Analysis
-
max time kernel
143s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-03-2024 17:04
Static task
static1
Behavioral task
behavioral1
Sample
b7ec0afc51d665c5baab7bfd44beae0e.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b7ec0afc51d665c5baab7bfd44beae0e.html
Resource
win10v2004-20240226-en
General
-
Target
b7ec0afc51d665c5baab7bfd44beae0e.html
-
Size
4KB
-
MD5
b7ec0afc51d665c5baab7bfd44beae0e
-
SHA1
f352761473d120ee6656010328f6ab6ba4faa30b
-
SHA256
ed6a9b781468a7be742ce75d9b28d051f5d802f6962cd42135228430ae5940ab
-
SHA512
538fc88afe72d091e404e18d1c7c3b39b4baea1fb7dcd2344c40e9acb34f1afbde293908448b5fbf516d7ef7c31b638d363a4e40bedd4892d66ceebd6dd7c863
-
SSDEEP
48:c8UfdvyMFr3j/9jJMmizqF/37ZDFQiCtOBPSo4XugJASRBxrusz4LO7S/kmpnyY:C3j/9937ZDFQ4BSufS5rJw7f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AD700301-DBDB-11EE-BBB0-CEEE273A2359} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ffebb09deeb747419e902f1accea58f700000000020000000000106600000001000020000000d73ad8342516b351f4f7723badd117c34b0c79fa0951b50adf5fa0d2a926c933000000000e80000000020000200000008213d893e768c4e9afe7451ab873fac3803069c43bd1fbeefeabbcdb2c30517820000000ab1825439efefb75faf5804c4590bad475ba1c62f6d6b6bb557f923e83c4d6c64000000051d993f54213df7db5acbab456557a985f60e7ca87f90112344e651c741c41e5ad63b73308e78a2cb7abc054eb751d0575c485df42ae69d98dd3567681c4d08e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415906576" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0d72183e86fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2592 2072 iexplore.exe 28 PID 2072 wrote to memory of 2592 2072 iexplore.exe 28 PID 2072 wrote to memory of 2592 2072 iexplore.exe 28 PID 2072 wrote to memory of 2592 2072 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b7ec0afc51d665c5baab7bfd44beae0e.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b39cb4bd564e5b82b25d439e4da862a1
SHA148200712fa4c83c338fe837b70de9d78125aecd4
SHA256abafd8213c8887428f4244795983303692d31400b1e191b9d7d5263eab3848c4
SHA512044b38ef12ccc13a54609df61f7caca98ce2004dae49f0ed3440decfd60bb5a53bee8fa96decf1eb078491abff0542d36b1c1d2540cd025fe43767ef7fdaa13a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5177f18be0b0733e727bea875211e7d09
SHA1d91f422ec6023a864ce219a91399ab588b1ef3e1
SHA256bf6f895008e1488ad5f9f8b7ccf94f190bc1021aeaf0f6245c9e2a34d5f1d3b2
SHA512fc5e1aa8c3d2b6ef1bba722f758e153beb698c701dc983d853f245b99772e2d5db19e80c31dba9a24fa7c7de981b6f55f943d8805bcd6fcc755c886bb03a3acf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f30183791a7603ac4e4c28bf2c8014e8
SHA1a2a22115ffa2cabc60a0837d8ebd03e01440660c
SHA256309a72e75b1bc1fb9655e665e760d90f3d5e364ceb573cd5239bca793a158761
SHA51295ecd5df50856eef02ac32258026110371e713d1df95beb0525cb25a9f06cabeea1b7e2716ca0ac8b08685164cff8145c8ce37e8e3e1fbfe5c48661b90026350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544b5560f0777a1389699aa25d0f47abf
SHA1dd436daee080175d892a34cfa54a1d3821752f55
SHA256413d119f2a0b88c631097c5d039af10286dc72cba12b8f3275fc9ef06186f4e7
SHA512899ea96826f97d96e836970d7e25a82fc9fd136c850eee2f43980351fed50e6ba65bc92aab3ecaee1be93781793a1235bad79bd80add1859ad87dbc2bfa777af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538cf2def1434fc6d57ff63907a5e968a
SHA13771eaa5f5cd73c0fb3086e28f830452600f6a4d
SHA256742e10848b500eb2340c7a9584bf275e9a048ee42ba1d384abe21e7a06b31b9a
SHA51227101f6197e0427f3eeb69c1f83f603d20475d98ea48487cad3c1cfc20c70a37364d725c74318e64ddbbb6287704d5b4ef1815b054eb044a67f7e3bed3d525c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bce7484f658bb2053e2e7cb348cbd903
SHA11e0b4d5c75c15f20f7dc0fbcacc97ce048f86d0d
SHA2566889b90bf6aa331ac432414e33f714ba6543189e9fffe05f6fdf7f46850a5dba
SHA512259b8ca7ef87a880b8a3c5b23f4181978308bb3066782d92e4f94b7cf31c7ad9507a9934002058d382ff52a9618c25342373afdca8f868b9d019f8363cae5db9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591ef5970d4c6bdbac4b059e9dbf23e54
SHA16c6f9c2e17a69effc3a0a3a328daec149084f271
SHA2567f071c686c45e96d323f9439dfaf9c593b4ea35c218834ff64409addd6cc355c
SHA51206271e509788766c6b11f8ea8946f4bc5e41a54f4077bdd3d342740cc1347758e31789803a2b199703409a5272ba739b611a29d532b47d57696d9af7e64ba2b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e269bf3b3c86c999e023a62d79fb491c
SHA1501944e5328203423a960364d276f6fa3e6c44e6
SHA2564ab57d524bf9970d0c907bb7944a93f781b9120c07a4a128647a39c885cc1687
SHA5126548fbe4174517b5a16c64ae324792e1c35022c4cd76e9ca15d53eac5cff2fc8638e498c8ec5fde3f63c01166f8aebbac5268577760e0e9213e013db3617af31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5931853a8e04c71dbf31474624122eedd
SHA135f4532a45506aa58c419327c05e090f644fc54a
SHA2567148f59d980e9863c33706893e1e2fe40bb8a8726bd27298766063ec599d1675
SHA51216cf9be3a056a73acd86d87aa7550704bb8b6fed471238e510234425c48ccfba589e78f7bce03da497eec41a96fb72f98d990da815252eab51da3404a000b233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7857d826a7b1ff7daa9d7caf2928bc2
SHA1c7f3f6081e336b3d04060a6b4d8e1bfa39b86eae
SHA256b45cff1c733ee131206d454f94486f0e2ce07160cdbb23108611339f9dd5d9bf
SHA5129920b60275f14f77eb31410d7dc93cbc0244463a68e395bad086d08f939054d82eac875048bed842ebe8f2c7aec75eba773c10383a514176c6338246a5c6d2e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5600d72186042d65744f8974859a09e04
SHA1f71e0432384d524822f029a2307fcbb3812fef38
SHA256540fd22dd63e1b49e9855fda5aea2776f314d3518441af876fbae0525165c664
SHA5120942aa9774ce552215f36d5fb6ed806b8588c0c3dc5f493bfb316a1928fd31523be0048272595e3e46478d211ec9654fd559e3f831756de6a8d759f426c7238f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb816500978592c9191ab90169097cff
SHA1d3bac7b46d7dfbae20188dd0edb2b8fad9248bcb
SHA256aed94629c022cefdf523e071598df1904517504122090608013464f1c2d7b279
SHA51261c90e1ffd4251eba5a479f51d557d736db5e48f07ed33253c8c2e09e99e4b7fef652dd0461a2a265c6d37c3067ff892d557c0ceb59beb4bb34ab33bf005ca9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfacb2fb3bacbd1563077286db9633d0
SHA1f64a12c0802b4e92cbe9aff703050a6239c36500
SHA256387014f1d3a64d2198ff72fe3344c8d085adabe3e977659f4c6c547420e5fd44
SHA51281e350ea88ecc378641bc128e605cabd3a5afaa7c9192a046c4a565b43e0c425d370b536eb1272c6ee1d38d1daad554b52cab932c520e023889cccf3e3bfca41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8776d68524f522966a8c428b4a33d61
SHA1e3ced09d3c82e1faa938b905df88c53d6b503118
SHA25661a4d28cccf574a80a22ecd5d6611a0755cf6b0dd482b3567eb5b536855eac60
SHA5127767b06ed7e2c21f3d883291eae2b07c9d309d1d91e4287340e9925b21d92a0846d35a21ee213d1da4896e19af52257256b345ee70ac8b08930fbbf35f55cbbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55885aba80a025beb26bcbdf5a89576df
SHA13714cb022649a81d175a84808ff55e849b95294d
SHA256caccbba97e40b95e4898f346f5950ba3a4e9507feca2c940f573b4aec1969c1d
SHA512c1918b66f2dc8a4ef9b9c6d07a564e86ae88dc6aa09693732f4e267a866fb18abda2fdc4ba7ebe457dffe62b139801f31931104ee33cb97b516e6c89e1fa56e5
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63