Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
08-03-2024 13:21
Static task
static1
Behavioral task
behavioral1
Sample
bb5dd88573a885254267b27b1879d628.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
bb5dd88573a885254267b27b1879d628.html
Resource
win10v2004-20240226-en
General
-
Target
bb5dd88573a885254267b27b1879d628.html
-
Size
53KB
-
MD5
bb5dd88573a885254267b27b1879d628
-
SHA1
b32c88246f64f72e7ba2393e975168e9c3241f98
-
SHA256
e54239d45394e193ed0a15e5198475f3271455e802ba4237e62129e5824f0470
-
SHA512
be8eec9ce4797b0f1d6a8b5ad3d24dafd08aabd604c3ac3450d29b7278acfcfdff1c89cdc41fc38360391f4412667d3e0f17a9ade64dbe0c57143dd08ccc9d1e
-
SSDEEP
1536:CkgUiIakTqGivi+PyUErunlYK63Nj+q5VyvR0w2AzTICbbDoL/t9M/dNwIUTDmDv:CkgUiIakTqGivi+PyUErunlYK63Nj+qE
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000146b64032049492c09761209e294415e378d20142af8ca83eb694c71bc828eae000000000e800000000200002000000097840428478a9d969b2fa0ac97954a9e933d5a8479c530afcc87dc109edd9f2520000000e4de35d1f98865068a4f2eb99112530379514caa6e22371171c27321d64c795f400000005789e12d179491307716c2085485fecc359e680df11bdf3cda87daac46a8089fbeb6428b6879089808589d469f38516d07412495acd15412568ea2a0ec0083b0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D43AE851-DD4E-11EE-B33C-C2439ED6A8FF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 402659ab5b71da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416065981" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2376 3028 iexplore.exe 28 PID 3028 wrote to memory of 2376 3028 iexplore.exe 28 PID 3028 wrote to memory of 2376 3028 iexplore.exe 28 PID 3028 wrote to memory of 2376 3028 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bb5dd88573a885254267b27b1879d628.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52964c01f10a4bb2202349befa4f0b231
SHA1e25b4c2be7a138de83c25c5f1a77c18510796b6f
SHA25662397e69c9f52785fc655eeb3be2033380e1a8f3b55049cc9b0bb94cb7e2f1ad
SHA5127e18bed88c6bd6c73a10f024555117d09c5b3dc7535fb5b0c795cf048102c96f93a9c8128285b8c0c554e5708c2f49b6e75674ed8ba5f32734cf0c870c74de04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bc42d730fe7c53e6653cf4b1ca482e4
SHA160fec4e21474b6c60703f1c3918a599cf94115c0
SHA2560179ac85a741dc261d2ed96efc61b0d417921ce00704efcafcf36c23f537e70d
SHA51288c0f139018521e863dec3f8ae304669550c07d8c2d7cb05592a9cf9a2ee38dbd977729af14cb9674611585ed9e101eff805b25f96d14e110ab45e2716de270e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a06077e0201e2fe6347691e38a29e1cf
SHA110f4638a760cd56fe238b145407621de675a936c
SHA2568a9efa77b175c8c036bc36d50a0b4b474ee55213e90896730d9a09d7c3b00fed
SHA5128e08a2fdae6f1914e8a643fbc9ea305fe792980081f6e81f956374f7adfd5732d79957b0f1b3ddd63bb2042d65051f64c95610231a572a21e8e94417894d41d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad32a4c734cf8d96c49f4e0128c5b50c
SHA14fae9b60ce5212e1966c555878907fa13f886d80
SHA256f96a3436dca0e91a25f450a90a7983c3b38d89670daccb12725220de8bfccf5b
SHA512e3feab499e77c82941be869527867f5f0617829628f6a861ca159d73a4677c1639f2f7d53485fa4947502d9f985b645718f8b1d3e0e118769a55c50b953ce6c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f9d83631fc807eddb371d1723a8cf7e
SHA1d61ef9095d3740b252f497460fae1dfe13ea5847
SHA25608ad41159db521d6a412195519aec9c77c859fa0901aa6422acd08d81033d3a0
SHA512bdecb83e01a739b52a5ad0dce6207d505ab6a07101c84bd5589aeb16a936611ffe48aa801083caba4ebf9da8bc955d81cd5c6e3852589d6ebe7ecc9976ee7e22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555ae56a4e3d7e464cef3763de196cdba
SHA13709b8e339a2922142ba85f7e5db89c0000798e3
SHA2567b44a859574326686f842d101c6d4e76a75858eac7d2456466c3b8c9011dde7b
SHA51272536766e94a20b581b740a44fb59f559ce7db1328b5bd5642386490cb1cb299df30a33eea0047a76b4f049a5aef2a79d5debe82512071a510efcbacd7198b34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea7ef52c053af369af111ec05e86c736
SHA1d467f47727d35ce6a66cbe0b76bcd7d77cd7bfb7
SHA2569e8654d84c9add0a04c36b18f37cb603bbaf33e29cbcaefb888a5abc4e7eda65
SHA512947abb9d98e1ffae6fb00e9b0f2740b7574f4fb40736e3894c408df02c6261c184fd70cd606fcc1d3637f2f6b18d372f92c2e23e713db8a234fa45bcd9cc82f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565c98f919fc16860a44bf68eea12626c
SHA1c7231cbf4fcaf30f248fb31145b3f4c0b3be8545
SHA256d1b59bc4a3fdc9c1220b730780bb39f53cdb9753cbc743cebb3be2f912fa2ec6
SHA51287575e288d8fe61745f1ed6b6cb839b592c7b28fba72aaeb355b0d5fe54a3b26856f5038a4eda2c074c575f22ae739a12fb1e1a2d36df0948221883b2ad6ae51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dc4845ad6e8b515af99a28eaea0b8ca
SHA1cc76f19ea79c7f523684a66d39e718a953bfe365
SHA25622607a51fc94d02bdd26d0818930678cb050c3c69eaaec898f58b61388331963
SHA512d9d6e3fb2711407bf5434cae7cb4acdb6612b1459eb6be539a587d87e80ce308a9f0539da905fae6d4ba05c735eea4377ab8747d6a05a3ce17da5b891ece32ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5475db242f2120fb9603ac10d73a64247
SHA1596338dd8ee812445707b5a987f7e01e4e5d277a
SHA256f8a160fc6f0753fb7555dd6f1f282e243ec2256d99c656e75e6ef7f0127c3cb9
SHA512a242d89f9c2670c667605d06aa2d55b8a38ba45983313d5b89944672c743a7846f2a2dc1c4aeab0c1ca31c86efedc583f5ddb64ff2ba4a32637e47aa9ffed01c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec51babd3db95534b80c063933fb9ccc
SHA10b35e55b21b32cf2770f0e6ee38258b547017172
SHA256ce1a0477f346442922557559a76df9d1612fb1814bd9752446d5e694f6a7a4cb
SHA5122d7f85f32d5ca0a37edcddd166ee097bddf6e921654b8512a21a03b3d4319cadd59cc28de17a5db3fe9ffce5c8a184c77c31af6ee0902bfe3675d81e3337acfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541987cc6c7afa7fe8c73d4242e4303bc
SHA11b8425ce943e38fd79b5991e4c05cfd3e33aca8a
SHA2561cf54e979a1e773053638f8f8746e9167606e4322e5d45f79ff8ae94ef42bb66
SHA5121927413b422ffa115ed8c69ab9453e216142a32332a088dcdeddc9a30c504e583efc2662ebb2204b7c21a01bd1df4c4cdaa927edae3a62940a21f8ea4d9d7e49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530ec1c81c329849deb49dd8e97d75f87
SHA1279b4138bc910e55d6b9bc3e4e270d4e9c7c9182
SHA256ce92b7f63f0cb6b5cd203090c64178678ecbdec8931d914caad4bf7b42786483
SHA5125cfc476d08b3150f400509df7e74f1c6aeb1fb9895a17f736c247b6027f070e7e2c07eeecde79809cc6e6212ce97b066a762f129bfa116cea520d82794ce17ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffab0673f2b44bc48ced3744c6bfa71f
SHA16dc9d216abc2f462a3ac050606ff0ec4b0b05593
SHA2568c82014d24af6bc6d19915e513be5a72599ddf299e6473d74fd44565cc7e3b4c
SHA5123fbc68a0d80a7d6c66c4ac5f65ee0754dcd2286019a254fe45238b03fbcdf9ad486c792138d5f8166c15691f07296f328cad5ac0c0ef80fab5abaa6cecfe2e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa45b61fe0363c8bbea251840a963afa
SHA1fa766a736042e959eb067469e02e1c89b25d97de
SHA256b2cb7d7202125cc6ab3644c0944ee5ef1cab9f814980ee660ac96aae0f681dd1
SHA5121af3228b677bd26ce223a679b5e828d2e732e253ea90ee69f13c15ce896756fffb34c4a3165028030b4266a9ef2465dac0039919da3ae550fb61a76e9f78e1d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb82c2b2609a026fe5b2a53f2bfbd501
SHA19f52ddbc7b1cf7525a1caf6e2449e5ba2d8bf5d6
SHA256b4845fa8d09d229b32a5dbefbc6709762d05ac8b0c92726194b6199fb829ee4b
SHA5124d5dc601f0cdf4556adcf7e765c217c1cc637394232f135e0ddd49dc36e94ec572d2c4f9576e6973ea2dced7f1bd1cfb7018c4361b937c7e6f7019a82eff55fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fc9b47171a40a7e0695f2b6c5a820b5
SHA107ed68a6f60cbafef540726913626e27d1e2e2b2
SHA25698b942c370bcfa081159dc190d0933bc9281976b6d3e0f1373a631f9baff85bc
SHA512da3238d91404c7fd3f8dbfe64f80c578245e0f626ee9e621125def7186a29bef3da861a1ee0497efc834a4e3f9b73325b0f1d2fe15c520d096645b13c2b3861e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OOWQLMJV\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63