Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 08:53
Static task
static1
Behavioral task
behavioral1
Sample
b70513f22058b42f86eaf8dd12197302.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b70513f22058b42f86eaf8dd12197302.html
Resource
win10v2004-20240226-en
General
-
Target
b70513f22058b42f86eaf8dd12197302.html
-
Size
44KB
-
MD5
b70513f22058b42f86eaf8dd12197302
-
SHA1
50db30978a1ad1a78710097656bfc1dc58745805
-
SHA256
660ccea47540b0353ca5ef96f2770e63f17a3ca72f474ee8c26ad645c12a6b16
-
SHA512
dd1317a72c9549a1dead431c85be354b7f2111d6f6db1ae6c3d60ffed5f3a37db732f42034e6b0df103ea420a556889bdf1775b3ab317f27fd0cf5fb91685d2e
-
SSDEEP
768:KOkcluTIo7ykKx/pjy/4Qj8AcLt2eBVy5Q2S5T5Zf:Dkcl9uykaWgBAch2cVy5y
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE5988D1-DB96-11EE-825B-FA5112F1BCBF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415877074" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40389cd8a36fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000dfe3839b3ea366a3d53223cc310783bb92b6349f09aa09a087bd66abc7d9d71f000000000e800000000200002000000052be04b725438b61b2f53716520dc543e232b02b4776ea0f48f3ea11ae04924a2000000074b68861dd4ffc3bdf0485c051c66f44988aca837b1a87c7a4e4b8360f5893b740000000182fee64dac08361082b5f14ebec5fdcac3b7fa09355e2d91e71c1243c24ccabe759e5b0ce2f8476e11e804d58ae84d6660f019d39de6c47a46d526d090b3656 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1928 iexplore.exe 1928 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2732 1928 iexplore.exe 28 PID 1928 wrote to memory of 2732 1928 iexplore.exe 28 PID 1928 wrote to memory of 2732 1928 iexplore.exe 28 PID 1928 wrote to memory of 2732 1928 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b70513f22058b42f86eaf8dd12197302.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558fdc783b25a685450cb6b43337079a7
SHA1f487bae048b1ff2b041223107f1078f1444bf20f
SHA2564f1f04ffcf512af5d62678f39983fc8338b74c5da9523dfd62f2f27f97848323
SHA512aa123f43b63c73934b455fe7507d46abe8ee000fd236d51e28660712676f9f35630b38587585b25efeff716a61543508067832768c429720470336c2dd3b328c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52573c0107d24ab7d3feee4471efb2c91
SHA1afbbed6784449b46b49511fee80199f8c3b47bc6
SHA256e5734a37606da2bbf09808fd12b42cf359610bc1dcf04073386f80712ab474d0
SHA512bc463d5627aa6620a1e2769ad0ea1a9550ba0191e37fc797557f5830aef02f2de639b5ac4de47c02ff4191d24bc3c4062c662b4789db07e54a8a8aafe3a3912e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576477b7239448bb47c07edce05ee1281
SHA18a95e8e3e7b3889d24e704a6207c4714031ce40f
SHA2565c59696103812c6000e9814e18898ec5ef5b7fa0a45665b57080968828e1f140
SHA51230506c218c75c50c537f57fd2a50e900d37f7b482bf94207b62fdef295212b37e8e8b5ca57acf7b3957d30779e5ddbc656f5f3d63b3a27663496fe3689a8d214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588b7c10bad69da827bc3647df6bdf574
SHA183837a5f86691462fb2857e02a4bc2bb52824d3d
SHA256071d086fe898d7a91ce21ca9cfc8d8b98e868cf54002990cb5a6a58dce35615c
SHA5124e42859cf14968ac1f03b9ca0b12941cd1a823c08539350d16ddc72dcc32c3eb52915981778a0a602066207b0148ec65099bcb3b07fc389ab50d854e1d2022a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569853415b1228a22d6cf92cc49240828
SHA16f2db45ae19f4173659617125fa9e6c5099e7974
SHA25685deb05ee8c0859497302b9a1913ec856a10f812bc4914a8d400979ec65afeec
SHA5124c937d7e110f7bf94eb9c7b1c12e3c9592cdbb23a901407e01eedd9b03d9bd5b4913feba5afcee80b59addcc772e02df713761990e4aa1c4265c44ff552b7e25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534f707d57df569a79c7f04388e319d83
SHA115d7529334843df16b4ed755cfef05cff331d345
SHA256d78886840a6ae9793de701029d4025ce9fc6c5ece6e6167a72ecc1711a90a95c
SHA5124aa4580a393af1aa5fe9dabcb56f9f411613a0caa6547ebe2ce0987c23df1fa95fb427da124bd9c3e1b7a5ae5c69f7f6475ffa78677038fe2836d38a5d6d063a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557da9ef89575f0278baff988699563f5
SHA13d5e7d6628dda3609b6ad08916cc1d6597527e28
SHA25680f3b4cc5859fd48b4b403a40585186f6fd3193e20f73986fc0831f38350e539
SHA51207446d60dbea355fdd50a97235ac860b2ce6b92eb6e4e1319468dbf959832a77fa2a0bbc8fd6d645177269bd08e1143a0e4cc1fb3e09d96074bb3b4273dd37a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0b911c440705ae984c2bc03c8bc437d
SHA13a4d8923a4124800a1ca7a0c66d9f39de08ebff8
SHA2560669036a0ad6d245179c64d1cba3e0f79e0059ff7d524a17a44dec5d07ef69ce
SHA512ffd601418a0ec4937f5c3622f93bc093b60b9f04f6e80c769a6f984bb3c5dd6d177999206ff7425bf1045d37746408c1b9987c28944914dd634b1cb9dcdf17c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e58c96ec77034ed9d270b1b46024f293
SHA12550f22bb45c7f5360cb26e50a248dd278691097
SHA256dd96f52d627b5473522af8ec163bdb97c512a3c8186ebc251e959c18dca1b901
SHA512c5b45f3d32da55e826455abd738d5745b96380ffff9e38bf6a66eaf2b015a275142395526990e00c935692df5f4173a2f1ca5e478a1323c3ad96185fff126826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c207ab2d4a39f45dee06bd29ee8e23b
SHA16cddd55a3e3a18851e060446cdc2287ef253ce8a
SHA2560678a463168bd4a0a247870c533e2391c1f9f219ca17ae99c30ab4110f1a728d
SHA5126fd7e0160db32130e47368ddc15c2247ba68c94d2d50e4954199feb0039423b31c4378f543dcba99e66b0f8d40444ce3e23c18bf7d26716dcb26f69712f3a265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dca276e3f4e00325e9316e67553c36ed
SHA11fb40b35ad63b02370bff01cf6df3eb4432901e3
SHA256d2cb0a292c1aeba6ebb411f60b5a24c61fef659bc74baf60f4d9217d8a3f08b9
SHA5127e0f039472c7ece7ebde0b1beca931f80446e3f1a9b5b25fbcadfd44438857af66017856d883d2874928f955b518de5d5efb686cf5a2c476339b4f904b17a398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb0d62a8b9ed970c45a19dfcd25f9d36
SHA151d03a1fd4b9759ff74d820d0238c0fc747a0a42
SHA2569c6353a7e4f387a982b0eb13ed4361b3d702d6ccdad08f0fdb8ae70d0573fd66
SHA5121db9cac7cefd869897ef892617a1079c7927917b89c1b79e72ccce6c26a9506e68e4cd046764485129c9353dee87bd7eb803a12825cebd932581e0cd58199766
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63