Analysis
-
max time kernel
68s -
max time network
72s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-02-2024 03:27
Static task
static1
Behavioral task
behavioral1
Sample
email-html-1.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
email-html-1.html
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
open.gif
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
open.gif
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
quarantine-notification-email-protection-logo.png
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
quarantine-notification-email-protection-logo.png
Resource
win10v2004-20240221-en
General
-
Target
open.gif
-
Size
43B
-
MD5
325472601571f31e1bf00674c368d335
-
SHA1
2daeaa8b5f19f0bc209d976c02bd6acb51b00b0a
-
SHA256
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b
-
SHA512
717ea0ff7f3f624c268eccb244e24ec1305ab21557abb3d6f1a7e183ff68a2d28f13d1d2af926c9ef6d1fb16dd8cbe34cd98cacf79091dddc7874dcee21ecfdc
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009d182698a4727943a65bc6c9ecfd0fc5000000000200000000001066000000010000200000002ea433de7cf26d12b172d90957caccc3fd171b1b688b06d7ca0a94ad79f73753000000000e800000000200002000000073fc6f38bb07b1eab707df3f972ecb9e0ab5667e04fce0abfdb659932ddf506120000000f991b9dbec483de04687404ab2dee435fc7e871586537e7e07b38ce0e81cf3a3400000003f0e41da0e54d3fc6376b783897fa3622419358bfd211378ec868040a7080270d6ea4a864e21abdfd5b9b5d32d04ef47355acf621f1ea84f6dc2ff76323b6cf0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "414734344" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009d182698a4727943a65bc6c9ecfd0fc500000000020000000000106600000001000020000000cb5a1df6d1cf6dd2829e1b55e1a6f059f0ea697f79e0d5d15733d5ca95aaf644000000000e8000000002000020000000e95581382da00d871f5fb3ebb03004e9e54aaa89695b15ccf9a1a18f65c2abff9000000065e94e976a9c59db9265e1acd992d9d5ed63b652cd6a36b4298a1b80da1aa7ffcc1e0e6b21bdabee15866a3c2c96b7a4d890f0fb491bf06cf0714f81fb67e1ea49e044c4844633584f8281d48479e95d5d1b6bc5a33aaa78f63df86483a1267eb6b1a06901bde86768d5345b636d493e2fefcda4248b522af142af823df408b7b977976f7a4dbc8702050fae18b4b5cd400000006edb0b859c112187a2d0fc94c776029b703b48139e223c6b0750c4ae2966c8c03b36d74f994b9b5de3287e4eb65fb9b1a4eee89393aafb52afff668499235010 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5DF2B831-D132-11EE-8466-6E6327E9C5D7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d087f9323f65da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 300 iexplore.exe 300 iexplore.exe 1692 IEXPLORE.EXE 1692 IEXPLORE.EXE 1692 IEXPLORE.EXE 1692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 300 wrote to memory of 1692 300 iexplore.exe 28 PID 300 wrote to memory of 1692 300 iexplore.exe 28 PID 300 wrote to memory of 1692 300 iexplore.exe 28 PID 300 wrote to memory of 1692 300 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\open.gif1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:300 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c75fc2a390cc98f04f0ec9e9147029d
SHA104247c053550b583a07ca3f41dc2f6dec6b5bad1
SHA2562618f47b706ebd3f78b9841d5279f751997affee34ab29103668baf7574cf5ee
SHA512b2be70b2aa614dd2bb36335d5532c31f4f361ad6c492665f24fab397118b3583506c48a8600e92333f1a567a7610ae188a2c03085f05faaafa881ce850524c4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7ee16d2dad75c78fc798814d41e9682
SHA1bb89e3409b9cea764c3ad43d31a28e6cbb140936
SHA25694c582040dcc46c9acdc68703d5271f1912b79b0c5efd59eb2c938bb778c964a
SHA51266d66cf6177afb299e5c73369bd90f4d818b83fdc6b9ab9da1a69ce835bbd0075aabe196bbfe6768850ed320865599fbcb8938af173eac548a9439ec2e8c0087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de5be8ded0a827ff6e14b706dd4a211e
SHA1a437bda68189ed8d5572c86ddc71299af80b3578
SHA256d033ccafa58be18319307394e1341e6240245990b0f80161b4a059ed96d934be
SHA512a126414a59933910d782e50cfac887fa1c6c8042d7629e8434c0f0995cf0ef5e7c9d6075d612a7da05438186b41cdadee014b25b3323699e4f55f1c849a88b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548d0eaac7d7b5a71cad12ffc6dd74ec1
SHA10965cc89ec21267ae8a07c33e2208e4d977d11f8
SHA2569c74884863b7a56885ddec56686a1aca4e7520eeab29817fe12ba1815eb00d00
SHA512b8f90d926e0f4e92985591c85094b4afa0f1f39510fd8210af2e25d13aaf383f5140f3a9448129182e9f1d31c42d6ce45465a9bd236f315f258118e196c25494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6f81f7066fe8b7a8c7b0d3f63b22ce9
SHA169b0ede6f89a04ed6bb0b66c93d35f530d6f10e2
SHA25650803c1de3f8c147d4c7e8e907899ff7d41735d94986c8727309bf2678cca108
SHA512815db289758a6850e0dd6ced072cf9ef00306ca7c8c98d733b640a3663f0a7b209dcd49667cc71a221023f0ce778219ab02e51f47d445e07dae8f394c31b3053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59892ce13f3e39b1f7ec48afabf8f19fa
SHA1e59806dc3b9d325d76270d196fa735b6b1725000
SHA25625c0a37415eed77d57f3572195031d7bf3443645edac10895033f504347b4835
SHA512db05e58d6612001cca2e0105dff1445df7677cf00438e6a96490ba5cae1abcc0aa94bc4bf24d79c4b6dd3d2cf85b52396cb89652352ac2b3ea71841549be0f5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3fc12ac043be910d36850bb386ce245
SHA120c919dd3bd51f2e62868515f67106fe5ef5fdb7
SHA25646197e2390ab4a2ac516d207350e9d1ad4be456e28c4f41afdbe4b5ebcfcaa4c
SHA512c43134b5477bbe7d6b105e0bfdc4d180282872c204e34d0701250749b47e6ba235d17cb5dc918b7cbabd916442e96447c08a40632407a17b3a13666b22fa8d51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f66e4b2b3e380e27651461b72a77a763
SHA1324174bd469bb406064f5a529fe0413d523a99e5
SHA256896c474a7b7172f4ebe693791b2762e26e34cba35046ee67d4cc02fb415d5946
SHA512a7b5d3a7bf207837b9f3609cd8cd7f552e03a7165f912e0ac9612bdf9c090eb3024ea17a65cb08ae4cfd3c34be8b01a8de2eaae48abdc0e11cf73938dcd81b4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8319f3b2e4d3574bd2c698d9a975981
SHA1b72829b88d880d6ea099c2a639eea03126ee1d79
SHA2562ba7f46c57e6b871b23d2afe434e20c84125af341259fa78be11b745f7b96de0
SHA512b96e20cab42d8cc292394ccb15de386271dc0521779630f97a70d9af92900468f3e7c4dcb48922f5f5ace29b715b0aa15382e5d25387429aebd1c144028742e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f420ddba55259ea8e485dedc50df6e43
SHA132d4b6f861a257ed5f3e1b71aadea5f23c9a6992
SHA256588cb11f5922271db043ba65221439f9208cee02737d8fd48df684a87094a15b
SHA5129a93acd36666065c462685453a179597aa4481a43c350187ae5d799974f236d4b3ff29c66e0896ce3d55faa53191b4204f70ee46101a985db5064cc62703c931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588d7de2013d36caa460cfb3f4c41d519
SHA1cf7d5ba212b16e01f1cc3f527f87a230cab6795c
SHA2562ce3f9da30fc6a9b3a8caef0c59629e3607d57d3de18b906161c0852d6927aa0
SHA512f4c9d2f6b25fc7970b0a0c35fb968d88f5772f77a47ab0229eeca013b5c8f3cfe8c7b6f18d721444f38919f016eb0bb76eaca5c0c33502c8b2f9d002edc20443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a94b312a16a89afad60ad2cac0d5323
SHA17595d0a73246b083ee4df776902c516a7d400ecd
SHA25626dd50384388420fff0beb9a4755df541816cc1ba1ef1945542b85ac68e6674f
SHA512e441dc73e406fb24ce025fb284b17401caab0844396ab39cbdfed19182391e59f567455f5ab0de6c615e4fb5e282c0300c9f0d867e6c1526b2e4ae65b915f041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe88641dda68d4047631574b7042e043
SHA1b17f76ea7df27ef7264a710cbeaab705b105e63b
SHA25697f3db97310f39eade1a28c85ad6e63e3360276833afcb1c5fa2cd7f083b6f1f
SHA512122f528ea2784f281b098c420c45c7dfaffb70f4dc8650d2bec952c778f04e0f8a7bc75eae3b9ce42a2e2137b844d516678cf060f65c24378e02e1fdfffc8d2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c86bc9aded65ba35ea064b2d97fdaab8
SHA1b5826430f1e759d7fcd9ebe6dbd703a0d6a21a6c
SHA256efcc61b24899f43fd356ce04de142fbf593c3c3ed27176374f1e31d6b27d92e1
SHA51266d168cc19a263b8d2279aaa34104ffb8b3f7a073f759995d7da40a43a14970ec4d65cb212ecd3d5ca50e44af4228bdfe8dba42aa15b5948c79d23dcad0af3e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54514ddeac35bdc87b26a4adb2f570e38
SHA1134979b4b21fa9030986c3d589935627ea9dbd73
SHA2564c9c117b534d8a84c40ee436e717b6236ab6bb3991e371b7fdb43e813984dab4
SHA512ef0c2895b4600f3ef9d3be0cc3bb49fe0fd683932100e84f323a08cf7f0ca1238000c2f74359df2153f03992644cf8eb4630df32f54555e42b826577937337d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc5f66a8f1ed025f3cd55242fd06bd5f
SHA12ef548d60148871eff38aaa2e53b4a5f632f546e
SHA256f6e513df787ebc9735eefb624fc1131b0781c975fd3749d81387aef756038b3d
SHA51244295f0bdb0046773cb760ab90a7d0efdbf1c40a92abe1714a440b03044e3393cfa02c15a0f8346b684abff2201ac3716dfaa32d3c0837c95b3e317dc29161a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fde7998689232cfce508a6977a7821f4
SHA1a8a60c65bb6f1dc71ff694724fb16aa34b34af82
SHA256d664cb71b60336632ba692033ab4d97ec2029118d5dfdffcf2fd6f0018bc48ad
SHA512ae24c8b74c11aa82527d3bf503bd366ba4a8885016c1dd51340558e714f19981f66c087d6fc87bdd28c71b8405d3f11d73a837343deb712856a7fd47633ce217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506f332141e7570ac42ed56129f1aea5d
SHA1f8ec6502d34d80c890869b03e9b8695329483c94
SHA2561b6141d8fd9b19129bc8cb33f19f388f9924b214f8c45298ca8af243102f0bb4
SHA5127daf5fea0b93469215ae380a341799f48677a842e949e8b47a37b19a3260eb8d7937c681f47e8b5c4e40fbea3defecbe8ec233ca1984c3916d6214a6dff05837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf5281b3f230dd51f8550ee735697144
SHA1ea49edf14922ffd28eaa2080a130619b413b2e4c
SHA256ecc3b21261ad9b7cd03edec622c958254eed6a0428ba52b1fad3d1e8df7ceda1
SHA5121c07fe9bf2134ddb4567d39591da54843406287802659f691d53d9cd4347ef849face519ee1a9feab6a1d6669b85af13e8642b79f1212b420f6cefff9ee04889
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06