Analysis
-
max time kernel
135s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 14:39
Static task
static1
Behavioral task
behavioral1
Sample
b4f18109292564a027b4846d60606890.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b4f18109292564a027b4846d60606890.html
Resource
win10v2004-20240226-en
General
-
Target
b4f18109292564a027b4846d60606890.html
-
Size
26KB
-
MD5
b4f18109292564a027b4846d60606890
-
SHA1
7489a2d37d3a4ae443f01565e838298947976c0a
-
SHA256
73832e91a4fbf1ef45a467de69b6a546b777f9958d25f79389212c29c5905cd4
-
SHA512
f234f60a6e35b322996e25317839519e1391b66c2fbccf279d42f96b3765686b96c52d87223514ec2fa79b13856cb865e503d9694a7520eb5cc4b04134ebac04
-
SSDEEP
768:zo65CqWkXYSlrpY7JAzDXkKPr/ZV0hS8DrFcnD:zQZklrIQXkKPr/ZV0hSpnD
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415811416" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1F1D2C51-DAFE-11EE-878B-CAFA5A0A62FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 801d47f70a6fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000089daf1fa690415c32960bd1948e8215763f74913d03af1a736bc1d4c4ca642f4000000000e80000000020000200000007c447b57f2913c353d9b63a404da942b1b108f3677bc5d35871efebfddaca3d5200000006e6f34ba48bd34d9b4d613b063069daef6d1c228a1d2ff7272d9cda11188ec7540000000d72db2ed44526cad2e7045d18902a2cccf413d7eba7849f0665dfd03fad5a6c2ba9f0e388fa9d8d50ebdb8318c1fa52b34f853c2a1d295baa3bf2c66952b1cd2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2020 iexplore.exe 2020 iexplore.exe 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1192 2020 iexplore.exe 28 PID 2020 wrote to memory of 1192 2020 iexplore.exe 28 PID 2020 wrote to memory of 1192 2020 iexplore.exe 28 PID 2020 wrote to memory of 1192 2020 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4f18109292564a027b4846d60606890.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c3a3c600ff9094eeca0316380bb36bc
SHA1b01f9fd4ef8015c8445b22abd8c1f69c4761d50d
SHA256e1dee18710dcb8c7c5cbaa553aaada683fbafc3afaa2a31a1e0988ae8353ece7
SHA5124f6dd26eac5df8f978926bf14f64ecea3bd18d820eedff952deb402a715e359bcd00f1759582ee8265dd317ea4a911a37a65886a29e78bbc8d5289d952905c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c7df2ae63bd3555194dd0a3caaa1b8f
SHA1ec2b4a0a439a6dfd5a4a1aa3845f0f933c99febc
SHA256443ba71861c9f0e0548a445f55e08322370ea8c7877a1fb5062e7b80b793f4f2
SHA512cda36165d35276e2aa3573713125aaa991632114f4ecc86a561e683e621fae8e890625f6ba611aa8a69f107e3b87c0432d9f45c0dfe67fa4e5494df81c097c4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d8f36883e0662139fa4c91bc95f9c0d
SHA1ffa16b805a193099a91cbe0d5baaac93579663d3
SHA256a998f4b8817963d9c94a031634ac6d8ca78a5fbd27265d4035e549eb90c05252
SHA51208bbdc9606232be14e4205d3031f1ee6fe10956ab4f3cd0a790b373a7cf975acaeaca71904293c8a6c563cc267ff7cba4b37528eedd00f303dc131ac1422c029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ab08d07edd9615610591ca5ca568c59
SHA10219dde734658cd403e00093dccb6240631060cd
SHA25638ec7d6964c27e7dda8f279e07cc359a4bdcee720230ef5db875c89caf8f976d
SHA5128af469018cd57c61b2964ec75733c7f365318deddaaada17ba0ec306a29e71c1761f7e2c9380b280cdcac0db1d2359974b6f14f16a29496fc967a9f7ae454a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb7f0288ca46f589c1ea1dcfe618f9e5
SHA143e450111d770a5a56fa7b91933e7b7e94e187ff
SHA256c14176d22a6d827d2f176dcdd91fbb4e2aaf3a59979d55d5f91fbff595339c31
SHA5129cef3723c5d3a7a42de3b0cbcbec71d3f3aab1c956d68192c1831281c2bc2bff07efd5001c2067eefed274c57e7b9152645edeb26910f3ebd7f94ff71cae800f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f33651110069aec4decefbbc6677c67
SHA1f461b155a58e3a8047a7ce13772523312df53836
SHA2566caeac5e5f894769050c70ffd8f309f0e3458f27987fea11f3140ae76fcd338c
SHA512a9980aa12877aa567b80fb639b6c6082fb8105055be8f605ebeb9449315cb5a51e244f06fbd0ad8e08803de92d5aa4fef413a01d821bf37a5fa719db62a4e120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f1c5d1a743e40b5e9f9073da2d92b81
SHA1fa2580e0d94df02a2c266a1759eaa92178b6673f
SHA2568aad63b7d578259e74d323c714bbba2ebfa67739730f456be9cbe99a4e9ce743
SHA512f2749ffe65adba8f9112ddc312d2f86ee9ef19f34dd137d9144afbed830f416d0de01ee189a400cca79319fa56bbd3b1a57d0569ecc2edf61d1cd5fb9c5fe852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c68c485a3852c72b749f357bebd7614
SHA1381431ea41cbf7314f2c1419fc2bfce96d34583e
SHA2563f0e04e96d5a4510d7174a52fdec9ee0362b1255c639ae254fb351c5007157f5
SHA51232df0b7faf8850e46ce3f70f651dd56dd0923cdd2415807a41078e66b72f3162e8c779a930bb9449280d2753dbbafb2d6884c1852a36080d50aa0ec49a075d0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5707aea8def3650083ca02a6676a66ed3
SHA1cb62609efb4c77d2077c40ed758e0a05f63b31e0
SHA256de2ed9b998fcbc728d529190313e39709c4d4346bcffd5430ea80c8bceed6df4
SHA512c6eab953a75448ed9c8e874cba08a9aaec4aede20a6e82dc8bc44d1ee49c2af19d95212b07fbd94d686c57832e3fae1ca31d2bbc1cca828da721e34de6df1a3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56359f828ca0b69235b16921ad9081cf2
SHA19d075bbf8ec521de17aa0c274781e955c4f3d8b1
SHA256733c86814965b80a1619415e9ca38fa8cbf17de3c5dbf186639e5a64c2efe413
SHA512fb1b146246f8d39c8fc5d230d7201ee387ea97582e47ac0019eb791f9b65cf6110f9d1b12b93ab8ad4fe75469b8e079d20ce6d68d74084f72cd760cddbb7c843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564030d2f3d2f0785881fe9bc7587522c
SHA150be7fa75e82c2b0d75097169cb13944da513919
SHA25654f3f4204115af197fab7d9b4cac274ded1e8182c2059d9e140e4584f5e547c1
SHA5123f30d07f4d9b6ee4b269bbf48ebbaac130c028f9399430eba28d6502910da21c601ec685697dd1daa97bef056f6f384df08d63616c3e9cad5fcc5eeb18f8150c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ecfed72069f00528799895e183c0b83
SHA1e7e75297fa10b509cf5835041948b21d2caea83f
SHA256a12fadea3e67d2f24211b2d001d09296129c107947c5b3baea718b1579d1d315
SHA512226c3592ec7da3b236ff4c62f9fa5d7469f0a4a2b54fec31fc0714e9b2829c8eed6f737c1d503501ec2849c7ccd3ecb77b873ebadbaba5b90e02452b1cb34823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5784a9df05272377cffc0af33b28885ab
SHA12d6b41912a4742fbb04b9a5037f8d9ab07882bfd
SHA256822efb2a2b0c9032bab679ecdc22165886a60fd3196db1c17e04cd0da72efe00
SHA512fdb232ec8a30eec89399d957a80b334ad4675407d3a535e570fac2759b061acc362e3175a8c9524700e53f754a4155037be4194a87598bfd64008f91b98c5302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ed0dadb46dd9c9094167a225d94d8d9
SHA18975b7b2056901b25ea5bb67ac5c039d66d9084a
SHA256da97b08561f07bfa7d554c49a705c5b45a426a3ec2cea089c566ce4402510fbc
SHA512f1ab02ef0d42156d1943e363f6f1494b39f2916a64e5ba4a15ada95a30fd74d83780c0000e8052393189ac42285927bec8e68a46cace9077d8763038bfe09b80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5baf6302c2bd42c1c768eb9343dfd6858
SHA182b598c381f104a047870cde8b2190f357401970
SHA25683d69ea2baa8ac9403f69d78f4ed6692dbc46a49673913bde30d82e9d80a05e2
SHA51213c65e16d3939f8005ed20538f744107f64aeaed2119a30eebc2363bee40e893530d900696fe1c571cf6c31e169b9321c14238e047eee9182b43fccba4ebf7ac
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4JZQ5QLK\cb=gapi[2].js
Filesize133KB
MD5c8be3350843695958a33474aeb3ea8f1
SHA1ad92694d9b189ee479c1be438636e39247b216af
SHA25622494eb4f5fc2ef8c229b9df2e171990687e4837282655145cca0fa302af1278
SHA51254ba5d4076fe9fe4c4ac22f45cd7d2ebb4e8027d8b8f82580436dccbcd60fa2adbb948ff1234d9912c663bf1fb33ac834007850f5a3f2abfb96a7a4feb110bc8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ADCJI8Z\cursor[1].png
Filesize3KB
MD5b2a89420b49d35395c656b2ee9cf6d45
SHA1e7afe3b95aec0a3cfeb9c54317976026466676be
SHA2560a6180120a39e2729ac2fefc8499b5028466057912eaa64bf991fc1f76037388
SHA512ab54349eebbfba5e3cbbf54501a2a91841f5cb31a2c6a6fc1e54ac9637534cf5938db0a17aaaa739a292c08fb5b18108b0542a7bc0a1d404258f3858ff81d876
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ADCJI8Z\platform[1].js
Filesize56KB
MD522bb0bee85abdb9d4a065962582936fc
SHA101ba1a8588197194c93a4673c472ff4a804bcc9c
SHA256e23a7507aebfd7528cc99957bbaa4a9917de241a5559fa73ed0ed51e424aebff
SHA5127a630871713814aca7f1ee133b99677eeca76a40541477fbce8bce4e17c6202ed4319d880eaae1f8c88cebef664a4e191825d056597ddc6471521f32103d3cdd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63