Analysis
-
max time kernel
120s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
b853ec9491844d51ad7c982e6fdb31db.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b853ec9491844d51ad7c982e6fdb31db.html
Resource
win10v2004-20240226-en
General
-
Target
b853ec9491844d51ad7c982e6fdb31db.html
-
Size
432B
-
MD5
b853ec9491844d51ad7c982e6fdb31db
-
SHA1
232de41ac9933361dd0b746ad7525a1c34807477
-
SHA256
9fd2f619ac59b3bd7842a330098f7f53dde7eb3f12f279acf4423fd2309f65e4
-
SHA512
99bf0e371880ab7b0a22fb87d7d97dcbc9b5afc82b7878299eab88ca533768dad7e0f77cb340a953900ff90684f4a6b4e5648c1a5f9c8faeffe8ca92ae2f38f8
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415963355" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DC5D1E31-DC5F-11EE-A1FB-E299A69EE862} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f016d3a36c70da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000f7f4a3303210a093a099ef9b5a55b87ba1b4b158c3708a0a47130b083d2a03b5000000000e8000000002000020000000ab340b5c153b467ff8d052418b2ed5fc4cebccff1462f46939195b84a8305e8f20000000eed8f31bb99989703dd1ce92f2ff45cb18ff1fff6a01bfbd686ea1d33940c7af400000006599f335cd5dce03ac061fce126bde3d0a0716f767e035f05426671425d5b2c0ac52383267b9fbbb82ba733bf59adeb66378f19ec2bc4163c7cc8fd5d7d09a45 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2264 2380 iexplore.exe 28 PID 2380 wrote to memory of 2264 2380 iexplore.exe 28 PID 2380 wrote to memory of 2264 2380 iexplore.exe 28 PID 2380 wrote to memory of 2264 2380 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b853ec9491844d51ad7c982e6fdb31db.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa34e9c6d4cf26a87f6f1bdf6fab9796
SHA1deca82518d91f63e67a682862768fcfb171ae564
SHA256d003909fc5c5b5b324641cda7e4a86d55291471451b1f53daa173fc92de9aed8
SHA512a77f07a77aedf8f71cc6b8598e9f1ed4bf5dce82723447b9e18f1f7d759fda2af9449ae9e65d73f413a0da3e1c331424a4fb04464da6e74aaf68a656c7bf7846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abc698d9db8fc5465997bad7fcd687e8
SHA19e9923ef936ff593bc370e6836c1085da092c5b8
SHA2563978ad86ed1c489a3625092c8ad04acc44353a29525a4c34525d6bb3afd982a8
SHA51251aaf53e08882c24d387b96e3fed6a612b10ba2c59a58f89e44361b19cb35eca7589c62d991453d34e3ea23bb7fbfb1106269a35353471e7a0de0475e64d3cb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b644794601d26e43d798b119d001661
SHA125b524bbf8d34d8a818f718f568cedd573648228
SHA256606965038bd48920e99162d5b2cf46c6b9d22ad8c83447be6a7e4eba5b3da3fb
SHA512bfb628184ebb29c5d8a9eb60fa0810083b982c39f17baa5c4cba3703fb2ecb539b0e7eaf201e199e01f8fa14e9a49894c1bda0e4d2a10239441b8e67618a49ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55319864301d0b4871ba012ed4f04177a
SHA15d95783f1acb6991929f3e03a2fc470084ca62af
SHA256a35115fce1c22113d92dba4e574914f0bf98f4155950d971fb8de254b746a87e
SHA512ece21cd1adf2f29850cc235cb1d71c5225ceebc5b90b8d9544d2655a26b5a2c61a3157817fae0cef80b78e62d57186012e84b4c3fca07e1892cb7d43473e92da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514face7d39c0007830ec97af77d28dc1
SHA173be050822d583f824f74fafb86f508cdc5f0af8
SHA256453d70bc0651566febfc979d4229b634f5bed4c5a9075fef4adbc342aef08f98
SHA51272a5f34933d146b224d8c7698b66106143f38e83e806e9476e4387735b496829feeba106b5a2abb062f8fa7e0882dbe415a942909ac92886b84c339cf08b89e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7063969156f5e8447229e9d5c22d6fe
SHA187a47f1557a268212237e415eac340ceb776aa27
SHA256318a206af96e2de8bbecd29cdcb9aee778320d1a59cf06547891a40c9ed59f58
SHA51266ef7d2aeffd1685698604b322eed0803d45c14c9f8472f3efe22c9a9ce593fda04cf31a10755909e5573817b5d5f39f45e50dc49d71f59eb90abac26d3a42b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502c1e4b9571b147bd3d1dd23b8a7c1d2
SHA16a49a63e19722fb9485aafd37ab7086f7d2835fa
SHA256a0262851000b1deaabfd895201f092b951f1a95c69ad9159977f45244d0c4259
SHA5122c99061019e20004c3036d78d6c4afadba1e3d0e585a72e96b9a664a77d0758b581f6a30e6e237e8db21e46d23f82f386d07836a24674276138b9b9d83417fe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f22a850f6e72a1c6758bec6a642ec1c
SHA1561bc78d8fff42231af2a0e0847a4eb6c24954f9
SHA256e1bb2bfbb1cd7e8b3d62e1668525647d46c9df441553dae915f18d0196c16714
SHA512e359632a571b5cdc4e86fa36d3997fa84d7828ec601cfc0670bbf7b562524c25887ad1aa1469332d95d78ad5a936645cfa8f5fb8f6c64664cf0cec18d4678552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf3650d0f13fda461da30f2ed7ff6c51
SHA1bb24e763df539ae7e45cd5395388fe3c3bfc096c
SHA256a748a14af8e87a7a2939f20498b6af9304052a124ff4a2cb1b4fc2d43a8e4a64
SHA512e8c9f40bb554c98b5216d216c5a7b74d019552701a28b361f8251f5d6047b3a43432a55a2816c18fee7382e502c2f3e16141ec2f3e256368ab6c624cccad7b71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524e2d6aab1faa7cc5b5a42434272b52e
SHA13cf32cad062c393276be1264ec7d9a79ef32327f
SHA2568517bbe93e1d1532ab8a7475a7a683a25249a3ac4898a4a50d95a5a62c2a8685
SHA5122011a917d748150d842c6d2254a45a6de030edda39039c6a7309525ba57fd3ea682c5000646110bf923e7b6b5a2db2476ad1f58e8d5fefd62de09559317b8f71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5984275885a1d1006bbf14ec622d6f051
SHA1046bffdd5d891d1a721da4ea3f57dab60ef68648
SHA256aa62e981481d67774e7ebe497aad97c4166d4fc079376e69dc82f029685e5ab0
SHA5124cdcd252b34f8f8b197f90ead872fa97d397fdd8948bcbaf937b4564fa16cc80146554d4a2de1ec673f41efb9f4fb7b8ab5cc3a445f522c59a3d0c6d01ad776f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5970be0bbbf87c3e53eba29d453e0ab7e
SHA17fd731e12bb6cc1410deee1b5bb6dfcecf04e54c
SHA25654e7c5f333142b5581780910b7a022d10bba2d0e566fd6a1fdaf5512396e1ac6
SHA512f32821b31388f7a796f3520735d834cf867507791df633de7475056ca4e8f46ed8296fa0e4942e1e75d811e58d948bc37c5dd3103c53457d7eb64eab70680b94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5675ae7efc98a9e5819716596f3d43ad3
SHA1c35958402241c72bbcf20491940bb07b03d46fa5
SHA25648e20af93291701c2c34aa20600735edbd5edf3d8c39c145249c69fbd4bb5ff8
SHA512e3d42da1ef3e03f141fbb9c65785218bea10dddc44c1ccfde72f01056f0e58e2aa711e9dbbb767070654143b800c0ba1d71398cdfbe7ec9e4bf689e8e8bac41d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce716d64c2778cdb7f71e39476a0c8ff
SHA159de1a9f4288a66a1927c70a18ae0e544c54699c
SHA2568ddf50f8eacbd7af8426b1c10563eee5b35b18daf70c39bad2d86e9e92e39d39
SHA512d8e0c3e09df4ca691b1f9aa7c1134808f2d6c8abb056c6d4d7762284523ad50950d7fccbe2020891f2a4c61c5befc6ec76a4418ae4789b6006b9f4ca66fea256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7baf7fe679a694f7aef79ede558ce87
SHA12ef5052136a402f14046c7fa644e2b2d9833ed97
SHA25608309bd123f461032b24ebd51d3f4bdd72706f64cfb15e3bc127241acfc83fd3
SHA512fbb711f1ef8da93af04185fe3780dd2a5ba1bd435f770b712177a79104f3af36b104c803f860072a832892bd1616c53575df03588faf76cfa5d1f15cc104d20c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df2cb962486c913901b5451f03a6319b
SHA102f63a8dcce7cc2d679981ec2b60f5d4d8ccfca3
SHA256814c4b098b6b1081c5fea99a425f07cc5c7225adf1a465939afde10e14358209
SHA51265c34fda81c99262636d660e6ecb540d3073d4875cc7d4aa4f46cbb633e4d8344fe1faf0ffe7426615fb42edf34e219477b8e574f5bfcfacb842002974976355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cdbc06bd00c1f6405964624d8fdb3f8
SHA1fd7f719ddcdce11b2797591339027122ddb8a762
SHA256ac06ca79ba32f44f1651044d572429971078dd3d8bb36d12398724ac8c106490
SHA512c514d1e01a53b1234b23fad2f92e11f8ebfdeeab890ef0e43b42cfc87f5cb072b8882de077e065f612ada475f85fb0bc056d65062effc890a664596d947b79b8
-
Filesize
1KB
MD5d0f51e1f9e71de77e6750bb8e4a0c100
SHA1f9c94f3be2727cf83da464090df49bce2acf97e8
SHA2569695e975161be689eb64d9337ae6a324b3d060b4a8d5768876d1be48c8bedff5
SHA512344a849c4cf2da2790e1a8736ca060f0f615d0c6c1a7ac89d27c0f5ab442c91a71ad8a26f8c0350cefdcc8e6ef129aae0d3830d931e33bf4c6473438965d2d7b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\favicon[1].ico
Filesize1KB
MD591abe01116ab422c598e9c8af72cf4da
SHA10f2815fe8e067d48537ad168225ab4674271fa27
SHA256b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc
SHA512a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63