Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 04:00
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20240221-en
General
-
Target
.html
-
Size
612B
-
MD5
e3eb0a1df437f3f97a64aca5952c8ea0
-
SHA1
7dd71afcfb14e105e80b0c0d7fce370a28a41f0a
-
SHA256
38ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521
-
SHA512
43573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4F9A45D1-D2C9-11EE-ACCC-D20227E6D795} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000090d93d54339f8128040fdeb6b92c0a4e4d8b37975a308f83c96b8c4a0fa80f05000000000e80000000020000200000009ac3b970dc1e5752140efc1e4dac22acc753624118a04278588a53077f2d9a5b200000006b030c91d0a59bdc4daf6d6751cddda8f58249619e390acb6160c615a572298e40000000928e70dfb31255f74e31f7bdaf671d426087d00364e1663df84f34d040982eec195a89b829475c26ac53a97a91919b32ad67958c3ad1be1b569104e684d3a209 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d01f7324d666da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "414909125" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid Process 2216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid Process 2216 iexplore.exe 2216 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid Process procid_target PID 2216 wrote to memory of 2940 2216 iexplore.exe 28 PID 2216 wrote to memory of 2940 2216 iexplore.exe 28 PID 2216 wrote to memory of 2940 2216 iexplore.exe 28 PID 2216 wrote to memory of 2940 2216 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58524b708aea710f7db1372099660447a
SHA10d96596872aafc572547d7c30e3c7ff472dc98be
SHA25653d3177875c875905f5178a7f730715a703a2806dde9f4ed4f74a5274191d57a
SHA512c00fa3210b6a342826dc86e731774cd4f97941a6a84cb445fb35cbed6546e5db0ea43dbcc6ed65efe4f74112b3692cf54346df878ba49013f3d3ce2aee6fcf1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523e20ba999d43f40fb639d84e88a6ff6
SHA110ded133be326c6f4d38c34f4cf8524fcd300a96
SHA2560f655ec9ede531dee6b80f72874cb6a0ca035d90320849f26a2c2d1bbbb17a38
SHA512fc212bf9feafc8ccce6777addf7ac7e4d2d49e48213c6f3d615919633a9a8a56f4717ae2ed80fee2cd8bb0a021ead34a886e0a7fe7915c3ad86c1c3510c58a9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a30cb198c5f79f840a6fcb1bbe045dda
SHA142e426a9a5fdcd6a401e7dd36bb90495eefcfa39
SHA256803008aea73c5c77aa16e3859a5b21f2a022cb73a0688e3a47c2d2d3dcdeb95e
SHA512e93a932f6b9361175cba1be4250a4bcac0e60778c8bf8c62812c68cecfb8dff307a2eef0b838569bfb1a6e6f9672cf8804407a092e5eae62105b6ee60d4cf9ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a560dda0c4d8ae6a16b8cf35d5fed93e
SHA102001de76e0a0c3c0e9849c4ae8909686aa437a7
SHA256dff4943769ed85a72685c73cb99215558be05bd7b7693fc2e1050a681ed2a99f
SHA5124f50e888b09002c7088ac43d662cc6374dd3ffc8187669f6ec30ba958f06290c83f0b3d44e8564d98b478580c57080461ba9fb0c34905b8dcb71fe86ffcfdb9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec8939a08eaf5432b16c533b9dff1644
SHA1907849e96ea3af462a33b1039369326a1423e008
SHA256ac7347de6f430c7549a47bae7106f31f3b8e8594bd168481a6f4fe8d7efb72cb
SHA51236d489ff4135342b7ebc2d3fabd59a3df0fb0f84199113579525da3c9bf070a1bbde83a13357bf52c5e44ac471497275f2f952c52d21f20ca3a5fb050c9e07a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583914f171ddacccf3afe55c63bd711a0
SHA1276130ce2331199e698355d2b1f6e33294e6c9d6
SHA2568b7566029927e10c8acdfa90790d6df6741ca33be831598297015b5889a66e54
SHA512a875391e229ee764ce067d5ed2ad831ea073720335e9fbc16cd9879a2ed7ad3d81941705c30485ee6c9fc0c8ae297990ad1bfb3549c2c47e602c24c34ef52114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58aaff11152f43cadd1e535b6547e979b
SHA1686ca7500805013db52034ba90cb0f9db19d140a
SHA256d28915c3c27b884c03040030588e38a59bc07799659c78369ea014c8a9517007
SHA51213c4b4378c5176060e2e31aee75982dd43b4a39089a8d6855c093ec2bf1b18b483f17af4807969823823750c9a8f93c67429b5aff8f8a4a95bb811f6a2340e57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5297e30b47df5dc1dea54969c6fc81bf0
SHA1aeb9432a0401e953a719a4b2e72d0c508b953617
SHA256cc33f281bfd19599edf4570272e56d9807fd739f971df14537508143510fd8b4
SHA5127af7b3bd0abe9f7ef60517a787cf90902b09dfb56df4e2d9008067927e53d03e6c2a375f801caf16a722e5a2617853930360e40f4dafbebbb3f48b3dce11e7dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513f777271f5d74f88def6404c31abf39
SHA1f6f9c9002fb86ec2e34036d1309d61f1400a7680
SHA25641f019ed110b07bd93d0388e98421a781b2e981de4fc172dc767767fd0ec5778
SHA5128039fe969b2c4d9338854a8cbd72a9992fd303e8723d90fbe9bba4cca639f525f53f14771f5c3fb4bb785a9ca875302f94928715a548c3c77bd544abe15d6876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5470f43891073e9c206bfef954d48715e
SHA1da659637ce39716da1c3ebcb4ad6c91d08ab5e3e
SHA256ae7277f350f9455fe712d2cfd193bc8f312fc35dd0e1b09b8883d3e92899608a
SHA5120adbf2f80a4033ce6e947415e2ab47168658c21ce9fa01f6caae88ef65e5a678ab42302f08786b7fad8bf2e9138f671b19a1e11729c9b79b5ebf45ed12a7e2ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1c6e96326d1c3dc8fddd4f568f8f549
SHA1e9eb255200675f505aadd1073ed6bfaea62b4a95
SHA25609ae1dd442b2412d35f5259751843dde8c0e9d4a6f5c874a2f5735352ea6e50f
SHA512f6e61a5f2aab2ce01498992a8daf39d558e0e0b1b03c53ccad9e0dcbb558907ecf20b0bd10d41268922d3f61431b14c6f4f31515af776865ea05a36cace61b9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5307a5838bfe412d990240be2ce98ccd1
SHA1fd657bd5f23bfd84cd1902461b920c58547c9397
SHA256b839dcd063bc6113ca7334b017c104614149b73366e97335127270956b2f523a
SHA5120c24c5643c49936c24d2fee9e72ce92f46236a53e956403634bb528d2d6292652b0cfd9344f89609ae3f23640ef712f56c24dbbe40ed0ce20957429b6e9a3b77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d53e84a3f7cab32f1dcb8e466633427
SHA1eef1ffb1c4f8b0d925d34ba7b42014fcdaea30b2
SHA2560576176599643f6fc09424ab3760f942fe06631d2ea86a836d5b7b295b6a8706
SHA512cdc855d0b18cc359d5302ee43e34d796b3595243ddedc78b03eb41f9e7673b6369cc76481d5c84138c9178300b184f82a1f0ce99f581759ce2a838da2c6eec35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b557d68c51d200a02998f86724f9e524
SHA12f53cd3e01135d2dd5db66d2198bb39691122c34
SHA256a62cfc4faf4a2bc55ceed7ba13e19e18c12f3aecfec0ca272adf8af38ce65748
SHA512f850e19077b342f2b9fa24f03570afea11800b67f8b759b1d96d42c5a88257815d687022738382971dc54925e939408809c5f3159e1df0861611964a797a3dc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f94d4eeb2874c833678db0a0bb613752
SHA13e814d509aa75b93ff1c212633fba1cbd70e4f3f
SHA25649cc4febf88e7efbe9f342460b1cb3c69505c1dbff0540866a845bdc64218c40
SHA51294a855a9d81403007fc2914add709e8d08d5b914a0622c3641b428673354645a6ddc7d61b6a2357bb26b3fdf87a30db6ee8e0ee0ccd626c51e275c802ebe8e6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5091fd33fda7c22e04b52593a89bafc66
SHA18e03487533cb96fda4821fa4c4731c74f6553601
SHA2561d6e8fadbea494cd7186c0ed2597fe61266987e17b32a3c301d5b96802e1797e
SHA512ade5877c170269948870a0752c22c9105e42a2a6d3f987e240e8772c81fb85f9dedd5c59b4e4afcbf6327d2f95cb8d759fa6757c1fcf90889b5f37910dd9c212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5610738090cd62633d945b16402ad49ef
SHA1171eeeb04e52b0014f311b35b18d57f407f58e06
SHA256321ccd6a88b7b6041f89b8e222b61dc5457a20cc462de0c47e84413f3e692a82
SHA512ff5bc39d5811245b0e662ab5da916acabcd648b98714380b3f98577885291583ec928db5ee665a09052e2eb453e1ce307afd2624f427aeb72fa7723663ef3ded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d99296c3224fd360a5fbcefed5e83c8b
SHA1047f90eead9c13bccd34ba33d6c99dd947d0163a
SHA25697bc8c0d8786ee243fe4cee649a62e6de478ef79b27009c9a0403f4f450c0293
SHA5127eba301d8f43807b16c297dac21ccdb9a7ec7278a2d18cf243592e7625428d918a871d2d4c6133bafefb2201464a38368112902d67f88a5e9f7d5f38cc20aef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3905fdba795b3f9919533385472b7ae
SHA115cdf30fe1e19534a9c7ebb552ff6cf29b5f6558
SHA25638a638fcc88b322838092ecabf2de50d5e0a2c78df8927dc3e09d686dffa8a6b
SHA512247e8164197176f3ec2c1b92a134fd0df5a49590cc95265ae7307f87acb003dc9dd42d223e34cb3822c18c937eb659fbbdbcd982a069f2890e1c3e20713d275f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06