Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
15-02-2024 19:41
Static task
static1
Behavioral task
behavioral1
Sample
IfOIdagmbIcGh6MQoPTuxj4gH3cGZXS9z0z1kQfP.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
IfOIdagmbIcGh6MQoPTuxj4gH3cGZXS9z0z1kQfP.html
Resource
win10v2004-20231215-en
General
-
Target
IfOIdagmbIcGh6MQoPTuxj4gH3cGZXS9z0z1kQfP.html
-
Size
146B
-
MD5
9fe3cb2b7313dc79bb477bc8fde184a7
-
SHA1
4d7b3cb41e90618358d0ee066c45c76227a13747
-
SHA256
32f2fa940d4b4fe19aca1e53a24e5aac29c57b7c5ee78588325b87f1b649c864
-
SHA512
c54ad4f5292784e50b4830a8210b0d4d4ee08b803f4975c9859e637d483b3af38cb0436ac501dea0c73867b1a2c41b39ef2c27dc3fb20f3f27519b719ea743db
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{35641911-CC3A-11EE-83C2-FA7D6BB1EAA3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "414187956" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000580e1c8c6faee54b80ab28599b83677c00000000020000000000106600000001000020000000c196b72d7c41dc1fd32c67e636d471ae2e29fed74b85eb7c63303fddb20abb10000000000e8000000002000020000000b3d67cbbebff807c1c8b1ef6e450ec81eb4cce313061a64bcb363971c1ff371620000000ef407463060c020f6499be19c7800113b89638cc8aac0ec8fb24e9e1b02d26c1400000005b1000e5173a486bca6a9e16924800f792d11b9a9171bcaef33ca14141cfbb2822bd103ebd9fedf5c2b087e8302179e142c735d9079a9838ca99b7a687dbdfbe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6062c80a4760da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2080 iexplore.exe 2080 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2080 wrote to memory of 2812 2080 iexplore.exe IEXPLORE.EXE PID 2080 wrote to memory of 2812 2080 iexplore.exe IEXPLORE.EXE PID 2080 wrote to memory of 2812 2080 iexplore.exe IEXPLORE.EXE PID 2080 wrote to memory of 2812 2080 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\IfOIdagmbIcGh6MQoPTuxj4gH3cGZXS9z0z1kQfP.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585d49d2798aa1f2ebe7b6d47bdb8d30d
SHA1bb11bbfcc4b4876015298f1588b566f2f3459de8
SHA2560b2601c520719328d4288ebaa72553c26e78b23ff8e69dc909a675380379839b
SHA5127696683499aeaf49d566342ed8048d2b0e129908302fe8ff1b05b35f37f9cd249f67832217f36946751353cb99ad8e7983ffbb162dfd0194bb015753bfd88ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee9d572ade4aea92028e2e243bfdfd39
SHA164bf862628383c7ae0683f95a83571cce40ff400
SHA2564a51669b00d6eb0ea937040ef5d820ecc1a251131cccb0be57ac3da9f272c2e3
SHA5122f3d688eaaba41b13578bcfbda2870c993d787ad9106a8846c9b534ddd535342ff31c5f780664b9decdc513180d33c5013c95d4d6a6551b0a861a9574e1470e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5883c59b555feb4bb47d4fb026673699a
SHA19a0f0e78d8f0c3335616415105e43064dfae5775
SHA256555b4ba115df6fe509f50c046d1e958678695024f2761ffb848b6f572b032539
SHA512b23c09cd4123727987d7e462a048e794c16b494727f0b6e80c0b4e77e6f5b97264f017302b642b2a8e9a4e9062f5f9f44d3a51f0afac3d37f780954769d343e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5deee7720f8e096d7bbc8caeb4a860f47
SHA1a334093183620046a9760cea489c6496097cef4a
SHA256047ab1dff066f7c42c9bedd909e1f32a2ba116619a273c8621a74c6794b155cb
SHA5127b8662ec6834247558726fb4e5b8e9ace624a7d4e58ca65de19651555a4a7747ccda50225aadaa69f9c7553256c8f98c6a7d7dfddc5ceea8ab910599cdf1a761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575c051e4a237cb582ffe95424e0462c6
SHA1ae971bdb28d802aa16c06ad6f761321cf318c20d
SHA256316c6d7e40f08647d2523a517a9f41e70b0baa04b97c8951bd33776eef0b9398
SHA512f3bd7c1d0866f7041d9fa845200dda698d75c6ce7a97c710ee22125e91e14a2bde09ab2f75441b7154c7b4582a10703650abbdc4e8555e9fe9bbc5dd73aeb452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5408fd2321c4862ccac89c6fdad3ee7b4
SHA1d7b78ad1aafeaf755edffbfbc5bb6980102177b6
SHA256329eea22ba48bd416aad0d5497932ca4894cda7c61f6607155d04f0bbfb7a503
SHA512755d2c114ccee064219cd209fd4f8c55892b767bb31b9b5703db31dbb5893d4ca4affd323ea21b4a0ff9396ccb783660a410a743ca9e9df12c4c3a7699c77782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c3fc3f4cf4e1246ad8c4396b0b71cf1
SHA1192d74da0b1e1135aadeca4afe0c33485f8a7c04
SHA256c24e04f5b4830b990546a36618033fff94a3239db7818e294cab34c39f2bd5ad
SHA51225d46a195321b5a360bf333eb1f10348232a5885bfa579a544f3d750111e2357cd5ef01db4fcfdf251a4ec2d47c4d045705acd780ff607db15dba6363418b7d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5846083a68eaaf24fb5b59bf0e4ecb284
SHA1ab383088f90e18b0f80522c89c708ce28c2b1b86
SHA256da84504e78ce060cfe6ac28d876a4dffb3af5d8d0ba7b190349f189d259f11b5
SHA5125acceba956827e0286a7db68f114799ead5e9b7dc4b31b8f607fe2e39aff1d01ad336d025ad8ac5e33543d82128532730144956a41efe948739c0f8ca8357324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546c158e836fce29a3515a2049a3b64cd
SHA1658a6b5cff662de10a0352a5a646edf33c64e570
SHA2562a491383c42f9bf3504d1de93c7fb34cd9e444074d8f5772ec1310888ba27fbb
SHA51224b9cb06d4658a4a33a2470cfa3253f47457e3202953f3aa3c7667034c3f281e9837bee313f75563d63a092cb9548f760cf31005386918656cf0488ca913df08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2ebee8cf0e90248902799bc9f93fa48
SHA14dd13396b8ea803b92bd9fdf773440000d3e4e3c
SHA256dd62ae0c76ddd969e2ffebbf1deaa610a33e3fce09623a654540644cab72e65d
SHA51291d75790349e3d14b8d9b647f1ce84b07711faf9c3ee35c2ae878f6134d77497c7633705b446f1e8fd8a9d65f8717b3949ed891a78163401942754aae801de90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53604370e9f225a6e657ad95bc2adee31
SHA16b4b3f6e8ea2cd57740122253924b721421c7314
SHA2569385bd36eb92f1bb2ac72547a5df68ecc9a44122c9e06d471a385de9c997ca6d
SHA51216dff16e8fb7621d90f334945194fa4387956e37a8f1de5774018e1e4797f4039392df4975ec6bbeeb0999f34f071d4b7d5637b60f9a30bedcef74e702df5842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530328512448de6acf44e97c779da1cb2
SHA1ac60b86a8440fc288c8e81f5e1fe6b0e1c796da1
SHA256c4008e77341ab2d61df96fa69cb685c6d25b9dc1ec45022f65934e85dc3dc420
SHA512679d9af50300639f7828ee99de45a76cea2f58bfeae79de390475bc37480f4eb19b996ad2654697a82cd4fa78eb81038178da8a115043dc36bf6a3e0b7145cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e526edf754db765f5c62833c6a136e4b
SHA192382a888880e28dad4f3f09112d60601959e92d
SHA2569018afd8c81dd063580172f65b79699b04d9c8716503c7466529fed42c908eb5
SHA512788113758ee3d528c24d10615eacfe6ac6ccb03488cb252c2774c825b3766edb7d1e71535837e05c458a4e6b75efb783c1d50dabe85b80edc807ae5c745e228d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5484826169c285fcb0e5c61710ebb5319
SHA174371f69851d4d3ebefcc85a787a5f1f0d56fc80
SHA256b9b741ffe1cd69027bc37d9baa433b281ac7a4e311b550f8d5ea3668b468e24b
SHA5126ef9fa4c4b8b7550c77cf2cfc71df5761e5940d4ab8dc63270791efba69bb7d7cf36d90e03038138da8fea3e5fe16c584acac8ff6f4d9d2358f16959d8765d03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50568d42b05cc4b19c40abe1894ce7e06
SHA1e048d75070804463cb94590f112c625f5b9f89e8
SHA2562a0f3b9dd6cf846ce1852f03f897c884cb71ad38b2142ba3d42d3e5a33bb095c
SHA512f88effb7ce54c3f6d3c562fd74dd71cf8d0d995bd21815fe0c49d7735f04ba95edc31777eadd4f5cdf6ffdcd7217bd1cf9144329379b0f3d9da8a2fb2c062d6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b613801c504ef42e4240aaf76b4fa8fb
SHA186e53da50a76c41e9688c570f6b6180b6b5321ad
SHA2560c9e03234ecd52b3de9cdb7d8a3a4426ac2953c4dfcda156572a5dc1558d783f
SHA512e4f96190051f070491a1f89c278ab81900eb5085ffacad5dd2194811edc3769d81015269c74318ca6dc3c704b59f8d239187d905460eb143c8611e45a834097e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ffc0f0b249f724278b8972f5d584696
SHA184dda472587ef17bcc05618fae04627943f3d7e8
SHA25652545afa5d4fa94ae356e026971b715c8b4679b7a37d5f20cb796008feef1b9c
SHA51283b409d7b78111c37a5eaa6ebad49e0042b5eb609c92f27a794c9c5afef2503d8d9a1fe3a61e85cb5cdd65715364c3f35979846d3f4bd9526cf71d09b5c3c2f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bc0cc7ba439764daa6c2f1ac091a3ea
SHA18367d2c6ce66019c150853f99a5cf843c38c88f5
SHA25611e397d11fba4784726052dfc28d64ed735e652ab91c08b73c65bb2123802563
SHA51270930dac1dcd7a373a7c8c2c26f7374e6d015daad37615ae1ff2dfd0cf87fbff1e5249b322026c8a2145d5af184f7de445c7d6d6aec0b921deba11ab8439f526
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06