Analysis
-
max time kernel
123s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 21:33
Static task
static1
Behavioral task
behavioral1
Sample
b5b60ce4353f83eb1dd2d9b8571777c1.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b5b60ce4353f83eb1dd2d9b8571777c1.html
Resource
win10v2004-20240226-en
General
-
Target
b5b60ce4353f83eb1dd2d9b8571777c1.html
-
Size
10KB
-
MD5
b5b60ce4353f83eb1dd2d9b8571777c1
-
SHA1
79ef7489f7701ff86a82f3739eac480fa30c5a14
-
SHA256
e47f83c85d221b39d85ea67f613e922813b8b9fdd2b0f04ba406414b6f58db8d
-
SHA512
077294223427606abd204592f0a71ed929cbdbf6ca4145bc2c1559297fa8c8aca53c871991d43e1fe6eacf4884e81176fcad9468c99afc0cba43adc1cf98a420
-
SSDEEP
192:2V0TlIsr03XU8k/w1wvqLkZkBgbnGvUKx+01/6uBuLbdU8d:sOlIcuXc/gukBgbnGvUKx+0/6guLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE554771-DB37-11EE-A6D5-5A791E92BC44} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415836289" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1556 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1556 iexplore.exe 1556 iexplore.exe 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1556 wrote to memory of 2040 1556 iexplore.exe 28 PID 1556 wrote to memory of 2040 1556 iexplore.exe 28 PID 1556 wrote to memory of 2040 1556 iexplore.exe 28 PID 1556 wrote to memory of 2040 1556 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b5b60ce4353f83eb1dd2d9b8571777c1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1556 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5126b6d0d2be8c6224e0349390a620dd7
SHA18df4244596e5fa719c23f8665fe7cd5f4549864f
SHA256f39b90b9bd8fb9c43e459e5e2c6cd25d3e048bc20b50a91b3a8e8c01155890f1
SHA5120f36ebf63eae8461dac92b69b981038846afaa295c5d0f683680888fb751058dd0dcd1fb3a5efa4cae60cc5e6f175fe60e4c68504321b006f693aea5a280b701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546a7eba1cbf79f28a0cb46b95adf3f5d
SHA10f09b24b22329ee59f3994f0d20f4e4962b1e68a
SHA2565ac1c0543427dfa13f00381f5bd0cfafb7595d2be0a51fb77d97d45df8713c5a
SHA51289630e492e20414c01cce3361a2b6cadb18cf31fc28054b71b363d7de802175deafd1820e674a56e0965f8f7f6356f60719b45d4cd12d5e14f4da76ae6108314
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbce696c7667c998db460e84cee7d1bb
SHA1e13ff0a62120ff3a0e3ba31a6e91a33f0b86ac84
SHA2560e4aeec23005db0ac8d9f41b43500d305898aa16a0f3e5447c57aa3aa78fcf0f
SHA5127cbd77da22d3cbb5b0b221770bcd3306c1119970fa74dc64ae1a50b83d47d8ebb42db0cffb331062aa1904658a6d3bc7f8ec9176aa5017d139a7b86bd17067df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6570ad464af35c40c5de3e8579afae7
SHA1c20dbde66d00fb1a8fbe7751c01c9a8d58c22d07
SHA2569076e3e3ca8743e73c0e24efa63b3b4d194e1bbdb10ddc40b6d08ca8c8c75069
SHA512a42ae2a398ec09f0fcbc9fc717812d17f157f2c5d2e296c63b00ac5197ea1a38a2bb4a73bd7fb72b58927bee148f5244111eb80bed2c9d1273645ff03cea9093
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cf2f2ed6abe62c9144ab7ea88e1e035
SHA1ed59562517cd27cc61cef638a1089fe16d0436d2
SHA2563c0cb9a92b2a414dd8d396dbc7a04664b3f70d39222ff88d31416dde84ee812d
SHA5129f56f73c74253dae0ebc4ef21f291c44131d58f607737c815bb68004e0e224fcfe35b3f2cbe85dcf5e40f66a432c2cc4fe4530a23224707c93ebaf6990eeebca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd0a62eefbee7df19a01ad8dead42add
SHA153d41cf2e436c574f6ffcf66aa1e90578b76b5ea
SHA2569ceb6437aafc566be9bb87f5b119d4292bc64cab4b98bff44318551371e42e5e
SHA5123c4063da9b45f2d7743ae7fff2d7f452bd1aebfc5bb1868b018ffb36628f0bae34c98087aca5dd134ed7d7008d1c14dd201f2f527fb9edc14d7622cc2ac276ec
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63