Analysis
-
max time kernel
134s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-02-2024 01:53
Static task
static1
Behavioral task
behavioral1
Sample
aab3f746179d18dd15fc1f9a4c398f05.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aab3f746179d18dd15fc1f9a4c398f05.html
Resource
win10v2004-20240226-en
General
-
Target
aab3f746179d18dd15fc1f9a4c398f05.html
-
Size
937B
-
MD5
aab3f746179d18dd15fc1f9a4c398f05
-
SHA1
b185ed3d976cc7d37d5381ef4975085dda8de2d4
-
SHA256
61d6dcadd43b2744256e010d008d495ef9f09076046dd3c8c9c87a7087aef69d
-
SHA512
6960f26cdc51ffd4cd8da728ed8caf3aef087c0207bb4e70b375b721f0b7b2eba990991e916b13b8920b4e8f5e7a7415641d29a4d9f4764d082b0a5b5fd1fd61
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415247103" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94d2d3723739f48802cd6414eea5c7e00000000020000000000106600000001000020000000e03327562bcfa1fd6ca958596133d6387ea0c91a9d7a9e7f974a7875283ec2bf000000000e8000000002000020000000809a4b405842e20d0c93a1eeb3ce07c059da95d3d131bdfb6b3f9506a78aef6320000000f4585d58d37accdf242303b8fad7d00992cdd059b135701be0b96838813c3968400000009c335b9ed53012a12f10a73c9d3179a17e2c4b5d2cbfa1d48286212d991e09f8fa19d21fbe0705db3ca8e444726b87a6783f221b6d378ac51e6dbaffda22cfb6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A470B81-D5DC-11EE-95FD-5A791E92BC44} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60798f12e969da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2224 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2224 iexplore.exe 2224 iexplore.exe 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2096 2224 iexplore.exe 28 PID 2224 wrote to memory of 2096 2224 iexplore.exe 28 PID 2224 wrote to memory of 2096 2224 iexplore.exe 28 PID 2224 wrote to memory of 2096 2224 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aab3f746179d18dd15fc1f9a4c398f05.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2224 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d20f96105887bd14977654e80015087
SHA1ced55ef7aa36d603b864bfaa996e58e625ff93ab
SHA2567c0524b0a44ba0954f8b1852c2ee15a7a5b0ca8c0d90882533bb6855da76d590
SHA512918fe34f540ee4ef5dc295672db7355c2f574ac7efc16218070c082854ecc2baa3e010a845670b6eb8afb455b06e96dcefc3083dbc290ffb63ac643428c96518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a13cb0cff83eaae180c7a8b6ecf5216c
SHA1bfdcf4b9263bdfcdbbaa8917dfb6064d6ec8e783
SHA2566458cd78d8940454eb9babac1d2e2a652687c40f80db1e7d92163e9004b4b4e5
SHA5125e60ed35a2721dde4f12d1185619970479276b387da8ea0a1afd66d29c28b5109001a7defdb3b9870af19663fc960958a85383435ee2ca3c3671f8031805fa7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5138f2eb5290ef46f585c90633f105f84
SHA1e9bd9254319f468b77b7ba9d8224f06256fe3598
SHA256ac89d1f197b39074ef618a041f9023f3b1964d8da047915406cbcd176e0b025f
SHA5124163b2be9ada3669534414fc30c0956aa326bb470debc35ca0a6ccd994cf70d482c41ff038e743f5d587b841a255d5abc2b500b588302f114c0d5639f098f397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ef61308b92ffbfb6dbc9e6dbb8d7001
SHA11ff0e2131741d9774f07559892acb1672ea7f139
SHA256d943400e53c764177fb4fd9b31ea2a73237d701f386d0305f486db4246622979
SHA5127d65401d89dde09c0b567a9c998742cd169fc448b86dfe8ed0da0d9150adcdf1f4e5e831455f376d44a130060904b590579ec682c3ac7fd31827a6f405b303fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506cfd0b25674faac4ac0f6e67f9733bc
SHA1f31b4dba76d4dfb0d64708c66b1dbea8dad3e43a
SHA2566557c4b498450189e4582805b6a79e697065bf7e806777f799d95e6cc49d6c5a
SHA5122f128935e825ae309adb9820c2e072746f57e71774fdbb9874dfde2d609a8aa446c76a385172d51c725cddacc2dd27bca6f4874f0ee0ea4c0c072e0a87e3d2b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c212eb418757f9de394d7bce858cd12
SHA16f6ee591ce34f685f32ac63ef7088e18284eadd8
SHA256892e4586aadac645e41a1a4c78c12495692889c59dd2fc294630078b36fcf139
SHA5128919e7fb157023964f4d3e358af500720fe4174caeeef76cd9e47ff6fe6e96d29cf8d14044fdd67911eb584cb8577ff48c57f40d273ff7e4435c6125c1022f6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbac6d9ad188067dcae16e351ec04a97
SHA153bb26e8a9f3123d789caca2a052b28c13665b48
SHA25630240d76f9b85c5262d6f60ce5705727f56262ce78beb3d55cdef289686f2d1e
SHA51240a5b99432163476d782f0fcb35d8489f94398ec1b9412a17426ac2f97a314e82056e6a0e741ec1b20f9aabe170783f0cd2652dab9e9906f8630522d581a196d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e455507cdfde9a302aa70f026cad74d9
SHA1f2781930fe023c4fbf9847b747559d3a204e63f9
SHA256d0672db60dc10faeecdface988329682b0dc26174f7a01cdee3a767c265fd602
SHA5124e6e8ade19132df28c5be31ef5055be4c311e5a6790008e317c2969158a82ed2fad9f7332a0010a1017abdaa550e6f050f2ddd26f1873af85c70625df6ecec9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa6917d20b04d8e23158f482f30f56b1
SHA1fe78a6de6c368ed8dd8c7950fe000c969af8835d
SHA2565c243a821cfc5ed8fe2b52efe75da71a9d59bfd6276267d1ff2042c69d495ece
SHA5120bbf7fcf639eaded8f0d72a1ad4ca805c594d0d63fea69708613e4a5fcd3952ec66c546c62f830e95f0dc4c11edf224020adecce9924e2700a65a6d655eb2b58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5121cdbf94b45846863105f946994b754
SHA11c45252d783a906b39303d453603d5be1548c4bf
SHA2569c11e55783a2edc4b7d383427ac9cb18bda5f4113ce372cdf3c9b2a7a0e6e460
SHA512ffbcc3ad00a79645bf45de22cb0075a23fbc3d48796d96dd6a1a38c57fed7b645d7b744b048a90d0c016392d79d818cce0dc238225fab0562a11657d2f9b7f4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c750c970852338cd8ee1e9f1fa9f4c09
SHA114eda231888d4982457774e642b5dd2fa79d6bf0
SHA256a3cb2fc83810c9f5a6ceaad8a95dfc4f8529810b543da9e1148c74233b2b1ff6
SHA512c8495ade85c7210c259c055b7bdf9d5f056c87ac26f595e322c71f34aedd563ec105d2c80af318e1bbbce4d60e90b54381fd7e4993fdd754dedbf19f8cb5a51d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5700686017543ac48318565ed74db66f7
SHA1eaf03b3a4aa1ce4989254b78089c38113315d508
SHA256b3f10621c8a48b9da209ef9eed7dc3e7d211fd64307591249e5e50cc328bb360
SHA51235021bd5f3eab771bcde4416ee29106d33ac1681764aa6dfdb398946eb987d59e9e8a6b3ce6c6f3c81cd849c32ba9bd667411346709775d9e2de917f9757681c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51683aaed81522b36332245d77413917c
SHA142da9113948a8d4aed86e6ef9af8f302b4277373
SHA256e5b20374df342c9ad588a4d7ec2dab66f947a8b166e0b2aa085a3ed6ab9fa883
SHA512c4e101c69d74f6702c3fdc9d60068762e423530c503949649a0fd6777f6abf91df46ae482c3466633ce71b506eb4c728ad493c7169d447d842c04906009cea2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573c8b895d97ad1b826f8f3a715294fe1
SHA1ce1b9046472e8ea9db45c1421ff511252392e96f
SHA256d2ab3c2fbbc519ac54cd4b71f20c49d7e94f363a67a91c2878355ee8ae18e3eb
SHA5123e2cb55ebcd044355202d8cdc0e25aa0ad36ef360b7f93bab350a4562f05b15b2d3d6bc8b7200c8da27c00a9b9325cb51cfe1dc1f8a6a48efaf2b1e20b6a417d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5336e2c1f2350132ce370efcd1de3cf3f
SHA133b8924bdf90598cf4f7c35d7b84ccf35b986367
SHA2561f993e311542cb8331a991314ddc087dd4063c6d82dbe920d6992e62b53547b5
SHA5121f13e2d8b59b163c52a37170a630970b42024770b75190ea6a976359cc22c74f8df46ade33ee850841e57507823d472c82b9c0b3cd6bd9fde673b3e6a47b42a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d9bf730ec591df3918031cb8f47c3c4
SHA158824f5004db4a0f9e9772941bd8bd3f73023157
SHA2565fe2881accf4c6d888ad26f3976592a4605cab5a68433140d2672796b70314e7
SHA512aa4a419a6e32d0b088bd6323ce04f69190a5c7202c0b6291206410968bcd5b625a5503deaff88008630f66f737eba3aae3d8d36b79429415361dcc27c52d9ce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c1e8d07f54b4a44516bb3c49bf34d2a
SHA105d5a62ef0566db8a9cf098a00c8d9441b287004
SHA256107dfc74887c4fffc99b01eaa56befb9278f684b332aaf86c1b5304ed4cc0bf5
SHA512d431db9157fc6a427fd58ada1440b726c6b91bee06c2168690fbdc4bb468e7ee93dc06be6dc0ec0c0bc66c32b0971aafc2b146d2937e71e7259c6fc0fa849332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513a8be0242d0020ea887a14b9e193e23
SHA136155e9feb806c8bdad908cd095a469a2575fa70
SHA256e20e762370b87c59cb4a8387aa685f46915df9e7900c23eb8d198224d2c85433
SHA5121cfeee3e5e63cd98554b586d3311c2bf15ff65e9d3401cd0f456839f9e1ea380ef34a0131cabcb9e1c546cd76fb54b1bdb15b807f75d770564fb2e43337bf2b1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63