c39b31365342c0f86ade0c3e41f90eca0dcfeb51dd71f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fa476bee1b39f8e0b81974a8658ad86
SHA1f5eabffe3c7b46a6ba31e05a43f9d835a5374940
SHA256e9f0177859d6c5b617ccf417b22147f1fc228aea7b17e800c7ba8426df268ee9
SHA51238afc4fdf3e91eaa8ea61c2e1a9a0027a0bc29e5a5cc803eda97ac0257536edd8c6321cd295d3eeba86642d9df8a2ee64dadccecfd436c4fc5d2234fbd757f27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b369e55db243021a38595e80b84c27e
SHA1c883ea61bd7453e36e00884f6b4b862f517b0ff7
SHA256c510bdacfee8b6334c5239ad88cf2daff2bb794b37cea843b9e3f601128f65b8
SHA512526a8eda15b96b42be45d34b11c580c41ec5ecfb058e64b503a13a3efd5dde21aa8540a87c3572825bbe38386533c5c10d1f4237c30d4fb523c7569e68722b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ab5b65e360bf3b02fbfd7d3715d3652
SHA182e24e1e84c0ad291448a69f4f9234988585e952
SHA25694be97b2ed12b1ba8eee7797a33aff53906a724ff6a65e9ae3eacb70a64c3e87
SHA512b7de25a95552303e1486e4a1988315113738977e3b0393fb9002e2cd2681ed0b0f32764f190ee3fd41b65ce7aae91bef859c6810609c028bfcb208aec52d8886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5141da9dafa55309f2c888db18e2d8650
SHA1f08d4fff5fdef15178e5771c4ac823411858ad16
SHA256781f28cdb2fb523dccba0a25cf75cb75e4bd1725990df2a6bf76a5eda848afa2
SHA512b6d1c378588710a37d5424eccf8fbf509fc7f8d36c4dde76043cc305a8774ea8b13e9ae0630e9897d9718cfb6e7bbd38af8ec635062188d2974accb2204cc369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500fe80a7735a49e7cfd3728f76653d5e
SHA170fe73169d99860e2b866714abc26c3fcb3f6213
SHA256979463e04cebbcc544f888de981348d35d408342821f11c045af6ffc0364fca3
SHA512c9c14a41994c12c725810ae3393fb8dcaed55cfb3cd3af5dfa2ae04f847e3d9effc2c572bc4efe3acdb0b427ccf5f7b1cb2a9c764c8da692c2fb8962b9b08c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521681f00dcf9d2df59d70848c5dbecef
SHA19107d1f42e8a322cbdba1cc2eb17ebbeacc823e1
SHA256359c29a52db1cf5492ed77fa9c9768750c1880b37c1592ffb8746fe92b71dc6f
SHA512cc6608b6c75c2f646acc57e59766ddcb8ffea097eff9b9d7b6be5b27e0685f9d2caba65ed07144fcd0d294d9fe39bb55e2065c996d07958e4ecee230cb72f3a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596d072b282b41526fff6c453c17a0a87
SHA1cf7decbd4576868e06f6e854d9320b3cee25d44c
SHA256ea483123d7ea3e71a33105eeb3b0da35d222590bded79d6f5cd374b7e416e95e
SHA512120858a932b551e00c09e4d4dad92a334573a2074d54a24883f53409a3170a2952078821c7b5fde48ef5940668bd4e5885e3ba6e47af246937837b410a5427dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59744a980aa116ccc929a0e1750d56573
SHA1a8fb2252b7348e7178fc5e0cb9aeb63c15b1d804
SHA25612f3155f848f9e772984e1623d79df76cf15c5e1db70592d87854f52b6ddc947
SHA51201b34d800f6316294504630055264726a60a181d694b3876e0634ecd242eed436a62ca619cd2149b9538fd2b4c79438a65df967f1ad100f8d37b797b795fcda8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6b1b16598119d9a9b88b6fb55ad773f
SHA1c7cc54ec148c7805558559c8bca77715c6b59d33
SHA256a7bfde41f7cf577158077bb04a2d4e3767fcea7b159de3c49a0018a50d330d6e
SHA51228ffbe2cff834075d261c88a6f64aafbc8a053f65bf325f41329c542e26eb8c2e2ad11f4face41a3af727a18e585806a9e54b38f4716f850bd58d3e57815e8a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b402ac4dbf7eefcc5f3fe50ea7dc4cc
SHA165cd9976ecbb1ad790ab2732eec8eb02839f55e4
SHA2569df2fc92ca70752e65287dab2709e67b1e6dc36f10862a423eedaee7b732651e
SHA512778946dd35784feca5e4fa69898d557bb225bafb63d369c6d5b12cbd77ec4e4aeef4e601f75e1d2a8da80d1c51f2e6d7b766325af75ee248d97537db9644392b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8aa135869372153cb09274b3a1aa53c
SHA14ebc3928713558f31b79928f0abb4e1ebe1b0d49
SHA256cd80454300b0d24944a3a8e044af64d475ec533e477832e7ad8e554ea20b8716
SHA51270532588e387f55f2390c0c6910067ce7cd08a1418e121f0012a1390d75a87bff95e8833249488b1005313527dfd26c65a2a72732c7565767d9b2b75303df47e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563c561e420ff1a26d4d3b57ca810b89e
SHA13ef7561e012f3761983a084cc9f86374b95f3471
SHA256e8f6e288a56799c7db05789a4aafbc8b0fd1bc911d1821da7d582b840fe9edae
SHA51271fe2c200cb600d25badb9579ccd560a0857ad316796fe69d15fc0881e40b1a0610f9fe2b44b474a73478f5b68e05b795a86acbc03ae5fb68b9dec5f5b2d1c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5589d466756653c2b94172e5e15675cae
SHA1ed79485b5abe1d4b4b854b1cb37db5de766ec01f
SHA25685ffa2c0121ecb7a5b1019172af67482b974d0633bbe1bbf327f1306c2a9d0b8
SHA512d2040e7b8d7ee14b2452423d44e3872565161c16277af792ed460e4b4fd78344313ba2bfbea58ed18942b81c08d7370a6d2b1dc41902ad5e7d3717aa77e7bb5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b17eb747ea557511c137cbd2304076aa
SHA1610bf2e23d673cdda9f2ea7f4065efb963f7787c
SHA2569d6f8705c14a801477a69d11683007d00c9eb8c1b19c009366ef4a4dc5890bfd
SHA51273f66148be795254a54e4d3d02fa74e310cbef0ddefeb41fdf5e8a239cfde6d86b92de320b1fdb1cca4ca8f3df5bacf0caf42c04563de83fb555fc613988f3a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52546cf932907de2c5ef1fd6303392c78
SHA1c0e13fd58763fc8da72322d921028d850cd03eaa
SHA256608dabb50a7652b95513aace082e772b7215b3e24182705a4e76e0f5750067cb
SHA51280b84f0362c7bdf8e9a432441b4fa977aacdbe0c1a1706ca4dbec8cdd047c7e012a5479a77d2018740bedd93bb3942b76bec4f36850d8deac9b4661f4be6cbc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b5e68ad74d01f5ea11f266df74440f1
SHA1e83eb6d343e31ead4f9af0e464db1b5ed4114fd3
SHA2562f3f5d82e1ff9e7b50a8e1421781466da2833fd95b253a0e85b337b4751eff03
SHA5125e518e6d7b45e76f0176db9848a9412d26e9ccad53200fc97a632e02f97235d02a51fe7d18279b142674122f2919044722424ba23be4d0ee38b218de37e65385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51adb5cbaca559fb65229163c7a561755
SHA1da4c698067297413eb3170aabf317b2ef81e1747
SHA256d73677c9b7ceeb30130e43d498e12ad7f1afc7b556749039a3f4c087099710bd
SHA512d3442cd5fe93458b03706a6d294e851bb2d64d9a2841bc5d764a01e291e62de4c2837c8b156917df0f2a8b53f1cb5f86ebe60f53a8e470fb9ba728d6e3416642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa6ab06197984012e0929d19327b605f
SHA1bb35829df3fb9dc8812083394a2e181a3bbb00e3
SHA2568eb8d8cfa2e71573ff2c151aebcc994196026bc60748277f13eabe57296f7cca
SHA512fd0df45896dde3a5787b8613c47ff70d50e0807293908b6343cd85ad67f12157cba20d68c1abf3a4f0182d40366e5fff389f5bec0c4f0fd5ed108944fd114fed
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06