Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/02/2024, 19:19
Static task
static1
Behavioral task
behavioral1
Sample
a9f55f537df808fbbcdeef95e5b176d2.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a9f55f537df808fbbcdeef95e5b176d2.html
Resource
win10v2004-20240226-en
General
-
Target
a9f55f537df808fbbcdeef95e5b176d2.html
-
Size
8KB
-
MD5
a9f55f537df808fbbcdeef95e5b176d2
-
SHA1
f3be6ca19ae71432479a7daa6f6e93fefa12de0a
-
SHA256
b80f2aa01372379d700e60313b7d2f5c6393a0583e5778fa081ba4f3ae72a382
-
SHA512
6a8cd2a29a3e96932c54d7df5a876b68d67745b4108abe02be848fde9dabe04f8db6c1f528868464093ba234639bf254e99555e65b49cc891de1327c30c188aa
-
SSDEEP
192:nW7djahXsRjiprMBil8q+EKcFdjxTa460bAZLSmn8/hn/0t/PmNA6l6HO7lahz:n9sRHnVHVnu6z
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80250feab169da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415223418" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000007560ba966f1b53cddc9f2759d1e60e51e3522c35cf9b071091155340fa1a2b94000000000e800000000200002000000079cae06378697297fef3bc8c75e7e5519d03e914b3c61ca1ae5a0f162987766220000000dc5a362e632728a12bbcf28780cf826358965b7e8d7946c2ae9a1ea4814f1d7d400000005820dc8a91dd9bb032a93bf25571306c6689e94a65198a6fde5cb0d9c80a41e0dcf51b1ed643fe52a9cc760297155c1276c660c959ace96b56c7ada39dd590d7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{158A95A1-D5A5-11EE-AB14-E299A69EE862} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1976 iexplore.exe 1976 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2332 1976 iexplore.exe 28 PID 1976 wrote to memory of 2332 1976 iexplore.exe 28 PID 1976 wrote to memory of 2332 1976 iexplore.exe 28 PID 1976 wrote to memory of 2332 1976 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a9f55f537df808fbbcdeef95e5b176d2.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5366645c011e4c4fe8906e0b416387825
SHA1c9c7b75e097c4ab32ff6e89f103ee453fa5e9261
SHA256603293eb8d9587156da09021acfe53a0962a44921685fdb732ac2fb10b71ea61
SHA5126aa727d2da3117bfa856c0ca9cacb222c3e8ee975a143ac6db4121edf2cc5eaeb793a05e3daca035f6d866f6cb0f8c22ab35bdc42d4d9f31be29c192f01e451b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580deac7d7e9aab900bbe947e9b3ac98b
SHA1a17f89bc834711684da2b4c567b6f8124a98728d
SHA2567b70ec33614e58ab32a2cdb317c66821f1479ad901093222eff2d905e788fb9b
SHA512b2930c9c60e74066c426ea38cfb2946c69db7edbcd2b0caa0b69f18e751d8713d07f6c28231ce9035ef36d118d2bb765667f2804b2ccfb493f1bd69948914273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b5f68f009595e5baf1d663fc979bec7
SHA1c62e57880b8f3a7f4cbd3d5f39b7188901e6a012
SHA2565c3175df05f3969cb90c95b9348432122532b506c2cb4e7f8451921ff649ffeb
SHA51217a63181f985f5772d2fedc2913d0b45d914779ebb194508de65ea3bcf539ed84e6a27d1824ae442575d567209bde3282c5b0f1a454d0e9463a52ccd41fea597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5325d3e4dbde411a209bfcfe7f0bc8120
SHA1040cc844c39ba8cae822fd23c0e86b92e270aeb6
SHA2560f90c5b9703d6c6008eca6eed01c06fa140c1740cfbd6d2a6eba21102076c3dd
SHA5129c2c3580a589b0fa21453fb76df52635210295cd4940956895f856c705e9b92ac7ba70ebaf173b730ceccc868feb10acb48821077fc464f17e33880570c65165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ea7d4a21aa7751b84880a0849f250c4
SHA166c349c3c18e4018d27c11df974f903da0006983
SHA256f07f0d092c75546b28b397cff0da13741d8348ad7ecc0e0966b1e36713840b2b
SHA512712d30c61290534fcf2fed0974753fbb9af2b06ed8fe70e9651be4bdbcdde4d43e75e47e57fc0a03abdb8d998d5fb219d132b1748be28d49db6541ac25fe93d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5477051dfc9ce1dcd356275e0b8302ae5
SHA10e3f95f021756d80445462e3c55e2b8b62b88767
SHA256f11ef5917f81103ad707fe2178ac075857c2195f9a1b363d582ec91d966de87f
SHA512d6f2f48fbabaa956d48966f5699647a7cdf8179c65dd4188de9e1bf593ed6b70c0c0d092b2e3e544bdfd1d7a5dc93793fb9714c6682071f2d12e60a74d549f3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa73298e94b35d47c32775c2966122b6
SHA1c1623e21f61f7938b42bad25a88a3c1ca55ba899
SHA256ba7789f24459231dbcab87d06d5650f0ca306eeb38a0e7f6d3b69c08f9b23a73
SHA512a410cdad24c4fefbb1eeeb76685b70a48b56f68e69f0691ecc9a0455787b78b9c801cf5a3bb02bec0d31676a3ce1e3fc3d2ad5b41644bfc16a5680c4d4cc5905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8ccb3f95bfa1b593e4097a864a555ea
SHA155f004b1e431db381c6a5a840c6f6f93015a0d7d
SHA256d35f4974feab594bfe33b4b62247d21bb3291633414266be4d90320707dc0d7f
SHA5124ab21235a3c45d30fccbedda289da0e3f246d9858a32cb51439e0dacc5171de243309af835ac1190e15e53f6d9cd24463caf355860c37ff6ecd6611b84844bd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e6b1acd357f25ea938055273885046e
SHA19ccd4eedb176da0608023a786a52f1884f3eb119
SHA256a229fe6b8910047544e0565cdd7059be761d6f9d79d07e8879160a88f2783007
SHA51285f4e6ba3b5c3410cd79bab708364ec043729b13439ae45c58009089b36f59fa2d12c36742ad604b0802cb2c824a76adfb91f6bd5ac9c99598aa2049b9001edf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3257098aa889119426dfca67f22834f
SHA133fe786ebd1e452bc82b059e0523e15ae101ed74
SHA256db8a88904cc2f2f05f9caff030324cf0737649b0da70995ca4ada76a0c089639
SHA51245c5133642722e041728b5735cc5960c6ee2efd9fba816e533b3140b6730146a4fbc4cc773deb989947201c960c65d6432503c15d0f40d5ac4bed9be974b5d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a668c8ff4d21cd364da8adab3b55150
SHA160d925e87b40a9bed35f4a4815a3eb6d1d5fcdec
SHA2561540614e154cea9ba56b235959f4d66abdc4079bdf22217bf920be1b7d34057a
SHA512c3a1339c170f7fd5e8e9e787182edbc6d2f7b2064cdb9c208318cf83fc1cf662dc200440caa734fc8244c0bc8df0f0ea8a56ebaea760f7727b45fcb1e549a6ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed92e53f7b2bb891c6199f201fed458e
SHA111dd15e377d01e3b844545970c4d1cabb161bd6b
SHA256cfcc83485b18136b3911b151ad8dd17c28227b382c969d4f915db7c22569796a
SHA51225a95299e00f27c83dde96dca37e5583e6aeeaba02c1ed8377f28c21a7fcba93677291e27353d6f3dcd8c5ac2f2c8cdf9fbffafe13b55ff204f237cf4f010ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5605dd12707ac147be8189238114854c8
SHA13dadaa29308e492f7b08ad89eae42fea5dabcb8f
SHA2561f6121c65804c570d9a90d4dbbbf92378f75764b21079b655059737575eee6a9
SHA51273da673f05d5f8fcd09d82bc5054974fb216b9199730f25d07d73b5a153b477177440da697d5c2be96de7898d58664d86364c5032bb24eeff686a58b383929b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b3727d45d9b5e6826c24fe83bdad933
SHA16fc8b869fd5b6495cca88ac01d95f0922c2e50b8
SHA256e0588f33f800069e26fc97d5830ce903c2fe3e391d6d026b0c9e4da404256c07
SHA51247d0cb47a748a68d9adbb9c64f5d3ebc6df4473094064f4545a0bbdbec68dd0498eeb912caf233a86fc251b896a6658df3543e8d64917874a76886e30dc069dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc57762cc8d623a63805f361170010da
SHA162cf24ccd177b496deb215cb72565cd37e9cd784
SHA256771bbdf2cb12ef4888997636eb48c3561fffc5fb16d1da46195bfc5b22561fc8
SHA5128aab10ead781ae557721ba92e115f0eafdc2ed210da078a104414b3c5352f05a8fe5bcde3c389c702ebf9d1a3415ab8058e4fd30052a5a31c4a885bd76b7c922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5440a7ef26156e96a54ca1c5ba0cc9e4a
SHA1da239558ebbe049b79d88e47df8fa98d9921adb2
SHA25669218362938a24c3230fb28dcf7fc1985eb22f07063b9c681172768f4f0f73b7
SHA512fb7d412fe0dff5f22f55d15ce080250186fc1bab94ee88bfdcdcdde03457602ea70903c400d64f24416ac7b176b7a02e3aacc266d337e4b49a7e3d7251420477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1295bf072d19fb25eedb65c81794183
SHA136dd35131de0991ec50b732a70a50d1e85e163d6
SHA2569bbeff6a224bfe7083383ac79cbadf00d943d3aec5169a6a59499cdbf333d545
SHA51263a8e618d9d2afb13483521f4c82ba0e4dd01c715925515cb73025f34a66819714b46b21107e34778535d5d6d88b8ac196200a6334acd536b8b3ca9628089533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a979917e85d794d8f0bf060eff1574f
SHA1a8e4645e9639fbf8941e28395501d7e7721f7b6f
SHA256392b7648334a5ec353625ca3b473d521e02e150d1f7a2443600ebc85f50651a1
SHA5128f3d2ed668b0a197c5e28ad471cb2ef8473713decd373a6f8714435148495e070ebcfe453c791cdcbd1c02c6e39b4e4e1d42d28c9f22e4dff896851567a62f73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d254bffefde60b4032ed2ca814f6e6e8
SHA1e6135566a0aaba38ff3400f2021644752f787b7d
SHA25610c5d61728781e143af2625558dbbb61ead913dc1cecee09435a20dd86d4c701
SHA5129909938389092cb9692f1b1ab5444e1b3d837bd302566f47e99e8d33e5eb83339452386a34c82149f188bb6a621e701a7ab8d0470ba6a4b28e5aa85fea30c20b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63