Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 15:34
Static task
static1
Behavioral task
behavioral1
Sample
b50caff33adda01d4a82fb47fec1bea8.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b50caff33adda01d4a82fb47fec1bea8.html
Resource
win10v2004-20240226-en
General
-
Target
b50caff33adda01d4a82fb47fec1bea8.html
-
Size
17KB
-
MD5
b50caff33adda01d4a82fb47fec1bea8
-
SHA1
f766329a970cf774a058ba8108b4f955a6e9c005
-
SHA256
2af9fb4780b3532a62851b01ae501d31b2ef9c6b69adf8847d41356c7510f2d0
-
SHA512
9ad00f341e6e5164e7c9ae00d5e0b69f4839cb01221e0932c4a7a9a470cbbb4ed3be41e031084b1538c9c6f43844ef77de1fea54fbeaedb06fcc185eae2f4757
-
SSDEEP
384:Rtl57sHbGDYwWNQmKs/VwRgpHVzVCkVyEV3VzVfVy8V+oE2Vy76lISa0u4ZxU3cK:RjdAZK6z1hPrFhtlVfEsNlIB0TZo2I
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D5AB1AC1-DB05-11EE-9587-CAFA5A0A62FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10576db4126fda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94d2d3723739f48802cd6414eea5c7e0000000002000000000010660000000100002000000039737a41146a70198050310532e5eb6e37cab89122a3f1bbfd214ea84a40c8c1000000000e8000000002000020000000f909ba907191b928777524b96a89a8dd93ddb26b27ddd30b97de8318287e14cc200000003a4a70d5fa8f289f4ffba2ad64440a740cdbafec2cbf64df7ca11912c5d49070400000007558f0e5e0ab155a87f6a0f73c59714f8e1c9984fed3a3bd3bc0e2cc241ce6997c0ef0dd55b2ac2c157ca751c3d7156208914a579fd44e1fe43bcee9433c6b38 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94d2d3723739f48802cd6414eea5c7e0000000002000000000010660000000100002000000078a172948f8f18dd24365257d89bd554e667b537fef8e3b2124550dcbca9c694000000000e8000000002000020000000305f7d0c30bfc9d315aed16c5dd1b7a1cb4bb01dd3e5722cdc11281998e2cb2990000000f265975a9ce07f703efe4096a5fd119bbde79101eec4559e5d9be946eca74fe637b18ceec1a51fe43820084e34c153f3cd2c47c3afc26bea46768cb1124f08ef78125bac4bf6761d29704e71feedc240c4d5390ba5320dee71405786cc409f1d0dff010ff7fae599bfe7176fc56707b3292bf1bf737995f968bcde2b76f9b94628ca34317adcca485540c46948c62e6640000000de01ac5fabcc10daf52cab918d8c65729e4983e29655a9ea23e21393e7fe82259e1e25aedd61563a07affdfd7b620ba0327e535a0efc176dcf4950905029ab3d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415814737" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2292 iexplore.exe 2292 iexplore.exe 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2632 2292 iexplore.exe 28 PID 2292 wrote to memory of 2632 2292 iexplore.exe 28 PID 2292 wrote to memory of 2632 2292 iexplore.exe 28 PID 2292 wrote to memory of 2632 2292 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b50caff33adda01d4a82fb47fec1bea8.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD528b582fe3b3a10a9307cff16a123532a
SHA19d77989451a86e9f19f98a32a63ad7d0bf1ac631
SHA256d5ae26c7a61da48bac2a670b192b173ccdc9b118afdbe156bd2c244cf6cdc5bc
SHA512709052f528a24072479165c3a74063cfa524e5637c936cf37f1ce4eeb2969f404d4005b6e744abd9c387744aa6148de117d7d846ce4cc993a6fead72b3f2d886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57217ace406bd7601b6fadf0e11efd1b8
SHA16180d4c3f126dd4a7e3be499812dc434e8c14f5b
SHA25607ee639e0e1c84137daf60c840551e93d6206ff0b87d94d856658a2c5f4aa71d
SHA5127e59d38ca9470d86eeac15e0706589b7f384eec89e73496d67f6279fb9b48a564bd796772a06aa8d47eaa53942ca796fd12f3321c45f5ad4e32babcee69c2900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55da17382b95035c9ea26b8f18c1b88d5
SHA1a18f70179081dfe2a6ff26978c829142635f837c
SHA2563fcb66094045c688dc19d25f5412a4860ccf45baa558064b1758fe0a5714fe46
SHA512385a5d33aea5f8938f47e49bd74beaab92f2c8d075f631ed6b991855075968194fb19531f9dd413d4ed297eee1c0ebb284880f32ac05bf3f2f18c59f2c7a1521
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59a5e138acc8f5c19a39bcf264765a7ed
SHA1bb4ec83973e0e3a22932e3281d8b3aaf61f22407
SHA2563ba9394a3147bace981aa1fe627f79478aec96d66990794241f27acf85401816
SHA512bbce2b2f736f33ddd53cdfc45b4f894d4729ddeedfb71aed6059cc61ba831952e36fc4c39a615414e9702ddd4596e6782f2613bad668dbbef7761263a0a36996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5719039d258ccec8d299b87ebf206bbdc
SHA151148380c21a1e314927bcd1453892ab08583631
SHA25612425f082d1d537f45165fe2eba9630345e2f90b4d349eb6603f6677f33429fd
SHA512a0cc51c7c890acbc37943253fd4f06b44e3fd923619bd6fd4618f0383d2c789f292ad0bdd3d449f39150380411616372bacd7eeadbb0758ba40259e79b60c29e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c2836a5953dc121971c73c7278cab0e1
SHA18fe15005c108002c766d56be128d410d5775955f
SHA25606b25f6d99ca5d93e5b6477cef993bab3329702e926d3b0133da8cb154d382b8
SHA5123f07aec193c71651225df4a3ff5ad9fd1729c221c8889d205d1f5854056e1ef744fb6f066cbf9351225a339b2763a7a2825b445b7b45fdebff514e20a4924f97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5db480867a1656ee3c099ec6653400021
SHA1c4a7eeca0878a2ed438915b32e39d8e2876cf087
SHA256a72934de777381b16f699472a8cb54bfbec68e4995f0f0add7b0dd16f15b03a3
SHA51283d145d6ed80021e676147b8859801f4d8c255e455f1fd7ff8f1f688af4aaf8325bfd1ff46088e5bd16348ee27b4e0dfa963be4789afa76396f0fdbfaa844106
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63