Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 22:44
Static task
static1
Behavioral task
behavioral1
Sample
b5d8b9479e00729dd18082bcafbf2c1f.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b5d8b9479e00729dd18082bcafbf2c1f.html
Resource
win10v2004-20240226-en
General
-
Target
b5d8b9479e00729dd18082bcafbf2c1f.html
-
Size
6KB
-
MD5
b5d8b9479e00729dd18082bcafbf2c1f
-
SHA1
3edc96df01b8400153bf291b540d440556904a07
-
SHA256
dbe8029b1a9c8ac958f3c26b43650f8064cce87118cd05b630a83626a79ec2da
-
SHA512
886262e25d034b5251c57680fef98caa60f3c3cdb7d2caa85fe4fd595710fecc87b8eab1eb82493c4b39af2873bb0e478d01e71daf5804807cd79b3855492c07
-
SSDEEP
96:uzVs+ux78tLLY1k9o84d12ef7CSTUzLcEZ7ru7f:csz78tAYS/Ab76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e04c52c84e6fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2788571-DB41-11EE-9D82-EA263619F6CB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415840549" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fffacc0240230f40b575ac5982df49bd0000000002000000000010660000000100002000000049cabbc5e5ac3e2af118b94460ef48ee6092fe93ee5fab6095bb0dc6be0c5bf0000000000e8000000002000020000000f999eb7a699310a52f6d3c48d73097ad18052084ebc43a24ba50e9d5f9cd1ca920000000a567909bbf221efd63e64f7a7cdf9473569c9363a6cc1580c51842dbda49bd46400000005ae58ab4b140b045aa6c3de4a6cbb095cd74ee21e831f760ceb54dd96890b6f7484d04bdb85b45ff5aed57311af6e6fead0ce749be1733ddddd637308285663c iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2244 iexplore.exe 2244 iexplore.exe 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2900 2244 iexplore.exe 28 PID 2244 wrote to memory of 2900 2244 iexplore.exe 28 PID 2244 wrote to memory of 2900 2244 iexplore.exe 28 PID 2244 wrote to memory of 2900 2244 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b5d8b9479e00729dd18082bcafbf2c1f.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a3c6d98927615019485d179130c2aaa
SHA160950ad408cdf00a8374c6c9d7dae0e83c0ff8a2
SHA2568731c0a6ec3189ddf219abc4b68238d0e8321dc5b5ab5574462e47e912d5d04f
SHA5124bd646a1159314c9edf0e049933c4691e8bc1a742747c3d2f27cae4298c759394089b9d4ca29045bbb2544c584927a5112cbf885aa4e4d412e1b91436d138a9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586969e9fd29f56dc736a562ff651d425
SHA10196edf7b889c7b5f17e490e688a6b690d7a5812
SHA2568f090752f1a3e1078fd2dae0d90f58da6ab17fead1a6182d37a9c7af7327ca9c
SHA512dbff981d85d6d521e026265f7e89d071f3ad303dbdbc8f30d6139830b83726108ee2b42d46de00ff74259b0a55c6b56d1513fb8e8cdb1e79c85a4e59e80816d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55710d38017059b28e1b0418bdd274847
SHA184d1a7fdfbe4c1080e06f323f703266005213463
SHA256f89701916d3bd70893e1e12b9abc7606cc7b37ffe9d38abf96ea015b9b383e46
SHA5122b9cbe47995a5fe686873b3001fd8ed717d10c684fc5057adbf84846aa165750fda82a52ace4d837811931ec17bbd992f78a3af81d6edca9edc21775a7cb2258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ea0816e6825c21f4718c8d51c683995
SHA151c38f9397ed80983d2f85e7b767435e1703d919
SHA2563aa40e11ad7de6928ac8c03739cabb7889b5ac11eebe28034089168b2f1fdc45
SHA512adaa8b0538fa4321195c2c8b54c900e5353fe24d6c3220f6082db66f39f7360cfcb9802015cec8da7926ef2ed4bc352d578e8f65fdac77ea1334214656c8fb58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5073730c30e9f5ea5f17ed80e5c3b7494
SHA1ef933e1347fa10394c222d845b22fcaf4274183e
SHA2565c75572c82ffc702b09fcf141d4cc332965c018ce7d97f8892f7782e6a94c6a0
SHA512791525437b0b077f0b59b0e660c2ce65812533af48f4163e9995e9a115860cf9959f736246418e221d72d71c651c1f15ce260101f76ddb476cc74963288b050e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce78bb6a79b27567cc9c6e221d0b59ec
SHA103a89c3ee125e5eb3293fad38448a7d2f689ac46
SHA256e4b9f8c22dfe0718d289b152e1e9c44b4b914bc50d87e9ed379ae3dfa50e3081
SHA512cf1de124f6ef1884dfdf8764e9d85eca16da2315ffef0431ce10a55b3687ae407a5d0aa64c0184e3abe380090a8d3ea8c81905a2e744e30440f379adac6046b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebeba394b03e8dba46c138e169817930
SHA1c924b1b7034f43376fa87c8aa4480d527680b9f1
SHA256627dda8612c32226d2a987f483ea2f601564d946b665a790988d3dc06c713fe4
SHA51264228b448d6961a447fc1ae34d4dc246ec4419963a11ac212d10485c62171ceeb2f741b7767c3917bee26bfd993c884fad808c6c070bd01a058cb9d9d47f7f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b48d942364aa0ec21ae18509947f53ca
SHA1c2cf0e2919b37cf97b605ddef7d7b92c51b09300
SHA256075c014f86c018250a105b7bb9e66bda532ac2c36cb5b74c551226c77e217922
SHA5126ee5cb05d3fb33e8c83620ffe3d67d96230b272ea98e055bc97f6d2d3381b195042481aba72908c547d344d322bbbb499f433807cb28bd9e45627b20a713b8f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c151a60781204fe36ed70557a2bc686
SHA19c74f75f7e96cefe79291e38817a5b731e995d4e
SHA2568b6c195b112655671ad10106656a144349ee0916879a62ef25ce18952906c6f1
SHA512b89a9405d45901628d07dfc60ebd07484547df47ec600812e62854ef1b9f6c37c4c914951931565806788c029973f290b7d6221071910afa04184ace0933bea7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c9642ffa32dbfa3ece372e50dad452f
SHA11bc94b8646d3a7dc6713cc068aabd5c6e0105f29
SHA256f477e4fee73f4607f0498aac023c7dafc2cb2604d7fe61590dac3cad5cc375ba
SHA5129c3e82906ac3f45ee4d2452b8715a1a8ea7ad9576ddb90297410aae596b5d630b6210b29779d2a562d92cde7ad4c6dc44acd5df0d7512c4b64794e8a55e44982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546707170d91abbaa70d438cf1afdc73a
SHA16666c6dd0265c82f6b103cb54aec832735264910
SHA256a57894785760aa5d97ebecdb067460737b13ee30e8732ba9f2af75e2656433e7
SHA51260562e797e0dada19515520003ce2d7fdbcc0f228661abbb05b5559367d8aebe0d29d3e09d8ef807ff401075b0611b16f9d7217c58589c45098400258107d571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524eebcb76c85c684548f4844eb03d379
SHA17e6a20fba604607d1fd480f4980738882ba51a5f
SHA2561ee85e9ce41207a32997ba8e6be60ab7450464227c4be355141957e478a3b23e
SHA51280681bb59a8cb8d599731305966d31699c9615827de2fc995225adc7f24c6eedc3ae398c494478551dab68ca2c01f777c297995a5c006095502bdf2b52ed2a9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ec8b61dd9bbfd4e4ebbef6e42af63e1
SHA1e1cd2d59edabb44bf5a9ba4bd1ab62ca809268c2
SHA2561b1a4910b850c0101b8de3e1835feea20876e1bc13a058baa61dbf89e48074cb
SHA512632576e0019bb28cebe13dcccacd3d4e221f6fd37283b410d2da8cff5c241dfda39e494903926848ab82ae5131d03d14ae0c9a6f8d38223796d16b8cd9e7a66c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c629e2dad129e0c81882e525228090d1
SHA145e828867e1d3569c0cb1ecdbb0baef394179dcf
SHA2562e6e407dfdd8454d3fe17f0b69ab1169c954dd99a4a57102b749b485a42a6654
SHA512e943ebd8c162afcffc13f60491a00fc1a8678b3254ead7183c6d4a5806281692c6eabf219296bac399f4c0b682fd74663b902eae2a896671da8760d804df1e87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adda22615fbb5eb7198c3bd23b58b425
SHA1329d08a49aea6d1f7a03d99f426bc6e32edec954
SHA256acea1a04577a7a15d307ebf89ef70fa560ad2bcd7ad4d0747c4532b726ae7f02
SHA512a3835d3870253f5725dfec840b0168e906413affec2fa4fdcfb36c756c66c9f1fb9d4887c7debc9d02259951601a81865e584636856e4a39a3725366d1bec37e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52db695ab4c7bd136a0b3bb260a9e5d0f
SHA1868948881a0032bcf56665ca9e4073e29895e19e
SHA2566d68f58ba40c3fb8fb24e5e9d7b4d2f81779c7b23502c5eebeede43fa4e57fc1
SHA512637f8b321f8e0bb52518d60c11b9bb6340515bd1741d750a17128a4676bfc2f119f3c32cec1cd03c49db3f15bb408bc2f8a1d837c52726cda2fe92417957cb3c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63