Analysis
-
max time kernel
124s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 22:53
Static task
static1
Behavioral task
behavioral1
Sample
b9de89e3c629e9dd1861914fcb2ff022.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b9de89e3c629e9dd1861914fcb2ff022.html
Resource
win10v2004-20240226-en
General
-
Target
b9de89e3c629e9dd1861914fcb2ff022.html
-
Size
15KB
-
MD5
b9de89e3c629e9dd1861914fcb2ff022
-
SHA1
364a684221b85ae4524d27db75e8783713ba9600
-
SHA256
cd0540a0ff9c0fc1e53bfedd7f6ed65014b15aa495423ff483fb7e58a48b6e13
-
SHA512
c900e2f47c390ae74a312712afeef6be422b8738609052bb27969da098c3f03873e8cbbd4b48bd0915485f1a7103c1e767542330f19cb581416892acf9798b99
-
SSDEEP
192:95ren8VwgJPuGAf/LwlLuuH8YSFv+sT2nL3Mn2PEQd0lLXalc0Dp+vfRD2qFKlT:luGAf/guo8DB+sT2L3M4d0lDaZtEfRK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40369466e270da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000088bfd328b51338cf522fe7a4d0743f8f087110071b89496d512ddaa5d5140aa7000000000e80000000020000200000007ea29db7fe74888a20921b94ee9e6e1f15eb68df657f2a72439ba97a0d3fbc6c200000006a9d34477544bb6f24f5fd541dda3dee24de79a07025b730091e74679b9a934f40000000a782f0bad46333a21ca62dd95c76702378e094341ff5e5c935d876420f5550e55eb3b27627598738e5cc116e6465ea5dbb10a6ca105e55fd3fa0487f598e0b7f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416013905" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{905ACA71-DCD5-11EE-A5A1-E299A69EE862} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2644 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2644 2120 iexplore.exe 28 PID 2120 wrote to memory of 2644 2120 iexplore.exe 28 PID 2120 wrote to memory of 2644 2120 iexplore.exe 28 PID 2120 wrote to memory of 2644 2120 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b9de89e3c629e9dd1861914fcb2ff022.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d4a253be3e72b26eae394dc4a83145f
SHA180a9e882eba6b29ecf4b62fc3cb213cc764ddd4c
SHA256e1cc5db133655e67b5c8f7f6642cbf17292b97aae1ba2a880d9757932ef62e32
SHA51204362cf079425af96806948a6074323f374a9da9709d1d8df355fa58f01cc793d3a46c3b88ffbabb730c0a65c96b7f9e4f9c893f9ca785da76c49000c45544eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db2588e29f545e9d4d90a0cf67e28272
SHA1f2669ace51864970f0fe9f9db8b86abaeee37f5d
SHA256fe552dbef70f1dd85b15edf0d8ca644145854b99461a6992d9fbeb959eebd227
SHA512c0808bb041c6ef80c6cda05ac3ba5d194f1ef7291c1549343471922445ade12e13bc8f5bda900d99e144215d7157a04edfd4e7ede7d39e1a1e3f91209704d153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5294ff48490a1aa928077ce441270e30d
SHA14de7136776cc5e99f704b32e2dda1fffc4f140d2
SHA256cec29fc289896e9a07357687ece4d8497aaa4296649a64298f31cfbebf5c80fa
SHA512539b1c4655f81e14da0b87ac46e32538d7804221bff794710697acefff31a5436d83652c00b89a7679fed717706328a3d0eb1b1203def091f497342fff887fba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5706f85a8d1d42ceb29364da7b944ddef
SHA17cd53d2a07a72614fa7062b22a88c5a7a472c52c
SHA256f879419589129c460db22470a3ddf466c6267b4eb90cc4662db1b408688349da
SHA5129caa7ed328f1cfe11605bbd5a2f35fa696518ac5710028b28ddff8bd2dbab8bbb9bd2f9b9a5a36912ed6944ee206669026a90b7fb18dc966abbbab0f9bf5cafd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4fc2f11e5c9ffce4fe64a943cef9659
SHA121feed029de1b5fd7e69a1240d60a97ea304da42
SHA2563380181b0ba930e0eaa88b5bc10ee8733d7429d7c84c0ddab087327f3a8d0496
SHA512a9da8045c70d7d6e870f1c088d13382081d5e93b2b6faba9a728bb2a3c7752ba42a5b8f238b2dd87c2c479da0eb3dd1ff9b37c823657153f8176d8ad0e12edf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e0f727972151542a6beeda9265d31fa
SHA129d2811e81c9bccf7c2a6a72719c1e633ad0f1e4
SHA2569f81a66f29aa511e5689b909bcdbc86d68dd2b8b9f1e233d78a3a902f80d547d
SHA512534ecc313015cf886669335be894ee7e6a4be374c9f0a5ce7edc5dee40e5fc21bed330ffc9f01306a8589b61c243f794a03995968b6ccaba76204eac9205ce86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bff7480888eb6bbee0dec2fcb84152c
SHA1fa389964211d733a6ed4f4e9f67f08aae8b4a661
SHA256c99e052acd13ccb793a586ecb3f7299d9e6b0f6b885490b36c13f7b41af4d019
SHA512928bdd9cad234bc0277dd1db389fe3c534560f43462dd5bd6d5a2b2b9792fcef0a0edc5537466a25b52e96f3279db31fc46ab38f9480a1913027bea0e5af6ef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5618d7d4af7b9643029cf29b0d2d711f3
SHA114ae5dea316ef6df1748450935a37b299e4416ac
SHA256188f3b6d9c27b4416cb36621c3ab0102609550a713066c9424d49b24a803a929
SHA5129a91c6ddf115ea6a2af19061a9905612fe63cb072f4e5418b3e01352551ab83e9734fe99133fba9c63bb139e8e36160d9ef5f7728ec0a79f3a8a57aacb01889c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5991ba67f778a2d578a43c061aa089fb8
SHA1969c4814eb1e62a0db3a37efae27d74b27a4132a
SHA25603e623dd7b9260a57f290889d41233ef6062972e23866751288ac104c6ac113e
SHA512d87d2ee859b67e02d41016e0b251f00ccb6acb063bd63adf9ef33d7b8403e302acf175ed17532d4931eb4d1a9683f3a97d98e1071340c33d033b110c6b690bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575caa6461493b202d0f44900447b46b2
SHA11f393b9a22be309b7b52c74c2e0cdc405c14e32c
SHA2563830f36f4a9ca57a0fd4953de20317c3b67efeea8b1f9607f434d3813950d670
SHA512fe9f1ebdc3b6b2da2bd4950148ee25805c2fb826f92d099891c35622da8227705a09a4400d35e085a3522b1583d5718b30d28b51e09dc517e81ee06bc06d79f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546b546a52a649ac9abc7568479edc431
SHA126cc49b033fc30cea3b701248f83240e6d7749ac
SHA256b28470df8986f22470b2e794f44492e7ae3de1e68d81d371ea65de103d333a14
SHA512dd5df50d32ee58bbbb56621249c3c5a85637126db0140f714d1eb4ecbd8dc51d0ec1875827128babdda3120e47d269cefbb10c5cfd68b252036e9b0fabd0ed2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59604929ddb2b9f12440f7904a7a38274
SHA10661776cf194d35dcc4644af9b6f299934f296f8
SHA256f3624249bfa578c21ceffaeb8a1de7dd86b12e5fd667d2a9034a5700a2897b1a
SHA512239254ebabe0366f8091d47ff48ae48f4f0fde58f2b6919f988f4a52dbe97cea97767119f26cbf4d4db00f96d3d9d0f52a9fe5d3e83682b10cb32e8c4c24756e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538634b23309591239ae664f54d82e142
SHA154bd2c63c8db2210349271bc0dd91461bd9a7b30
SHA25668b6bb68a6a30a46260b87f63aaae6968fe6fafee992102cfdf561341a57a5ca
SHA51289a1001ddd7e1ac2dd252465ea15b0b204d5223e8496fc622ff29733c4b38a8e8c3693c0952f57de96a9cfabdcd3ed9f41fb5bdcd57acdd140ed1894ea0d1154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f4e2dd21a00101eb099063bab9ecfe7
SHA17d8c7f4f0ab21a64fb9385d4773e9db61877033e
SHA2561ae3af78ce69d7581ab32474d12e813e43a3099910378012713a70af342d4861
SHA51203ee83e7aa3820ae940175a0db777cf23737a4684ca3d72c78c670ae7aa43da924bcb02789cc97ca56acc01449a47bed79559c4199d2289ebe8428b2e62e1edf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e81e078b8fe6c974884c866618d55313
SHA13182cd36945dc5807227e7a26eb0d647a70d894a
SHA2560b193a1691c7b3d52e38734a3e676e73aeb9ce9917ce536953222b35131ffd26
SHA512a5b09d358028e69e898ca2d166187a6e1a0eabb35334e8c92b467ea94a319dd6aab29ea9f56901422e3cfea574d70083de42f03e28c3267dedd5a23eaeeaf703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53efd377866e994d9005fc1b0a693b5d6
SHA111c117c2f9c53511a7896d403e78127dd46c36e5
SHA2565ec5075805ec155614b8dc31668be151f7a5275ef413e8a8bad0b6cba99bb6d5
SHA51202dc638c382a22129dd209deaa0946f0cfe4aa8d95940c114a973cf15b481bb169b848dea356db423dfb3fd410896c3e4e002d94b43444b6e693217c565c7262
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\invoke[1].js
Filesize12KB
MD5c9c338b6c81ab7de7829cb37c7c87fbb
SHA1982e9036ca6abd5ff82801d6f3305bfe66dd2ef2
SHA256ae85874c54d480a9736764165151db438bd95bb551476118eecc6f66d73cec8c
SHA51256d25d18fe7e1282041839463834345b545ff603d74e81bb221971819b0b148486bf799fa21e571e843110c1d9f2d9047f0b13b7fe1993803d1457bd6014967a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63