Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20-02-2024 16:28
Static task
static1
Behavioral task
behavioral1
Sample
R7PvUg.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
R7PvUg.html
Resource
win10v2004-20231215-en
General
-
Target
R7PvUg.html
-
Size
512B
-
MD5
e9a21aa3133802be2f620e50d1de0726
-
SHA1
0961b3912a08b2eb3ce976c4e50886cbb83fbd2f
-
SHA256
6b46cdea751ecb514bffbb77e272f089695bc6aac451daac71f92283c7a6f62e
-
SHA512
9ae3766000c73d54dcbabe519a6a6ad13ec0af903ee52d02b80661ae85aa85e2915eb00465067cb97d8cb3eb12a7174e62daab8f1f4faae805509689c4ee9f9d
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "414608368" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008dcd4c448ce8fb42a8f577f49cde6d30000000000200000000001066000000010000200000001a00dc97b414e4013b0d08f2b621e42b0ecb2f0b09d9ed84fd13f1c943b402a8000000000e800000000200002000000051e6f10196c9c18a0bf4fb202bd47fa964102c2c5ed21930261db80c191e8f2420000000559aae8094429e0ba3337f9f733fabce44acff23e81d74dc5b23eed775fc7dd44000000003fcc6fd09242bfbbcdfee7337e4d7328738063ef145e8f1d28aafcd834f69ea5de62f84da25d8044278d3cab5248b4e57b13432e920051e8930b47a147ee8dd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50ee38e31964da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0E666581-D00D-11EE-9B28-D6882E0F4692} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1936 iexplore.exe 1936 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2660 1936 iexplore.exe 28 PID 1936 wrote to memory of 2660 1936 iexplore.exe 28 PID 1936 wrote to memory of 2660 1936 iexplore.exe 28 PID 1936 wrote to memory of 2660 1936 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\R7PvUg.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e959947125827bba6f9b922eb998f0c6
SHA1866f9f1d61ba13901b34875fcb1fcc79a804fb9b
SHA256f95ae92c876bb5507870a1e20da0a664b58c5bd93e31e7a34086c3524250551f
SHA512722525ff2fefb74e9f430c2a30ea6a7d4a74764231c4ae15a5e8986031fdadc8baac518eb253ab47076d5f28d7d8d75e6cfc76ba507ed34063742391db611b06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a3c9b65179650a8f9ba106fd5cad3eb
SHA1f542370e0102dec960f49489ec5c34e181cf9c37
SHA256f8b0b034a1d2ea5a410debb86e44e5e8371e33c66689001d32f0963b5f78debf
SHA512061c446879239228291aff0db30abcc28a043f44b4c760fbc8133ddfca67fd2e824a0c56098cc9f05256e82fe307ae7df8e00f2cb1f41bcbbde547cbc79750ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9bfeeed4069eb2930280c95250d3c90
SHA13127f7a769fa3eec35c7795e1fe70bf8ede4c49e
SHA256b7d62e60305a8b7ec5b66cced1635926355c9a68e0fcf4a698ab864f0cd6e071
SHA512d02f8d0479fc5dd2e4ae5eb1c5a7475fba03458a45c2d8480f28edd76b1231e22689532bdf486be40d3c4e55d08bb8908b198a7ce23576e73ed2089d2f1624f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5ab4fc479cafd160ef966b1a47f7334
SHA1272258817758bf39cbe5129b57b63dbff448e3f7
SHA256b17c1b295095a5f9478f793ec2d2efc42fea4d82899739a1278a62f0e5997042
SHA5126125d523bee59eaa7aeab0447a85f1a531436d497b31960b6d120be6bde2e6d9493df30b4825353e30111cd7f47072021fd259b4f1ba72a82531bd25b874e2fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501d2ba7dbc9f06ca7d30033be7a5b0ab
SHA1496f9c56117734146af50dbf558dcd4b9d47d34d
SHA2564e49b0e0913b73f542875e9c57d9b614576e8dbca2f86271c1c75ff4bd8cbc21
SHA51217ec8393b35d3e06b3d24df94dd4710b0ddffe64c103d92ef06bfb87b9be1b46c0c34fd89df73074514c0f12a5cebce803be37f7849f2b6c5f76b0bdc87c3ebe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512a3637ff83faa8b4593bb849e6b8ce9
SHA13a204c8049b128bfda7a3c205f1d12a96ce30569
SHA256b1be9feb13d3a86fb48f6acdb4e2008011df17612ad8b6e6d5baebfcb1361b60
SHA5126c40e2e1f5a515798d5946d2eb5379973a754141da6bf4ee6afeda948ce414c6e421a5101c7559d80b8cf273c5498bf0186a95e865d346f7388078fbde5ad086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9a71074eac1602f4f30dda6fdec35f3
SHA1f20a79aa27cda4d3fd3843ec8dfc71e8ec683791
SHA2566b1e567357b3367652b86af3c0d3809dcb8844093fc163fd65ecec93d0c6db54
SHA512982976315f29d2c7b05da105bc07c7c5cb9ebcdb5a363a0e329e5a5cda80f1e5b808af89e5a9c8258b15c234a06db0bd73c76ee46a51346df7795d1e259fad38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f6b4f28ae0179277ad73e73c706a944
SHA1da66ed48863c2bbbc42165b1185b7e68790f8d87
SHA256bbb71904abd619dc013f6df9bbeda7779e6a128f9710f36159d7d54c739dfb28
SHA51296aa20aee736e88de5354645a02a182842bba75574831c3c26fa0f6af24fbb7d44fab6b4d5247ffeb0821dd8b78c5e93bc80056db957b9fc2f20f4608750a265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57555ca244584eeaac4c2c8abf7040df7
SHA183dc996c95a1920caea12f3983fed84a05e0f2e3
SHA256054f4940be33649916c414e57fbe9f37561cb94aa75a5c78aa79610494208904
SHA512476dd53b9a23e6a940cfb2e332f7da7ea539efa07f0fd1c737fa4462247abaec42b993a7d4337675c74a4d65c215fe3b3a6fcd6d7b06ead5a9a623f1c8f3244e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf91cace5a25fcfbcbcf32f6abaa3d95
SHA12de25a654531b35d53c175dbf0d0632402358486
SHA256fac546be8a52e0e7c0d31d18fe8bee28ece3b2eb915609ec55a92c921bfbaee5
SHA512c535b4760304a70b6e08651588d900926536dbc10c04e514003eb2694576b59a14fe37d974b630bedf2a39e16b177c7daeae8c3781a7007351f35ab1886577e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500e895b8d4890abce0df748701f9b30d
SHA1a8f7e33cc57ffe43e60085683ce73f37ff100778
SHA256db3bd3c945e2acfddb0a8975a7634567a642a8d13b3272afe4b7737e915e80f9
SHA512729b01ae80de18d3ce69aafd5a1809536c2251176fca6adf4434ace282bf320665bff06ee35e3ffed746a80ebb0fa199253c96541c06d720db2dd6cbc8df9b1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc22e2fa16b51d5af0e6ad29bc2008e9
SHA157832bc29e67215b0883ca42693b29b132f447f3
SHA2562e54f3cb21d23125b74f827efe5da21c1802d8e44cea69a6306f460575c64d44
SHA512f9db2ac2da0c11c01cfddb9bad1069c99f8d98fcab9a071508547e9a56b638934df1870b2b8ca3d91ed13db7f0b13e1b02a06da52309614e65b162ec4dce6ca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eae2fc73ffa182ab351e455c059e70ab
SHA1a3d5134450a33a7239d1cde66a21030c4c4d0823
SHA25685289ed60e4d6ace95813485149a3dd0c124651926f6b96c96bb9636a5f329ee
SHA5122522440630a711632fde1067ffa4f7cb47e2cb1cdeed7eadec981ce44028ac50a4450f34af2b42dc78d16907492710f74c0b7041691fe0b9295b9a1b700769fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535fa9d2b21a01d67d06aaf6585169db9
SHA11a113f641540e616c7dd238961cbb6d643603861
SHA256ce935744aecc3ce46e77cf95830929bb0a81345915648205e98f31161ae8aefe
SHA512e683e4fe80d58c4ec6894485a28c416b938633e7435ef94dad4e269bb5d78684e6a5abd6dda69c079e726d7cab43cc87dc28d66436ead62b16afafcdebad97f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b03beb712861d0c5c2d433d35d96111a
SHA10e1de98b368ec7c43e0f11c3efc341a2f28cb96a
SHA256bde64ac9b89fa0f180ae6f3a0b64818d2214b56e2bec3aa910a6b49982b003fe
SHA512aa6d2a900e761fe43b3d2e7e064d54355ad4d2719a1ebc68e3c72aea4b5ac79dd1fdbff2c69c85080dc0323f01c23274eb4a7887713cf39adc201e9c8995def7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d23e14d91c1ab36feb6a4e0211441e5
SHA13e54e1f95c55cf59e02c4d961e1697ccc77d914a
SHA256de6748f8341caff0efd67516f544c585f63e04828676105c792fafa8a3598c9c
SHA51246bb367a81f8ec3c1ae926e791d8abca98db7e120b6a34eb8f95f07ea268bf3755f5f0fbc19a8b501b7f712af970274b958677d2e22fae0c2e992f01ced85f2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573e36197ec1b6e1bc9d047814a8c3813
SHA15d3259325d88ee3e3b2728e146153bb8537fa914
SHA2568b8146dae46aa2530848471969934933b516f3ec056f28963f3b5a8bc1b73d7d
SHA512d0a162135ddec4d04cba29d7323e4b528880831dd54b2ee54de92bcbacd9be40689f967b7a4bd231f23d55c51a134a56c35ac1d6587ca6b814c658aad09b4c8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50be834b5210d0287e3b59045d3c1c912
SHA13d03226e246b0d13637c3107c6e6847ffa595790
SHA2562da5a0b591e4e60341d926b863fbd4994ffce05abfe0817ccc15c9b5f6405f15
SHA51296f8c211b327c31bacea33a8f6205504545a5de00846c3bb2f216627a61424a40543e1d6eaeb78142f204b97ed5d9c5b1dcf2962cf8a14860bb654e78e9e9c6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecb1e02363a7f2549d19376c2f6293da
SHA10ef0132f05e041a9de20ef56f67fee4eaf88f1fe
SHA256add05174daea79920e4ce3e8a02ca9764eca449f54800bdb260c2627ddff9131
SHA512d3b6469233e1074f0e9df4273f9e678710c26e476f63734eb29ea94163d1823d838cf7753c03ccf83883fd6920d8c67ac7d08a1a40bffe90d9b9f09f89d3f10c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06