Analysis
-
max time kernel
121s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-03-2024 02:06
Static task
static1
Behavioral task
behavioral1
Sample
b63dc0fcf3f7998c1c470b2dd85f9677.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b63dc0fcf3f7998c1c470b2dd85f9677.html
Resource
win10v2004-20240226-en
General
-
Target
b63dc0fcf3f7998c1c470b2dd85f9677.html
-
Size
2KB
-
MD5
b63dc0fcf3f7998c1c470b2dd85f9677
-
SHA1
7c80e87c8d5dfebdb1fc273e8ae04c0fce18bd17
-
SHA256
6734ebf65faab2e5de9064b1b0005b25b91c06a079eb2291e9c7939870978419
-
SHA512
715509d28410d7b579cc04855826723973548351a33ee2e44e06bd24f457711b2097962beafd042bdf25982864fe51ae10aafc1e67f4a1cc89289b08d07c1a82
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1FABAF11-DB5E-11EE-B559-5267BFD3BAD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c23067700000000020000000000106600000001000020000000595a29dca1ef2dc1f300e86eb5ed0a1441cecb0f2679c72b35ad71622b9704fe000000000e8000000002000020000000768ee237d12de1325d832f576e1b358c9e30cf746fb2405382e6ab77e59602f5200000001a83479b55dbda5cc0b3110b991d8cb37de94c621903d21c5db88cc11da2a0ae40000000e0cc4b09b7f9a1361624dddec7392096e747057ba7d6b45a9302aa9b56ae220840a553808707f96bb5d5a978fa5a8afa21f152b93a238b26f2aa6a1bc99911f4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a07d82f46a6fda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415852651" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 836 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 836 iexplore.exe 836 iexplore.exe 1456 IEXPLORE.EXE 1456 IEXPLORE.EXE 1456 IEXPLORE.EXE 1456 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 836 wrote to memory of 1456 836 iexplore.exe 28 PID 836 wrote to memory of 1456 836 iexplore.exe 28 PID 836 wrote to memory of 1456 836 iexplore.exe 28 PID 836 wrote to memory of 1456 836 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b63dc0fcf3f7998c1c470b2dd85f9677.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:836 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53609910b93822fe5d1cac651f657532f
SHA184d106793aeb889d7240ec703d4044665bbf4b79
SHA25653420c869625b08dd858916ef63fda34506175da3de2ff561a5f8cefc8050104
SHA512f65fc0fe20de2e9e694776e083e526019ea5662891582544a03af61d219dcf87444437680aa18d7d84a27e9999e48d232d65216f24376d07070d932bc2b87ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512acc33c369f6501cbfefd160c4d61fc
SHA16a8b80dd0a43e563db1d98013a1ec37c5d8d6ee1
SHA25693925cbd8e9966b617a05f282782078723a2c38b1486bddf1c9f2cdb85970b48
SHA51250d104d7e3322bc9dec5e3a249279dd1064dd187ca74fbda89a70f53704f612b4f4dc54907ff7116d16ced20a3c437bfe1f55f8ad71fcf5077cf71849607de35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e404887221da0805b160851fe32da85
SHA1070cc269568bb23f946337e51da826e74d82c7a0
SHA2566e9921811d6323cfbcdeececca7349e0dc4a3428da95ce95e3ad4bc2c7cd5c74
SHA5126b79b6fa67ff26222eaa608de6a8b1c60c9fa7b7374098325f8c4ab58ecfaf497a2452b6e322b3572900acdb269a0d587d63cbc47be3a3b1da1e96790a905146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bf397ec7e1ed10f765bb6c95242349a
SHA1dbaf3bf0883015c1ade6faf9601fbf2a7e6cb88c
SHA2563498f5cc30eb77d8a703128b12a7f59858bb815512e9e4746f6ea0cdee8b7dd5
SHA5125d39ccac694b2b454c8670f9f63ce1e57a69ff6cf71d8cd1b2f19bd2acf023e73f149ff3b994f9b82f11696832a2d97e7497fe76ef48c9af6b68bbb09165453a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591e41bd1c1f38093f31eda07a49ba3c5
SHA1a5353b7b0b8889547b7e2cbe4227ca1247573f7d
SHA25620719c8af437c45bd705f7413a8250caa8ada856f961439e87fea48e937821e3
SHA512193b7b6dc5da3c9275caa1b1bd016008bfd39e9d160794bda6167b801dc0a6c12c18f25711214689a806582ce236a7532876f0c6a52186d554e41cc89bbb8441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccfc6b277d91f85b15875e26ad7e8569
SHA165ea37fa534b92e91452a15dc3652722d0f0e2d2
SHA256b7a130775ce625d1ae7443437b9ab8e4303a9d475382ff91fadf74ae6ef86d09
SHA512bc1b45c848017de134d8d1fcd953f958f3c6a2967f79559d55afbc539e8fd9ba9a674d76171de5115c6d8e6ca79bd6d7e4b62235497664d92038dc808ebd0344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557d6be9677b133bc7c1ffa1806d51ffd
SHA1d623c46f929716049c294afaa410f5bab895026c
SHA256a94bcc949c5661fd91acc1e4dee5508f385042725cbb4c3a403910655a195d5a
SHA512433974a691c7324d907214d6c3012c6c679033d7c03a73b7a682ff0c48d5c530c15b941154601f7715286f3a13ca7abbbd1b37d67861f9833038f01d846654df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fbf3a23bdd1f9fa3f8a9061b240d92d
SHA125775c3d3c0830b675d282a801268abeb139cf4a
SHA2560e2743ee92cc4acafe3a13ca1ba7bca3e88209b0a2b12ff3bd9fa4ceaa0d7be2
SHA51251250dc06995adb17adb22423fc0b310d524b63783f33c0d7b917e762e297d8001881dfca7181468f977e0fc3866aa3446914c4813c8c9b54adc816e5393a901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5951f3f07c101e9aeaa8a6a84971e457b
SHA13d483d450f59fabb6e9be09c026595dc6ba46faf
SHA2569529c658bdd0e58c39b4f3dcb9b7949b08ee3dac26bd3e4efe0bfd9c42b42ad8
SHA512db204c994687728b05ad2cd78780da0d14846b950eebbaedc2be81cc8251fe529d5ff91a79b16b723231b626544f077fc0efeb5b8783fd6dc2629740e1591be1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ce70e9b5ec648d983e6b1536a0095e2
SHA1d9d6ad990e3fc92046dc0d24174f1f5bf635caed
SHA256be471b216c52627506253b21f3af385ecc28b98e9e9d3fcdc6254fb6e2ca234f
SHA5123bd352377b58ad5ca8aba1d8d7ba031e2f0d7685b8824352f929f323b6d26a58cd79fa9a9c1d8d7c5665167fb258d517907bb241b7888b0c52e5378d8e185ac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf791c729fc732ac2d151583fb2c37e4
SHA11a4c8ec16f4bdc0fb55fc776dd25f609cf0918a6
SHA25686c23ad9122fee4b62af03e93c954f276ca86bd70b636fc0c64716e4dff14a83
SHA5126ebf231d11a162011bd40ee23ad9039213337945cf2a9dd1cb9dfb2d347746c4c163a68e8d3cb938619edfaaebdbc5f01a07294efa69da2ec2a14e9c6a22dddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54669d9e44caf482c8e4d006e881faced
SHA1c1912c72015328ad324383cfa5828eb0d468d607
SHA2562b4fc57e6a61ca5c81bd55d4c4af5771fd5474d2ace7c4ced0b856d8e6872d0f
SHA5121e5591546b86b55c43a13b8db1bb91cc476b8bfa5c75a38dbf074d2db742637ed2dd42dff264c627b7ff0635a61e31bb5600a02193313016f4586243c7c2b79a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55628c7a16d753c955cd5647b2db785b8
SHA1d90886b4657c30686de837aa7a20af32732d0a6f
SHA256f5347781a4982a806e80605378aaaeeef2c00838e7861ba442138af8ede3f75b
SHA5123da30db8148d2e0e217468c1b9505a4d4c874353b2eec947fa73a4b87404d90089b676084611b480610775943756eaf36121e54ea19c66fb7b17e845c7754e21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b24d5659a1a36e4206e2cae2d1e53585
SHA198c8baeb8258df760f94862a30fada0ef2e2c1a4
SHA2565059e32648b76d38ed904e1f0c11844ac7eb697d2bfe68f90d37c838a330bed7
SHA5127a925c23295f2d5a32401e59b769c29527d2f49fe70be4a75521e09dfd94f54d3fb8b25cfbb6c383c58c81a882b148834b27c37f256bfbdec5cfd23ef06dcfc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56941dc18e7af46e8233fd47e2622e408
SHA1f23726e63028978b083e4ea0564a6baae32f7cff
SHA2560becb6d521d7fbd10c4737774513156f0b0fe5cfdd0c210f560adb527f75a4f8
SHA512a1ab1f875e90c5663ec377d47ed9a9b8bc51c7a190fa402662c0863cbc1b5ddaa0f52c289d21f1dcc54feb5d86fe2b5fb3eed99e4b1309e5073e7091348aaa5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558517ef638819bf940735c7322e84f1a
SHA1cde96e46f80c2418b71bce377ac25d7347b99701
SHA256dd1bdc7d32d50f027666db6125da0416618d56dba957bfbc6a4ca51bb2f82b06
SHA512f0a2d107ac92399a5d6f985d6050b95d22335ad496f05dc666d7b04d7dcf05edca1c876ed6f88abc90bb7eda7377f86c57e479145d3d3da5e97e65cf225b19f2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63