Analysis
-
max time kernel
117s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 05:07
Static task
static1
Behavioral task
behavioral1
Sample
ba978ab3e095995567feddca8ddd506b.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ba978ab3e095995567feddca8ddd506b.html
Resource
win10v2004-20240226-en
General
-
Target
ba978ab3e095995567feddca8ddd506b.html
-
Size
53KB
-
MD5
ba978ab3e095995567feddca8ddd506b
-
SHA1
745ef78a3e3ea5e216ade0a8478e476132beb7f0
-
SHA256
e6b3a5f6555221c27b5f72a3ff13b77fff394e3ffd412214c72291e39abe38df
-
SHA512
4966c516cd33ae619a928676e97a2c1f7269a2c1bba8192a283f5e7baaffb5993aa0b001274a0590efac800be330f62e12b4112465f96ad1be8d9f9c1db38c69
-
SSDEEP
1536:CkgUiIakTqGivi+PyUErunlYT63Nj+q5Vy0R0w2AzTICbb9oc/t9M/dNwIUTDmDU:CkgUiIakTqGivi+PyUErunlYT63Nj+qh
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C7EB5931-DD09-11EE-9F86-7EEA931DE775} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416036329" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000b82fe467757aef9f2baee746628b86c87e84b7b6c13d9a8ed50894f0881732f5000000000e80000000020000200000006608546e434b48aca23a86113fa10aa1fd2fbf5b049bbaadc94a3be56581b3762000000037bc5dbebc3487f08298f9bfc4a91d4b4a64911877213bc9097a9ed56785c14240000000a13a914180bdda2409f26fb3be29b6643b1a6145a89d19ad4e8ca976f6157c6abb0645cbc650377af4195d33533bda21569ef6230dbceb4ba8d1f9d8226bf39f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f08431a01671da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 3068 2176 iexplore.exe 28 PID 2176 wrote to memory of 3068 2176 iexplore.exe 28 PID 2176 wrote to memory of 3068 2176 iexplore.exe 28 PID 2176 wrote to memory of 3068 2176 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ba978ab3e095995567feddca8ddd506b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdefae6732f2ba8cd4172f67308d241a
SHA148cc7045aa692b01f5a0d6e7175ce5cfe9ea891f
SHA256373dfa48406efdcc5f96a8d5eb070c2ebb1181f3fd3459ddb63b1063148c7a41
SHA5126c66f8b748ef43b95e948942af7c894d4139298041b6037108988b6dd578396b7a2c1b3dc8064f210cfd815e93da2c5605ee32c496c425dcf391fc3e86030368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5125671574f97ba3a29e69975e8ae8490
SHA1003933273bc1e805233ae044f7e855a95649d727
SHA256a8caa17b08d7fb52559923a3c8ff7c381888bf648714f10dcf5080a44538abf6
SHA5128a305617f722e1473169dd3979a8ec3f989ed9786afb2967e79a3c280f71a048d31787d3d375cc4f7e0f09ef242c671164457194df9dd11d11b96874841b501c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f1e0583e4b4c014c1f844b8a36b6b51
SHA1b31744f062fd4d97318c2e4d4e9f6ed83de25b95
SHA256876477c569144a51b352b49be445afaa572ac7b9df3dea51fa2fbfab7a68c9f4
SHA51295ae6b53368ca8e174383c121be21ca1063c37f523e419f6b9e811af89459677da70fb01194a5050adbd783decab0c3b5324ba8e21e2b04e5504afb5e7fb2b71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589575ad7db93085b0de4a5f7fc6c55bb
SHA1feac024a7518f13a9969629805f744bd08e9fd61
SHA256509c12915f118943fc0002b67b027feac60666d7956521ad5262e4ef6c62f933
SHA512beb138525be1fd2a8a41025756adcab31ec1f32d5bca6fd29be4aa602b0c48ce1f2152afddf7910d8fe98847ba41493ee9c0de9ea3d79a2b40b57e7b29ab6a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51180c65bc29aabc6328596b773eabb31
SHA14c49a3d8f6f857755e673af188f77cb1d60bcb20
SHA25682f9f7433d67bb27764271932ed99eb90d1ca3a44b77e6035212826d53423347
SHA5121d1b4e51f7e70335a8bf7922ac705cf198e295fb9010ecc38da2729117370294d7755a95feaca881d25a8ceb10d37e6e24e697df96485361b3052db2d3eaf991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58600f4c3bb1549153decbd84d01fbee2
SHA12b062adafc1c4904095c6254119cc53ddb2cdb67
SHA25678ae91a2f42e77e5437e504925648ce70177bec6a2cb45980c58fb46aede748b
SHA5129215496d102a0e9b9f561348cb3254d71daed9a36ce65af550bbdda72a7dd9ecaa8d7bc767cbaeea7dd57fcfdc8921e68cbbd21a149ad722814addafa2a63ec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5650ea196a24bc7ce5898fea716cb607e
SHA106b491a03e6777f74405f7e22533ec702666aa19
SHA2568fb2cfb8ab23179bfa0f303e81401e4a42df22f06654e23b6e58c2a37f025cba
SHA512258d2fa1dd57f2d37e914164e7fd00ad315804e652c5a0b5ed61c1b49b97499c4e27e0b48df987fbeeec9a390fb314d1c2feeeabab962acc16111a3d3f0cec4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fda158f7630ca3c3384f1b01a5b0d20
SHA1bc72ae84b35e95bf9577a55102b5bdf85dba48db
SHA2565cebd5f67805974e35a692173f45391d5dc7468a075f59df9da980b5fa6314bc
SHA51207839c1ebffa1e5d149f7960b28439be8792b9bd96cadbd0824f7176374c4db24df9c34a08e05988f0f77d9a7d0f69f84ec63a4af0b76ea22107f1fa8e634f71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dce865aa9083cd552fdc82470615497
SHA1b33ac3935b73274c1a3fe42900bfe57ce5e1fb37
SHA256b103a0d0a580ed1edb158cb9f339baa0955b3f16c832bda222559fb3db6d7e44
SHA512a28c84a9575daff31aa5e068e51efa34ccaef6fee6492b8ca7e4243d488cfb5a38fad1aebf8210ce6e7b34a373b6c69082f287ce497673c015bfabe9980dcdfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581b4e37e5d92bccc045e6de056ae3fbb
SHA15b3d40207407c714914ab2f4506be626ec26410d
SHA2565a56dcbc96aecb383a4c4325f86a1cdb8e4bd6b4bc5ddda6015fac5100ca2b23
SHA512598278c7edecf0fb25b8400a90a0dea851e13ca3b53b1b27424847917387b99511939834a40e22885fce5a0c998ee8e780c0d9a6b829b9adfcc1f35b8139d98b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501465b80868111c9892a7c256584d555
SHA13bcaa2312387d447ec887871dc25f72312270746
SHA256e2c6528fbe3cea9115fdc5c3afe28c83a5297781bee2fbdbe2fd716af35d991e
SHA512b82c7275a7071cb4a39890d024938a7c99f244db1b1e818239279964c7e836ef8abee2c827ae575fb233547c5b988bee659145f920f5799668d80c5b5bd08498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5058935570d0e9bfc841bdaf73a007aa9
SHA1763f5d852ab7605ed1c1fbc04669d66dad7fc2a5
SHA25668bfdc048c7a289be1064ab4e097b5a4af1740b81134f9e0186d01613fcbe806
SHA5120b0a04b967811593901abfc3da7f65f8f05540d6d276e11bfe9808e23ae84b54a68207ef82521a3fa14d19c5a049ef4c4255523f31873afb96520528050d8b31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f934777a4df49f34e072a5a93ab66ec
SHA174207e5507bf253ef744a5cac1f204636f6d65df
SHA256ca700340db848a99e0bce5eacc822f3097df5e9e9b0fe2ed2de4a559954074fd
SHA51269f342dc819025cb8dacdf9474d770c5bef27dc9881403b22312b72ec8bf8d4c9374cf551af769248fee7f30a62cc3b4663d0f3fb6e61b0e4fb4605b49e14637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508edd5e577bb626dce31fd92f1b33cc8
SHA1b9a33826005ef12b8f9457ec45c559b34abac7bf
SHA25680a467590d3eb77b6c601dd7f37b6e04700d41d48abe0cc75bd48f626e734a54
SHA5128eccce28f69ddc280ecf6bd5f43164287fd8edc261b13b6178e9d2fb54e037697c515a81d468c4846f0801a85879769f12201c8e60c63438187d5f79b9285ee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d1ac0b84685d5fa869227763e75928c
SHA132f598a92d44f8841e5eb507744647b0133be6eb
SHA256b05c68b9ba55f6abc312a1bf898614b77be05eb1f3b561cd1df7ffe0cffc684a
SHA5126303a03fb1180c46c67cc61061d68eba9fa1231c3df0b99e86a86d4ab8ffbcfa0cfcacb92c81e0a634491eb460f717b5084d2b5f5aba117673c54646654339c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b10cf324d14b6db3b5f74426531a327
SHA1ec862b2f4680140bbd35dfdcea545be9d7b3b521
SHA25619b9164e6198e694a29f3ae1342e39c083da63582194c69f8db6fc9275420846
SHA5121991c2777299e0a266908eca99f65eee5ef1d814ba001e25ed748974c736b5b2c3f51d203a7fb077b945e4faa377808660a926b00219cbd41f7ec08791644cfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e956614ca89f992f90c3d60bd49dae3d
SHA16a788ad86470082092a190d43ee208d820700c9f
SHA2569aaff534f540c332947c50aca06cd391f7dbd0361b9ed2dab21d116c89ed6d23
SHA5127cf6eff5f8d50f339d5e4c0d4c60275057a55aa6b4f98364cae81266ad6345cb6ca82705dab2dce74b9a9af53d37c7bfffc6951e4176b66db329dbe85001e2b9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4JZQ5QLK\filter[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63