Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 12:06
Static task
static1
Behavioral task
behavioral1
Sample
a1d4e20b283258a4cf78838753655c23.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a1d4e20b283258a4cf78838753655c23.html
Resource
win10v2004-20240221-en
General
-
Target
a1d4e20b283258a4cf78838753655c23.html
-
Size
18KB
-
MD5
a1d4e20b283258a4cf78838753655c23
-
SHA1
18decc7c688107cc35f9464642575a749295f35b
-
SHA256
3ce1b7442dff080376129cbf9361d714123d89ceeaf1bc8be698546ff5d9cdd7
-
SHA512
21322eb56345333c8a3203a2fd95d4e22f3db35882c5f71c352671b7d82d4bd2a0e9d59c32ceb7b887c7617fde92cce2104cae54bffd7f0170d80a3b63d45336
-
SSDEEP
384:FcwymVE0ie0s68qQH/Eu0cRUgnTWMCKc4KHx/hpmVWaRkG0qCDYJgSPAb3:l9VVpRU71Hx5mWaOG0qFZY
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1C164081-D30D-11EE-A8CB-6EAD7206CC74} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000fb59e1e6e15183fdacbf5c9643c9ce785373f09a2aac15e1bac54c4d375cf02a000000000e8000000002000020000000d38bca6fe0b673c25ed733020162635baed159a5d30e11f739ec2d4a71b1f8aa900000003cf56325c22f7b586a884e8cd5eaf35a3c412eff53ce16144ea267ce9c0236ea289afbb1aec88ab9dc366c858b03c840793de6c05349918a3e4e6150c6075baaee8e6e79053151dd9c185bc758c47f6c274bb5c24c08e750eb31d486f65752d6682af827c92bf5db261e47f0ae378ba44ffb858890b0ef064ffe8cdff391eedeee979b21455bc634dc253e35e1f48e894000000010ff877a1d7e16def1bbe676a4b75c1c3adec7805d3bd3ef5c72f63ad3a34c8ff7993411bd3815d570bb8527889db0b868a4fdf5fb322934b8e00567ed68fb0b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "414938244" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000008497733d4bb4a32903a99ff77eec85661cf85afb869cb3c962f433941e9680e5000000000e8000000002000020000000c95f8d7f462cff83df29e1ed2be5a19fb88c223743efd0832e98f4c1cba1fe51200000000df01b6010f2699505f4c476ee6ce265d6b088b6ff6b3ee53218236568eea3a740000000b900fadef3e71e5c4db8fe6f2879d29c1573cec9e87610d3b5187c65c15a1e1b15c681af71580d73330923ae09cc04c8aa3d1b33d67911a5a34f7917ea3ab470 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20d7e7f01967da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1280 2344 iexplore.exe 28 PID 2344 wrote to memory of 1280 2344 iexplore.exe 28 PID 2344 wrote to memory of 1280 2344 iexplore.exe 28 PID 2344 wrote to memory of 1280 2344 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a1d4e20b283258a4cf78838753655c23.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536cb4cb59861705947d067721f265f76
SHA1ab15cc2b244058bed0709c41f1b48da615d7364a
SHA25611c7e2b6a3dc86a1e6ca57c2a0584b63f69d0aad1819538619ce121ffa96ae1e
SHA5122c5089700c3fc4c840d632d9cd7d073da1240e1205e76e86aad08c1ab6b8348d2268d88ec57a13baab433aa16cbe6ce585029e7c68165b8cd40ccfccef28aeab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a85f3244c0491decf3b8940b1d5d67a
SHA10c267feadc3a3b38bb6beebb1c8d49844e9a1a1f
SHA256cdb253648f758a5764eda49e3449b7721c9fd785391182e21ea37f15bbbce4b7
SHA512874e3076f579a7c11e173fec5e5600b214f08493c642dfc5f88fafc41f6fbc835dad052296beb09ebe1aa45a31d645aebfb160dc235979aeb2cf94e9b3441410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f67635b7690f4a645ba74aac33b6595
SHA17f7692a05b23d6e5ef9ae29e0b9bcb993308f51a
SHA256c1dfa5700289cb9410605221ff8ed3526aeabca061264619894da6917b94e440
SHA5128d2f8a37485595d48188c36580567908d29f4082a02dc1ef0116c08e5754d4b2304e0d2cf6939ec33c7f777d9ef4c10b2d1f8aaa26e7de732235c0dfd9a1ba12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577d5d7ecdd2f6125d33cb6b46cad6ec6
SHA1344949ff22ea2aeacbd1fffd5c564a8604be4aea
SHA256fdd05acc32a17453b1745d44113088e1c1625f8042c78df5a709f99833b7cb45
SHA512d180c73fbc9ead4d4dff1d49636174e4e3fcb2944e0ca54977a6aeb6f236b6067049b0e9b17b6234e3e934f7f0d34f5f932e7f8f5712ad166ee4a8fef27c26fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d9d357558cdf516685fbd48dafa0706
SHA11afca868b8c6aee9d4da1192b82deecae703beeb
SHA256ddac7be3b6fc31bc4d229b2ec3b4e8ca8df7fb5e49b82d921bfa2de5a8eaf7d2
SHA5127955430b10245e299dc2c57e8096a319753a90b2d64b88f88d3494fde9767ab3c606793bfc5ad9add1172bd8dcc71eb6c53455351a2058d462cff2aaf445921b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558099d7029c1323158cdec8c43d6e21b
SHA1dbf07964c580bc40d3050aac0280feac4d913ffe
SHA2560f0f9791749d991c22c87e2a41fadfc9887bbd4ea1c3d5f1b854fc5ec7d8e620
SHA512f11ad12d529bab63a0135a1332b10a9a290254986d203335798e6636c389f63559928156c364a569cb45469464a0a409be49ee676e0493a181cda955e8397565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b93988ce5d176b4f4ec6f781f53dd151
SHA1feacac889e083cc156def318d458ea79b5fe10f7
SHA256fea2a512f773b12434d50810b5485b725a1aa74008298cfbca59d72a3e021a06
SHA5125461a14b829ad7bd7ed57f99d76d9dd392be6f2ba526818eb52cd2f257bb18a746ab161b46a4674a23fd6ade906c91b84c434a51085b246cb23a67a55a83c2e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5536c51945c10b0b9b79f6c530fa52402
SHA1d6fa7821117b479c8d7224181f855081d6e9f7f8
SHA25694ac2fc2429f4ea7419e08b556dbe0d484f210e18490fd8a58f4092dc8698e52
SHA512bd526b92dc5f77bb56667e2485988b0dd134064c3100885fe0d7b95fb768f641882d6028adcf31625dabb7ec48307c1db8aa4cd4985e46b5bd205e105307a1ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1b85093fb04d2581b3c2f715cc59f24
SHA1e5b4818eb607e52656b1a4535ebfcabe6a2e9a4d
SHA256b68395f545da70e1e1ffed0b98bb42827dabc65b49ef0e4a76530eac17f743f3
SHA5126452ea2b68f7408e134c8a29694b18a27518815110ffdf5101145af0fe05c5a5c219a751cc7b7ee47bf26f8e2420558b5942baa4f5bd5caf4918a8b1fc47f724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d84b0515e4f380035d0fd1d9c275c827
SHA19416069e904ae0c07fddd2dcf220f8eac69dafed
SHA25601ee1e025179b4b88ca246d87f87bd26ed8c99732d2c9cdfaf549b9d22514aa3
SHA5121486f4eb7c118ec9b96c095c01243330985433f7fa82be4d4242bb7314310b549df9c530b576ec3f243841cf03e456255dbf75b23986be380078cf471e6a570d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5028e17c9c43d06580b8cd845ccbe4b9e
SHA1fb3f63f4ba231e56c26b9fd8931be3c50cc76a3d
SHA256ad6acf034241992e6cc03ac19ee155e42c298f58e50d7b0dc6250452bcabe298
SHA512f5f03c27e8e387af66c3bf8301dfb95485e7bebd625d1b9ef1f37fb1d737a6213286c1cafa33333e8be5ca327a2dbd31b1174d7f160f8e0be124778268e66a8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5694df66b242d47a8df74009bb0cef543
SHA159a43bdfc25f0b17383e9ac3ff54f5f71ce2ac54
SHA256a58174e11859ff27ff917a3fc67338dab4580ccc7a3f854a21c37c54174384d1
SHA512333aea2859e7d60a8073f9e9c495b921d55d260a68adb950942c24d3c32fb180a3f2d29448357300c382b75403d45bf3d8342fd2f21b0021a1e253cf1674b2b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5719f95d80e23add86ef7f62277b80357
SHA1536e3904a96ed6f4f8ea7c02608c4a6568386267
SHA256f4e3aa0fae0574447baa5f55b787e9ebea5a4c79e3247c6f387133eb9ea6ecce
SHA51295026dde9b64b0419ba5fc82ff4c150ce51c5b4e4712273c9234cea9174eb6de0919619405a9eb11363eb2a2083ea11dbd5074eae328c66dd29c9ac54c69c202
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b855c3b3f6349e4a72492e885bf1737
SHA1e167ead473735e429f90de97e58fff6576a83d3f
SHA2565bed8250f1be13ee5bcf18a6b7d7a78cdc0bbe3b8a55d9139d789794cf3aa525
SHA5122d5b9b186f0ce549c8c557c746d6d8d1cabe1320fcdaf8aa7deaba04be06a340d810d3bc54d637e8ff22f19f77484d3505281c083fcc72e451c816958312cc39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dac69d0746ea1bc6570752124d2caf1a
SHA17f4bce714babc11005dc702cbdca184b14feb79b
SHA256c885d8a73126e459458d3bcc1e29843f9b8f805de0ceb6bf6a24482a81128f64
SHA51258528753187925861e6325b08a21ff887f80c56a6ff8521ba28fb9ed1ef79cee6d5e7603cd947e1ce87f4f8f11582226c3ac8b508fc307113a254bf7fb5e4088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cf16bef2fefb48cdd8b8523bee44d41
SHA1ff61952557bb662bbdf31fa1ac79a4cc2dff1ced
SHA256724f52003f76bba30648f8ded484fda1523db586054684b8c8883792ea1b447d
SHA5129d06dd4d6fb8acd5410cc7bbdefa47ca14ca4dec95bb17c60fc9fd24027bd2e4af7605d7a54b225042498e37f4bdcf4c6dec52e65829be598d28731d6e75e4f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518404a85dd0ec40cb48e0d59092e67e9
SHA1b5b294cf11e212417029a787926c63098266dea6
SHA2561ef9b89cabd78ec025191a8e86732af82a5eb065d25cd339982224137e77d8bf
SHA5121658f093ffa35ba90e7d8120f0c61d2b50b9766ec1dbf4b5e0e07ed80d6fbfcf9196593985f3579afe4d867aabc28e5cc4e7244e1c66827ed04fde2af4b88113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5977bde5dab06d5bf33e56d96059f9c87
SHA130538dad62e04ca0bfb0a9d6109e908a097a9610
SHA256377c01bedb408ecbc02e61a54e0ef39462a3ab9db5af7949b6cf6a20024b703c
SHA512af7cc7cc1bf790f3f6ad13d2d163da38ec3369c81f5bcbaa00aabb46378754018910b29e462b29544b34de94046fd0ae65aaf978d32f5887ccf0460a89285f2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583d4e8514aa87cc36df75062bad234ac
SHA14f862c40246d1dfde0d549f4ef8b4ecd831c5fd0
SHA256506b58bd75f5d78813f54d3e3d964f45590cf387e8a9843d8fa212a50023807d
SHA512e3e0a5b314cbe577b36ad39875f50e4b1c1e3fe402be884e34b9f72dca8ae6ec5bf0cace28764e35b096c6314dafa7d9c5c5654c0296bd20595c1481d04d691a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06