Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 13:37
Static task
static1
Behavioral task
behavioral1
Sample
b4d42663d252a7e8a80f3cc1563a8a75.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b4d42663d252a7e8a80f3cc1563a8a75.html
Resource
win10v2004-20240226-en
General
-
Target
b4d42663d252a7e8a80f3cc1563a8a75.html
-
Size
59KB
-
MD5
b4d42663d252a7e8a80f3cc1563a8a75
-
SHA1
fe82e9ae2f2fbe42e5187569eb6639b056712c74
-
SHA256
7fcfb6e8028f4d669c643f7257a6369df81ad131a47fc073c8b456970ffbea2d
-
SHA512
e9c6774e87bba3dc768cc7a6ce81c7f9d158875c2a6103f9fe202571936999eabf868d472ab1ab7bc492b05c677573308b7e05716cddc48326d5a1613d6e440d
-
SSDEEP
1536:SO2+enNSxKItMFXoWyDs4F4FEFdFuFvFkF5FnFPFsFiFyFT/7+:SO28Vi3v4iaPwBaT5t6sQx/C
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415807721" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00629c72026fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{84A9C7D1-DAF5-11EE-9DE9-520ACD40185F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000018bf1f85850c2b318e42eecc7a51932efa74eb4ce80107fb267b0cd397cc536f000000000e800000000200002000000034447217dbfa88c89a5e6c32c922083f34206223100fe1fb012955549b4671bf20000000397fd4b6503041ddea8b817e2a3c5d34e61f537fa62c9c019c395c30040f0d334000000021c39ce3a9d7375a48d33df5886d33253178c58d502def6674aa74d67802e773b6e82204f37d78b36aeb0ec1d733de539692cdbdcb5c9276b11c70250e12db67 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2944 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2944 iexplore.exe 2944 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2052 2944 iexplore.exe 28 PID 2944 wrote to memory of 2052 2944 iexplore.exe 28 PID 2944 wrote to memory of 2052 2944 iexplore.exe 28 PID 2944 wrote to memory of 2052 2944 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4d42663d252a7e8a80f3cc1563a8a75.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2944 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561f851b45c39420ec3bfd39965a5542a
SHA143af9cc69b2045bdecd48671956b4eddc9e6a309
SHA256fd7faaf9431902a94d3fd7c06b477f3fc533f8f7f8d28f3062488d49c9073440
SHA51297debfa90c7be64c0ac800d53d81e7f8ab5f4287a484b808f603d1c141e48aec27619595d343e3231e0b5030dcd1479eb2e22f35abcd30381f0d1744856cf584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545c08cf9e1b8eac86d229afc8634fd18
SHA1ab1572c1c47b6224bc7a45ab78b518e1ec0744e5
SHA2561d3b447329d83ba450f76d8e30bcfafe37b05470998dd2e3c1e1b609c58e5bd8
SHA512f132b0d0b870319b23af9168ad1bcdd38785a4997467930408b7bf8cc42cedc7eb5c3a2b7dd409beb53902cd9dcc74b553ba01c34df36861ee9ca4dbc64c3c65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572fc8731ffc00ec0e587e3a1150dcb64
SHA101e0707753a27090174554f54df275f5caf238d4
SHA256937b322a00136432a18409a06230f1516e87e8cb512b9cecc16c1ccc01d4d5e6
SHA512d82c79d436de4deea1044f11d24f79e293525744da07c60065b271c996d49527fb51903942d96439621716de4a56e8a8bb0c2d56d4589ddb43353c1b77b2ca57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac9e1c9d00e2ecc10c735d76762f8abe
SHA1597bbd60d760248651007b64229f5dd687544887
SHA2566b1d848712bc27a7f19350080454a8e7f6c3115cbf6c63d863dac47cbc332a9e
SHA512d6a8d4267ab4ba4daa3d77b5bf89f8e0eb11fb964af2aea29abaefc2d105756aaea9fed58fae933e722ddf69a77ca60f9110c3d224a50dc969adf13c96e7d0b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562891ed4ef03845b0d24449b76571ed4
SHA150cdc11b06c5f861e3da753d59724d5083222772
SHA256e22551dd9ec81540ca9b3b7fe4bcfeef8320ca31afa3019ec10452212dcdb4d5
SHA5125d20690659d09f02e5ba0880a80f3a67b0fec04846bd052ef14fc97fd3c30389c7c210107ebcdaab0cea1fdfd4f697aedae2b29a6b0b48109c7f565d614e3c3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a6e066ee450290572fcb4c7d2008802
SHA1f0927393e353b7ae7255a3e3fbec69978f41f12f
SHA256eef80199e173bdc5d9ca1d74c844f85e83657d181690f9c1e740a462473501c6
SHA5128802fe68dc4c873492c39fea36913a9cec0d7c46f5b1ac4387e4137ab31ea63ae808d7d6d80d101ba36d8578f222546dadd7ce05c5f00dec2707bfd37b7b6caa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57978fa5d69b0206af00e2ccf7ef2ca29
SHA129347fc7cf4a3d748e29fa54e951e19fe57f3b38
SHA256ea0f63cd5f32b2e5833376a68dfebe42cc015f53578d7e78e91cf97d97816221
SHA512d4c001a6bb1c9624c17cf09c3184e5dd91dccb08105a2939784b39402cd8016fcca056634c667dd32df7c11e49282a49dc0522342a89549ebf4997c79a6575d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5239614d5df74478b7c030f6190cc0895
SHA1754facc5ca382893b3b1a32216afb66623d096e6
SHA256539768059fe19931f34a333d9862ef9c5df0325c73151b179cfa00cd442d75bc
SHA5124dfbd0e376c7b5b106779a0e160130aad9c6b50714361cca84446a143d220ad80cf3a4f2c4d284f5008bf99d9305dd98615e89c71fc5354e4a95dbdd07e92052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4942f14dd097b1dfa541b20ec3124e2
SHA190117b00353947af8d095a2efcc927b07ae7d3b9
SHA2566ff21c3ec93ef428b2a1f2e8135c39588e0b5c11f9bb5a39ea53c0494e8ecc35
SHA51252fafc139039f740f850634f85ffb4ef9114648325390f3824e309a27558f4909712f462f00773fcd1096cec11ca91a08f1f55093b3566981c0f1758f8463005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c679c8a81a22d24e13488b200031c3f
SHA1e2a9b4dbac62cc5045e867495ca2e53dc58db71e
SHA256c3965015144f6e6d073d1fce891069118a467749baed00bcbc0a053d3f95a720
SHA512f8e311bfedf2448b4254fc9a7b6803dfeab73a20d86bb0201b3977849c8aa4910d863f63219ee833a792bd4e472cba910638df106790b73803fea969fb9e80c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588ca7a2584ae6f4db0c71e00cc8ba764
SHA12d0d98a7078f2d0b1eaf0bb8b29703b7a7de0773
SHA256f128a7ef70ff0af113ce44ba839eaf097078d23d28b115da7816b4b8f8300c53
SHA512de2b9d9519c7698a92e225c08fdbe65dc5060af5bda58c295a42213134dae1daae0f2a21625c8691096adc339cadab49001966fd2656ad737bcdbeb7493b6253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536496db79b71fac8664646df6ff8ac29
SHA1e344c9548ee392c7be0cd3e2f09b33d7660aec06
SHA256b4c44992fbe24d0686c949c7d48dc0ef5b0f0dbaa80f2b7ca9eac1748b7cf438
SHA5123c912bdde5d95d7eaa868ca421495a3d5ade1e484a9c4973c086c16e9e7cba203b99f1a9a110f656797a3bb587d490e17d2a32fad8369134d6cabef77e7f717d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e87eeb4847b331636c7828e3f04e825f
SHA1340f39e1b1502eb8acdeb4d8f0bff329b2ff9a8c
SHA25616d4a10ab9b898894759d51f100626cd276d18c364ae006750d392d613e9ad3d
SHA512d7d463836b6377377b4429f933a1b92610b88abffdd064d9e50e1ba20f104c4a45ed3f7953becd9eb6a2a8bb4101db8baf9e7bb4fe0722e325b5cc5eba0ca9f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cafa68c85bab200e563c2607a8726b26
SHA19269f2a1f6fff0d3cc50e5d348c62c794ac2e5d1
SHA2568fff136737e7b7740301a9512edae952047408772ea0fd601856d9c4b4d469ca
SHA512afb9a5e40a2c3e46fd045e968179c8feb8617a7303b3b5747715ca6afc94e27b096a610357edb9fcb33cfa82d0fd2de295c84b36fe478c4a6798f10fbabbc219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c620f7968cfc58b82592a49a47fc69e
SHA16822c4722fc966776035f2dbeb9206374c80129c
SHA256e182aa60af154b3b07e7c509898c7ec04c8dc141e21e611683c53e6746c910b8
SHA51276b296181c3bcf337ec22a3dcd81d7a0682dd19c31ce7cfd9fba0ef34d86e5f00b5555155fcb5d474c70140945332431a2c427910216e6b4b16cc32f3752f426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a11cd7891d5ec280ccb497b704b839d9
SHA1cbde78d5c0ab89f46912d530867fb50f4c3b4ba7
SHA2564edcafefbd4e75dda6b0a0e19bca721293fa702a901035623ce9befa6f38df14
SHA512827d753670ce8964ca85b20f34283fa56275aa24969ad0acb60f501c48006a28693389912681dc0c69c1d4f286756bc9853045a3ddff408c15a1b3776c8834f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557d935eb26e77963c294730163b9f5b7
SHA1563c7a7af6b372dbb1dc10de28ba11f3a0c62260
SHA256fb237b79edde373cb2f546e979181e869cf40c22d9bccf4ff978d4a0f87b0e0c
SHA5120eb0153746b4e60506322cc84f49674f11b583c55bf4aaa976100c216d8bc92cf1e9a33181cf9341ccf7572d1a0f4c7847bb8e4fc80983a3ab97f48b6d7e1fc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f766f28653bc5d2482a1a1b7a9f3a130
SHA1132f4d32457553c9339ed03db76cf832c939b2bb
SHA256d4b762fffa215ff8dc439e2b97b80fbcc2973cfb73310c523dcbfcf1bb802304
SHA512c6bda903417b449267f3672f2c3d38c15ff44beb0c6e92e4ef760afe984a1fcc1aad25312e67af942d67f076f881fd5ee1f9ee7b888004af7217a3cfe6b872b1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OOWQLMJV\f[1].txt
Filesize35KB
MD52c208b67a64a0b623c663e7fb582c64e
SHA11416b54cd6fe5dc3e4c4f1ecba86b9dbf2816d2f
SHA256511b1b09e6ec931a16fa345d4b533f1dbbb0e45df87e356090f24fae0c1d75c6
SHA512bb7fd82955aa6d677d9926537bf8711d1bd205fd820ec3b4bf172c144509408fa4ae094dee54ef8eb9b6081fc43d2531e08a662282998c887790aeeb046cf320
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63