Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 13:58
Static task
static1
Behavioral task
behavioral1
Sample
b4de7a72cf82366c595d149ae8bcd779.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b4de7a72cf82366c595d149ae8bcd779.html
Resource
win10v2004-20240226-en
General
-
Target
b4de7a72cf82366c595d149ae8bcd779.html
-
Size
11KB
-
MD5
b4de7a72cf82366c595d149ae8bcd779
-
SHA1
f5b0e677712a2d73f6ebcf642ee786175b612bd6
-
SHA256
2886c24669db6e56f64485f06b6484258e4eb04b769a407512476018335403de
-
SHA512
d252bf161fdcca95c1e4e37462aaf036b0016b3bbaa816016b91eb1704bb0387c3cf8ffc21de0c5a3961229cd14977a93c426abf94eb42a65355eaaeaa42dffd
-
SSDEEP
192:ln8uqnGDSSW0nqDc22Ag0uiocB65QWFwgKJUiGqPoXRIjGVlUkrSbrRAB7hgQEzz:ln8uqnGDnW0qDn2Ag0uiocB65QWOgKJB
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8167B4D1-DAF8-11EE-A1A5-568B85A61596} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000b1ad6f8c3887757fe98c4d92a64c88fbec7a171bbaf037b9625c21a4655954d7000000000e80000000020000200000002b6056deb90c2169224f933d704475e247128b17b020ada4b6e4c883a935ea0b200000002a4a12cec4a3a8e7a9b9c90c2405d4519466df37113c62521c41e54f97ee277440000000ebf309355b6c4c5d3d0d4dc68e7ce8b973ca0ab35b4915d1b831df25c95d1532d752e32c08de55c75797a55fcbf7a6352e224a6fabfdb9f400b111ff3f150b9e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415809003" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a02ed45c056fda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 1560 IEXPLORE.EXE 1560 IEXPLORE.EXE 1560 IEXPLORE.EXE 1560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 1560 2072 iexplore.exe 28 PID 2072 wrote to memory of 1560 2072 iexplore.exe 28 PID 2072 wrote to memory of 1560 2072 iexplore.exe 28 PID 2072 wrote to memory of 1560 2072 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4de7a72cf82366c595d149ae8bcd779.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5092ea84ec0e05e570cab6eebea41f925
SHA18720e7413319db64fb2cb0ecf22be1830a0098ee
SHA2560a3c7553739c4aa4021c46b7d2bb8d3c2f4dfb9a7d563f79c0031078c63323f3
SHA51206bd93fd52a5a0d5a0907971e0fae5e15c986c81818a5b4437695639542a3d6119edf3a680b9ccb1ee54e933e984428b7ddaaca4ac9c6b1635b7f7904dfb2ada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bb67e330294f043ea285526368f07b5
SHA12b19e4f3008ed99b92bd221993596fd8538f25d5
SHA256374e0cbb0c16ec78f38c31e06e312ac3542ddfadfd39d70ed1efc262a09a052a
SHA51256d0fe6521a018bc590fddbda9aee2c20b75623eff9f770ff16206c77a59a0ad3da5613d52e0e79ffb90d1f7071c1189d1aeac8cb1dc41cece2bbbc28f2e9837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5249c9d4dcea123237e1a3b0432118761
SHA1d4990ad306ddb72d01fc72368337c69b97470002
SHA256e1647617bb05a00818d327fdeb1818458dadbf0a0b4dd79ff3cec012d2c5ecd1
SHA5122848e79f868cb532cc0205d3d5eab06df1a53f481dd2e3fde52f06f9561bd0aa52097aa5f2ad53a40b92bbaea12b295a8c405d5acc62ba838b6968e3e068be1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550882272cefe0d020e4dd33830e47b85
SHA1b0ce89ddba5c1ad222c630b0970068549eca022d
SHA256bc55b80974634942fe1a8f5d682bd0811a4a8bd099090d35fba0bb070b566dcc
SHA512176e77fee07230078eeb6cff6370721a2223a385b34efa9d23ba260f0a09dd53008645801fbd8bc32abe131bfc6f91f3bc7e233f25be1eabf652632742e66bd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55867f2a95c6f1064625dfc9fbc2cff74
SHA1ef3cf266306bf809f6a86b6674a33af802ca3db4
SHA256b9dfe0b93a21a3f9a5ddf39963d4af69aca9e8487fb9785de4101ff30c3c3d84
SHA5125328117a29c8505c1d6c56a5e516dfbcf4a2b284710f970719e8e1061a3d0c56d8fa7f39e93352af67ab4ae6e300c1210b1d3a0d3ee2c5bb4c4c7b0bd4d47af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e7a2a43ea6f59cf54a0e4015de12f20
SHA13d18b34cd0b5b11a080986a59e302f936f6be71e
SHA2561dceeeb0f568be7f580012f0a1e5142325d1b6775fb3fa6cf13635262670a1f7
SHA5123a42544fb9029dbe1edacb68f21f26a0ff36e0fdb890ae79cb138c9ea5aefc719a2c4704d892c4c15b8ed070f62e974ac56f3025cd340336efabbf8d0dba2e84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55955f5196630f8b4537e077c23b196db
SHA1b594eb1edb309207ff3f946529f91f0e3fc61e20
SHA2560eaa9a17ae966fa5bbab38b5146b638383f12b9b30e06db67b818e7011a3f595
SHA51206f593739bacb74ba3d3f5bfdc140522e4a5a933c5970bd980baf680deaa9031e4a4633707435f2a251bcddb6bcac9a495bcda9a1a6dd3653d139e924cacc37d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564edb4f3f17d48254057fc499d5e9c41
SHA1740591bd7573933ea1fb17cd7b672f45d0a296e0
SHA2562a6ba4d6e93370594fb5ef3955a838a28c85c3fa76f6a516a10045a3543c8f22
SHA512afcec5a21ce5f61b325a4ffe544bad93d43fb221c66728e7e32b49fcae602a918333e3a9174008af65558a3278a499ec6f823e81b0eed04e604f0e0e2c573e74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567ce2c10abe28e51b4064b0560697c58
SHA198f78a7831026cbeaa116d282e08df3ef2f23479
SHA2567290c8c1911cd58a834ece21c554f8d21f656018cf41025e19e429ff090610f9
SHA512e2941212f3726d09248f30a20d9ab67bdfc760b3a06a1a4ff6a9bdc92060aa601ce9724e86de6618afe2a3071a96090301eadb783d7afd9ed469b7dab810a01d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2375701af404a9770d65a8b2d0d261b
SHA1983846e45735c08c648e402c1088a315d10148c7
SHA2561b9676dfbffe137a718286ae5190d73717b59eb316dd25c766ea7f3ff6f6fe35
SHA5122606a799dde43f999873de52d60d453cacfbfb35b017806120b94015e3e42ea208b7794ffdaba5efc1d77947e07d377f9d35308f98e4c32ab630a0dcb16bf8b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f03aee8d950a3ba61363d917816868fd
SHA136ccd695066cdb4302387c5ee8b2e2aba1cb5ff8
SHA256b0328b2f72b4b36213fc832ac20bc274785c4ba909d91d19cc61e85b0d4293b0
SHA512558b574b1d710b9c2265b4a7171eadeb31c9ecdc12502edc4b1a4baf720aa03f3cb2a6c5eb2a433c20d52e21c44ddc045f399b05ff98b0d3b5d24578711dc8be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f06df4c58b02595c9c59d9829cb43ded
SHA15a35bc9f60e0703f8e9df58b8c2e79c6d7cdddd5
SHA256677bef2a5e04ac106c96e761db3f3ff2aaa52c19613cf0e20c5aa99dd012cbe9
SHA5126de4748e9f357e56718fc3a9249012948c496651790029eee99473ad6be6f9c7a12e5f9fbd1320b51131adb4cfbbbd4f724c56670062e70d151dbced6087fe04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546768e62b1258db4b4206f930191ce64
SHA19e061fd1114694b588a8f8c19eeefc44bbc842f3
SHA25644d9afedfe7f8631b0128e64736e5d0a83f0d1adab999157b194848c076ba957
SHA51226accb8c6342114216e78c10c54d8f593a76b0eae20ed32a1ba752990e2b8ff3b2936fdd7da3fde950f7bcb408aa795a4dc6498f38949fc90562295b3c847694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2e0ff35789388313096445d4d634666
SHA1ab35b2dd13c849dafb42ba4f4270f0bc97abfbdf
SHA256dff7920902a0e67ccc34fb04b18eb722171dfc2c4ff035f561cc150fc928a65e
SHA512ea9adccffeb2ee11a871c8c9f97da2742e2a7242bd836cc14e0b62ec7b9a03f7c194f6bc41f500ea3bc4e7b9b7ae7ce0002bc5d31762d289e5706431635d0363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51178c06fd422e93a1c54c2f9012cc666
SHA1445c9116780ad3c11e791973ac93a45af588894e
SHA256ea2a04ad6966b6000af41172e53b74230c448e5baaaeefcd12c03be379113332
SHA5121ee2bcd0b0cf606ae23ce09e10cb1c372fadd633a130d93bd8728361fe0bb206fd3a4f8c339f6a7311af2942cababb248b93cc0348091fd08d37940504f151e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5957585eda8b1aec60e690b2c291935ae
SHA1d3ab75d41645bbd0355dbb744312bc631acbe712
SHA256bbf58a3aafcc83a9b920911bfbf93429d9f411a896b5e03a6c31e1e8fc7da093
SHA5122438a1e2e453ef0c2d2836a016cb7474aa2aaa29aff91582d5362cc33574d9bb9f16e12ec31aa0712c280566b0edfa75a4cc849525e0c19f2babd21ab09f5807
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63