Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 03:07
Static task
static1
Behavioral task
behavioral1
Sample
a0c8e86b04ce9cdc220fb496c824a21d.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a0c8e86b04ce9cdc220fb496c824a21d.html
Resource
win10v2004-20240221-en
General
-
Target
a0c8e86b04ce9cdc220fb496c824a21d.html
-
Size
929B
-
MD5
a0c8e86b04ce9cdc220fb496c824a21d
-
SHA1
d24a2c45b8d68cdad0fdf28edeca9cc857246d6b
-
SHA256
d816f1195568efa09bf713a0f53f99f45120fe8a041a25995a61315cab5d04d9
-
SHA512
182902352faead75be2da9688fa2534d3c3e3169a84c0af96ff985cdf0c558fa5b069f625ed496f88c102533955476116477b51df039ad7c0e136696a8280959
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "414905892" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C9E0C4C1-D2C1-11EE-A4A3-CE86F81DDAFE} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ef609ece66da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000c384f861d2f2198738980b3e113b9781481f79442f9254bee1d444ebbc3434e8000000000e80000000020000200000005f790031e4330cd224928a277f375f96d28f5a8ebb31c8391b1f3e5cafa7c49f20000000961b76f9cade0820cd35e46a89a254646c20207bf1dea7cd02f0ca73951789074000000031a84ff499fb99c384b6213d94e88c9f7686133df81b70b05ce579d7446c5337452f3aeb66a679c68afefc025e37aba5d59da74975440237656981e572fe32f1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1540 iexplore.exe 1540 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2832 1540 iexplore.exe 28 PID 1540 wrote to memory of 2832 1540 iexplore.exe 28 PID 1540 wrote to memory of 2832 1540 iexplore.exe 28 PID 1540 wrote to memory of 2832 1540 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a0c8e86b04ce9cdc220fb496c824a21d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1540 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f2d74328d29e639b2e97a9aeb816843
SHA161fb78cbe7f42e838284672744511daff9b76b4f
SHA25606a617ea1e707a79a5dd798fb4df8dcc561b8982117ab976d690f2f397a8a95b
SHA512c6e8d9a968f8b9ace27d826577c4b1945b62b957b4a772cba8240e8fee587bd4519c8cadea6b64b218b9b804abf1791314ac7e60a56f123cd4d7962c46cf04b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed6f07865bb50c5be17fd380e58df12d
SHA19998f5319f3efa8af09b640294acccb7464f4b96
SHA25624fbbedae608e915d8825a874aa7ad8e65606ebb4c93c68009d8026788bb6fa2
SHA512c586d511f8b2f86bdfe155e86239dba4555eaba305562796f1d9a77a3e194735f3b7fe856139404f75107db0e45beb291f81531427b49a7c23ea9fdb63ba1d5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5665bed6a75c7a8cf1cbac3ba5be18a62
SHA1a860feba42feb64c2d01d12ddfcfd8dfef4257fc
SHA256cfdae0adf283e1ac1382912f21dafef54b891101acfe511e69b4f43d986afd2e
SHA512ebd5634ab5dd07ea4dc0c904a809cb680402fec1855ee2b39d04a168f604a959f8fca7e0543b44cd9165069c44860e52a1d0df9d70e2c2513aa9f4d6f526dd60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58875d6a6556e03138e3fce3afc4f567c
SHA1aa102a2cb96d4870b9c0a7dacdc22c83e33963cb
SHA25667efe8dc27e0b268af883abe135c22e9903c9dd79ac5688822791e391f7a7a3c
SHA512d95c64e56747dcab0611a671a80742ada629026d9803724bfea92886840d6cd6a19bd6b837d26c4a40f5d6168cd767c5d90d71c5abb24bec4ad0663b8d7b4e87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568f2b4ab0190f56b250197153b4b9f0a
SHA124f25750010c09c39b142d1e7a9f741cc372ff45
SHA256355115a4fdea7fc8c7aac678f843dcec435b8a7d1db153442aecb7b9499e87db
SHA5129f47c5b7f85c8c457c88677c230b91dd1b7740ff8dcd1d467a7626adededc82829960450d7f5d9890c7ebb9ddc2b5addba92eb0bc7af4b487756228cf97e8281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531e6b861e80d3eb50200fe6bcac8fc7e
SHA1321e7012bf409d0a0076dc9116ade41d79df757c
SHA256ba14a6a9ef09beb61af93ab6bcf247d40deab33b751c13f99cc44d2f2715ecaf
SHA5122202cf40f0405c710845148f601e158f0bc25bc770fbb714fd64dbf01638efe9da9d0c5a56760acfe01603fcab4689d629d699cba53bed02fd43c6674580edd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561bde340abbcd890e47735524c5d1489
SHA1b5ac61616f80f103e289c5a348f2cd4fde5afd01
SHA2560841cc8dbfa06a0ce762a490f1ca48b7988d107ba0d88c10762b242e84d9953b
SHA512e364c1001ed991a60441b78032202b20299567ad6b9a63de62ce6c2bb6d07dbcef349ae3d0d6a6d1dbd988410e5727d0bc69a48f8fd4514c98c70ec3242158fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8f10a12e80f337a9e631d9e9956627c
SHA1c55d4d4bf9cbff1d31155b7ecee306b70fb9b292
SHA256a06033785ee0308579322abf8d95a6fbab731c8adfa27c7d7b02747b3756f3f0
SHA512af3985731b42c915977367e27aa40e79c1db7fd09e79353ebf3f7e2c3fba8560903d75ae328bb37232def8e6eebfc6e238bef6062c875d5e16677959d80de183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5303eb268cf33edc50e43bee01aa057b7
SHA1c710097b4679203143cbba11373bdc2bc7c615d9
SHA256e0749a529a8fc1ae5d7ab94768ef696f229cdb5817bcb55fbe9b53bf107bfc60
SHA512ccf51eb8b23dcbf055f507569a4c7e96400bf7bb6b8b4f9d2988c00663c3336eb8361f6c99f027843fa79257ca3b8662ac5abf05ce79ba6b5f4beca97a0f61a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5823e060f27b2d8bdcd249a1c2a53c7
SHA16d0ce5d235852b8bea87c38ea5df7696087245e2
SHA256f05bb7c8488d5005be1a834955e03a693a3dfddb7a6b8ee55a5c29eb3782b7f9
SHA5121e8eede5037e58f02a16a36dd5c62298d1a16d85bdd784de579fbfc4cdd8b30494067c86aa92399cb5528f856a26ee89a4da63b305ba88dec933817b98c139a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f52caeed8f3d71c36583d5e5bfb3bae
SHA1be263c117ee840835dca1b1304aa5a043f6a56ad
SHA2563858a13b7909777ffe1bfa7aca6438325c2f0ed72c24b3502ead75d6e17fd325
SHA5123f1d64c666df3473b364b43251de8d048016598fe9396746573448203cfce3930bd159156fee723180b125c7df5047e6dc9066bedfe945910fb71602f833ce7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50157d300b0634a7add48819dec57147d
SHA15ebbbf6428dbd8e010690c5ce12bb0f94092e283
SHA25622284b0ab5883fff8212a0c9ff8016b799ef696c03b077111c5f63dde0449e6e
SHA512a08176b32483646de43c4a9b10c851970f9ba0ac6da1ea1789c3e0266d4ce0a7b87393c9e2e7beba4f3c7ddbb91d410625728d8a6cc6e93b0bff4d0961d5fe13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597139bd513e7ad4481ae66d5a93373dc
SHA12a57a569bf0a73dce029bcfa76d169d279e80c4b
SHA256631f5b8420e9b8cd61fff5ea31b2c1e7af00ba46e575e8afb092def852b78fbd
SHA51286b2da2d9833460c8ea86184161713dd37059083fdabe8e56409affce676afd93cc9a399ccc9a44516003c9a5776210ccfaa51c00125b879f0db5951d72f4201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507d82d17b1e99b71f33ff33b5fee6ca4
SHA122bc6079d36fca95aaf3e48f1b42455a3e346ae5
SHA2561b704901f92132d0ae4507e1439892e3165bb0b17deb71b3690982e331882430
SHA512aa230ebe6847cb6313de81c302eaeb6bb1868ece705fab82e984f60fc318a3bae9520d0578a5350cc2891d8ecf34fd5cf87f80c1fe56a842d4937dca6659f9ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e73053f68edbe8f212ad19b71b1c02b7
SHA1ef386cad31ce941d8876d48d7c61a7af1aea4f4d
SHA2567d37b0234fb93c9335adeedadbf83f990cfb0432609f640f40feeb0fca5b75b1
SHA5129cb172c75584b09ec9a6599b9ba53083f2909ecb4275c42ed5b109a5e5540aeab9f42c44439f45512bf37ccf15385117ba7ce7e45a589a16e1b427669cde6360
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed904f4542cdc0ecfa81a8913dab5ecc
SHA13f6ebec61e1bfd026876db6dbfe791f2685262f3
SHA25630f0a6545e5d91af9fa924d1a96ba0c1cc6310e8c2b43d4ad78723e83f295ef2
SHA5126a22d5427f6c4091f20dbc6810f7b8a37036b03eaca45017158743badf5772c92ae8cb7a39eacd9626d29046f9e4b95b32ab4a600ed70097717eb2dde72b525a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56775fa75064750314711a927c583c4bc
SHA1575cdfa53370813b20ef039d8d2c2ee72c792cd0
SHA2562f5f71d1636570c0de982c3e93000fe32466a629a9d9bc32dadfcec821c684cc
SHA5120f861e53f296d433e0291491c2edd8360f90201b07080efbc3fb9a922aa5e745e116214104e1a8d99723193cf82d08c5ac9255fd002b5d32173858481e563b5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511f5475bc3fdafe3576ff0bf0df669f5
SHA15d61f0c0f72f07bb78e8bb0d71165a227ecea07c
SHA256779b9ff6fcb2cc39261559cd7a6bacbe2b59d89ba4d4db67a3a6d8d93e5b008c
SHA512891f764e963daaaea420e57428d9d399f02a1fa6a7f2f594fe093949004ca0eebe0ed3baecdee4241f08e76307a6376676e4ac6723e369ec00af5cff53120506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cca9a5c67841d9a1d621661f1e806d26
SHA15fa5e63f9cfb19bf2236d25148c81f84c3c52327
SHA256474b43f95b4ad19c7c74c974b893948fad93972064d4a354d4d44e86f7d8bba1
SHA5127b261e5eeaaeaf10545b24f9cf80a5d46b16e86a528e2702313770a6a80853268d8a31042d477c8bca66637eef73071db619b54116e44ef60d448524a0573089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b50b92c0a180ac13190a441713873c0
SHA17ddb540974c3befacf64bab9b652bd75958f8e5f
SHA256997851fdb9908435c3145174e1524f2c002f25da33929dd231a7326e07cc8f13
SHA51234d372abb5bb40db13c1625ce415d686505b88f6465a8418ee37a590b128354bf1290d578b28449468721210e999fb5d05422c21436714a07cf81c128c814c28
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06