Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 17:30
Static task
static1
Behavioral task
behavioral1
Sample
b542360f6beb92661b849a7da9ec9dd3.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b542360f6beb92661b849a7da9ec9dd3.html
Resource
win10v2004-20240226-en
General
-
Target
b542360f6beb92661b849a7da9ec9dd3.html
-
Size
52KB
-
MD5
b542360f6beb92661b849a7da9ec9dd3
-
SHA1
e392d9270fd9c77e63a6bc1cc6f5049d836e6fb2
-
SHA256
330f73783137df7b225edc943afc6ba8fd3f3675646d39fd4366c521b842e933
-
SHA512
d5b35da3cf3b1c38ebcac929fcda1cd732a4378812dfe8d7edc8d78ff84d31e0ad07b9a70373a845107e63144a8908bc736cce9b915bca99c66861d001884c46
-
SSDEEP
768:6yGfsMG7bp2/I53CrPk7RsHB7pxevzWlVxCjW2hfvCxRE2H6p:6yGfvG7bpH8bk7RsHDImCVpCxRE2ap
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{16ECF701-DB16-11EE-AF45-4A4F109F65B0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415821716" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 916 iexplore.exe 916 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 916 wrote to memory of 3024 916 iexplore.exe 28 PID 916 wrote to memory of 3024 916 iexplore.exe 28 PID 916 wrote to memory of 3024 916 iexplore.exe 28 PID 916 wrote to memory of 3024 916 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b542360f6beb92661b849a7da9ec9dd3.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7ec0f63f02e0d149c2b929963ac20cd
SHA17f8d3e6cd43073bb0f71ea643d62a081894467b0
SHA256d6667367a2c3d1f6cb6c2ec84cb0f561f3433b7cf5a699c12a2cfc86b45c3214
SHA5120c3161581f3d8d1d05f94cdbb97e10b3fa49854d98c5d3c15a9649581738b0d05c60f3bc790bf6ad0efabe32fd6a707e72c31c8dabc29cf3da73cd95978e50e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ea38553fbc6c68c620d488b3bca3587
SHA1e46fc79f77438c41a67fb43bc6aea2dbfb8c7a4b
SHA2567bb12a2c767bcd76dbb9118b6aabab394606df14ae3257b9ca91eda5601609fb
SHA5128b32a0f9d0e5ad8e524ee175416e0e1597653a496cbc0185c12999f54476d7a85209afab29577d431c8dc3137c6ffead9bf6f3a71e95ed114c61a0fd0d0f959b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d4b74d61101f789e863a01a13a022a0
SHA13ef7669114adc4771af23dd77447c88ffbf822a2
SHA256946ab76f4f75f28259d3e056e9e19b78d37c8d6a07399fa5f4dbc36a67b0583e
SHA512f7f889fbb35347bd9848a3e2802ded3e276f3ab899452abdcbbc55913134d78cc302e753220dabd8259cc6365c9ebf0fb188f0301ab7b6429c9419bd7aeae9db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e07d7d526b1816e72e80a56166c99134
SHA177f00582c5e77cffd744330d81f0fa58e9fa4f66
SHA256d50b65bfd676a521a7897dfba7ad28602908543edf6f1502908b2836335908a5
SHA51232a4c2590606465030ce1881a0ddd969d422419d5e9f76c7ae8de628c80de55ceb023f0deb08bef7b30c0a417cff9baf1f3c338ee2bd31fb003195e5dec3e4e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54aacff139c87167b7e8b4154aec2a702
SHA11ddbdbb8901e2d977b12e041c35b62204a95ccc9
SHA256a6d5f00c0eccc564c7f34706243b2d655d72996b2fb3268201170c735a78668c
SHA5124e3013eab4aa3457f7691e094ee69b533d8b5305c17ec094b0b1a8b12c219b5460f0c07980ef4c664e3edf1539eddcad587bf183d24e57f514e99352bdb415f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d6b397437740f1445f3a494e9527fe9
SHA1523612fc2e25b7cd7a970bfcafb717a3473d07f4
SHA256f3a8359e0244ec270bb3a941d1f3fe2817717acc35bbda6d44618ff3683738fd
SHA512460825ed2333b95be8c784014c1b869a4017138a24a2b2c27e89e742570c7d18906bfc70875934761529c436356c1210d43d14155d3cba27892626423b65ad56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59337b9fc5b3738ef9c0fa3d8a7127bcc
SHA182d535bf973e2b2640db5598a3866aee7f1d2fee
SHA256efe11a4f102f392b5b2e0000eab5df7dc2e251d7f4266040670fc0cb899edf45
SHA512872176e3bf4e68e39df1a330a8e09908cd01f0b211f82e97194c7f67e8caecab6c35b67f287dacb865d7a154104745f9eeea27f8cbf2a38b6617e96d14164106
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63