Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
b7327c56f8d69012b1ff18d0b3e953b0.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b7327c56f8d69012b1ff18d0b3e953b0.html
Resource
win10v2004-20240226-en
General
-
Target
b7327c56f8d69012b1ff18d0b3e953b0.html
-
Size
430B
-
MD5
b7327c56f8d69012b1ff18d0b3e953b0
-
SHA1
47c89e295fcb1894f475268fe52c6d62c5582795
-
SHA256
e6461453ce60d4f1f1b81e8b3f6f6b5b267f4c2101512bd3ba69ad14643f224f
-
SHA512
fef84459680c57e4fae85103e71a1e7828e1da6d01b8c9e6dee18c52a2a0f1b01df0b4d5590f543a91ca2dbb7e8c1de55136b2e8e2a83c452b543ca3272d1fee
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 403c3349b16fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{83862C41-DBA4-11EE-AAE3-46DB0C2B2B48} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000045c663eaffdfb8ef060c28dc4a0b5ddd5f1194b399cdd6b239e3e7efe3dda12f000000000e8000000002000020000000e33f9a1040591b93c8a742dd5abe621b8bf863761f0a95c5bc4ed3613e8e179c20000000b0691152b040e3bad71af8ec14f1b51c07c7560be730fddcf074543e93b5d67840000000de902050e06024491d5cc7884d3c445f50363884ab5d9254f7cf46951ce5b018c2939a89e801558f3f07866545d8ac027389093ede1e59b29f48a07e336fc494 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415882884" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 1976 1740 iexplore.exe 28 PID 1740 wrote to memory of 1976 1740 iexplore.exe 28 PID 1740 wrote to memory of 1976 1740 iexplore.exe 28 PID 1740 wrote to memory of 1976 1740 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b7327c56f8d69012b1ff18d0b3e953b0.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0df47b6c59ad89c053fd57dc23c1535
SHA139406bb850b6ef1d2cad7c8b1a443f095eb9bbc5
SHA25680cf2715fd0a4bcab5314208fbed20ec29f8d8fc49bb7a233dd950b6e9bd6349
SHA512bf5d23ded54494102c16da8ec64c582dc2bc74fda1fefca37cf1df054c8b72801940a5345547ed130ec5485218880671894fc97b1a8d672f3111627dae04e6e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545c1b8433279cc9a877ff7160d534345
SHA1fa737f47baee4e96aca550115e3b6112387c6d0e
SHA2565719c29a0af679c78ac5adfa582f8acd397ca0e84a8072c562792bdd0742fc24
SHA5125f3946a49b6f03cc12440b0f679bae7caae5a12c2045493e8dbe2bcd34e0aba8cc385cf01fddb4e1960e3a35a844d352b427f03bdd9b548c58a8935c40c29d67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a37555a41b6efb6bae3319bfc4cc821
SHA1de30d1e2be912aaa6d440e9214199fc60b25be52
SHA25669c1251fc43e8a299b8a3a55f8ce25d07f5a1b9afa33a4b881dd353dd4ab383f
SHA5121fa79d2e7ce7b44633295b6f4eccb82c60dd74e99942eaaaf97d9935a26afdaa498542eaa3759aa7f35deb2b2240dd76d9692a7301fa9864a5b5b4d8063885e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eafc96e708c2d2a8ee320c866aef3af7
SHA1e8ff246f3dbd4a31ab2b5136a2e7e0fc2c9fe4d2
SHA256b76cfc43c301d2d78982685678601e9a5f1ec7a2841a6ba2ad454d04952548d0
SHA5125faf59fb9ced0174924c51d92957b63a11579451762edd74d4bf8c821e0b1b1e30a68afc66c03c9e2fa94de5706bb3360cd20d64659db8d565c5524d000ec851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a29cd714a9b00a9f2262ba788cef31e
SHA147292ae2521904150d772969ab885408abe34c2e
SHA256d5c334707df7ef3fb15d41edeaae0a34630579261756ba5445f3a1f0721a61cd
SHA5128e7f09d504cf8e56ebb136913cbae6110c8dcbbbba91c9458a3704dc1aac662d3087159dfc39daf0f2d8f328b9bebfa4576283fad331ba0a67ae5c89d9d2348e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57900d99299c026c86e356edd41f2b16e
SHA1781e0d5d4b2fce97649021f94fb579fa59e25db1
SHA256876fe2641222f694b9614dd3a72aa9840c2ea71f30074af02d6360cf7b0c251d
SHA5120efe31044f84b189dc619d80ba2635c2ab9966a69a1a7f2b5a4875984bff8c7608469fe2db544517bcdf7cc2940c0b572568a99e364bf278e3bd5dca0d399776
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cd2c62080f7b76cb7bf2d618556dbfc
SHA19da494e3583cf561dda3a884d15fd1c3588a0f32
SHA25690448cbd9e5049a78c605949bebd7910d664a5d0463a26d4c5522b3548d11862
SHA512eef430fea907385b219bd26e50bee8d03640de4509b4cdaa944befcadb2944db8951b30666261119bfbec998c29b3da7bd5697c86f6567669b4f64b4a4e648b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53925144c832cbe07b9e6fa3c3da6a201
SHA1fe623f4e71470e3301cf28534dc21b2554972aca
SHA256a9f0a2e0043181204377c17baa6ec39cbb2d09bab9c3812ac4f85e2600454f53
SHA5124f6cfccf428256285a3d9c4f30cd331039eb6bb0c4892b7d08e15e091faca64d3f1105c5305613b1ae6789324af73dd4a91a4d07e4fbed772f9cee7174a0762a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5801163614da63cc6063519996c815879
SHA1aea5a1ed1ea7e39560a9b011402c66c957d3b1f8
SHA25604901fac90d27c40663e7084ff103d1246db71f4b16a87eb7a218c5a076c48d9
SHA512ef25d88c849490de70348de3a5657a4168a5ed78e7cb00b906537be8ac7b1886be05fe9ad79ee825eeefe2acc72ae82526e40147667661efe19377ead93b8ec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a62c190e60595e58806609b829a0a3ba
SHA1b16cd3f76bccdd60dab7aa592e2bf811b7e358d9
SHA2560c0df63ad75f260891b454c6f3e5e1ea8ed4108e0dbca26d11860c36b7cbc3ac
SHA5128a4fe8ea178744765bcadaf8ae623eb620fc11e65bff0282bd96ca83799d0d5b22bb34a02f865bd6109df150e31d802b0971e6e15d20dd9fd8393724dcc19f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c9b5e393eeadeb68983e6d4e89ffaef
SHA18268869a34641d66f3402a6f7daec327519869c0
SHA256c5c69b2122ec228bb59d6ec27a74297470a66f6f8e43cdc86046a0534493fefd
SHA5121d0468d0e9450377219910ff3ee44a99ae66be76bfb1145ad2e1dc5ddfed394844a5ac11bffbe0c887c0c400b6fe2e98e3164704643c9717e51f9dab0cae1b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a3fa8c7fd560f06b91193f82c54f35e
SHA1aff17eccd1c0f9edc3f280f1343c437bd658fa3a
SHA256266cf517b8758af906569f0e60548fe1f7189a206530479b1a154148dfba820e
SHA5125e6dec1e445afbbc45b96977fa692c1f57432e9e1bf89d8e8a7ac23413bcf276e7b848bcd15d11b33d8a9bfc1537c4e90f01d9685fae31a4a61e4a8fbf106578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fb907d66688b1ab8ffb7261810556df
SHA18f4975e495ab9a735c42fcfeb0bdf3fe1d79e7b6
SHA2563ea395d9ad7862d541b4ccaaf147aeaf5f9ac1b364a833389ac85309419e2c38
SHA5123a6edce54688da503a3aa6728e7066feb82fa36c76d1390fe3e0f1f891c102de92861e44b4b0a660ffa613bf159b3ccac8e6453b8ad70435b0bf12a71051f4de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572789ace701ca3bdce147ceff5bd1635
SHA163de58dfabc2be5c47bdabb61aecdef1afd73652
SHA256f78e7884243892af9de9c7791b4772c91e0b651f76856a772637b078a705bbd4
SHA512c0b0d32f66f2c9ce1e0feba228e95b91431b93a6c68f3b93586c46d6d0d1114232f76b3fed5ea318fab0a4482433796538cd7271baf50474400d2509f460a945
-
Filesize
1KB
MD564a8cbb10f9e08de3aab1800b004c7c1
SHA1a9c3dc9466d60052694332836b5c5d4220f84994
SHA256fe97580227198fe786b92e73c61c9d05c5aeab13e62c53034252f9e99c386db3
SHA512e7737b8bbe8d1c3d5ae96d2452fc90fb8b55e257934ff9389169f707d2747be10af55ae2d4ea5f9981c578b1fb740e38f30402ac3d9f9db6e25ebf1bce04792d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I819HQXH\favicon[1].ico
Filesize1KB
MD591abe01116ab422c598e9c8af72cf4da
SHA10f2815fe8e067d48537ad168225ab4674271fa27
SHA256b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc
SHA512a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63