Analysis
-
max time kernel
135s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 15:05
Static task
static1
Behavioral task
behavioral1
Sample
bb9054bac8bb3e08fc4d8dbe3280ea78.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bb9054bac8bb3e08fc4d8dbe3280ea78.html
Resource
win10v2004-20240226-en
General
-
Target
bb9054bac8bb3e08fc4d8dbe3280ea78.html
-
Size
3KB
-
MD5
bb9054bac8bb3e08fc4d8dbe3280ea78
-
SHA1
07576af9e039905aaf318e5cf7e1d4544c20ae37
-
SHA256
a24ea36c35174c107236ea6df4da29d838c809cc304dd662aedcdc79ecd0f06c
-
SHA512
7d066907d87ccba00501d0f260768a8ad8970cb9789f6fa7cc92546ef78db83975f38ba1e67fc5709d708e33431a4c26144d2564e26e1fd67613c4ad79f97737
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 007f0b316a71da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4EF37861-DD5D-11EE-979F-5E73522EB9B5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416072208" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94d2d3723739f48802cd6414eea5c7e00000000020000000000106600000001000020000000bccacea4238312246b24e57601bd28d0783eb748f9e2037903e73f8ca4edc85f000000000e8000000002000020000000a5fc4f66e9b9807ef83b66b1c229b657115a1085720c00a87a607b9108d431e820000000ed2cfeb8c63323ecc2ed4da29562d9fe5c841cb5611b265e9dd758cec731f9a440000000a15e6651769390e85581ad9f02c917900dac988a214a961ed2a02a0fee75cc133b6a78cb04c8b03726d0312f2d00e84ce0279f9965dc7ec6bf4a5b9f47b6e1eb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2568 2872 iexplore.exe 28 PID 2872 wrote to memory of 2568 2872 iexplore.exe 28 PID 2872 wrote to memory of 2568 2872 iexplore.exe 28 PID 2872 wrote to memory of 2568 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bb9054bac8bb3e08fc4d8dbe3280ea78.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525038180c81e1eb713f625d6c18e6631
SHA1dfbf84d389ec31542fe5c445a02621d3d4502f0f
SHA25616b3aaa0677836bd5a67d2e14aee811a05c33fa5a4c809ed31f592127cf3086a
SHA51266fdfcd8838a3304645e48f7ab7e274bb26ef78cfe9e017ee9f28668624d9162a2e96cbfefd7727ccd4d443fafeeacb9489ca5c0400765f01aed7fdf915b811e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5813ce5c77951745b691ce43ad061f6ac
SHA19ce8110a4b510f91e76abfbd30617611c402bc49
SHA25674dcd26d5ec8680d5b86339bed3edd551c3645a5f40b422cdb9739682a0fc819
SHA5128bae1ee00d9ccc12e5ad9dc4baa61b95817bfc3d0fd35dac03f7d3f500cacb21f6dbe1527f51a59583e7ed2ed2be0e25f9a050fcc1458ac8c50423389ad4bf4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c771189e7a4b05091d047814a3c2b64
SHA19218a95bca722138e3de97595ecfa198351d70e9
SHA2566140a9fc9964e10870747ffdbbe3cab9b38d91a5c46112ea2edc7f979ae102d0
SHA512d02e6f3c6c7cf1e9e781ce69fb984fd83bb7bd8d88d8fe5d51040a31ad95059df7b5945736b3625a6632af84069dee97a4e3e9623df8e3a525733c53fce1f36d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590c22b717c4e3ac87a60e51dab4cbb06
SHA11d51d273d70b561ef49963bcefaff345f4a42c31
SHA256a5574ece798d6844b8eb442433dad7c355c826bcc11cfb78f988c9622edccc14
SHA51283492de1d89d9a360661ce2fb4cad3575a0dba2093656e570f662d461a521b12f82e670d74ad98edcd2453cd841f6361fe93a25f08cd70e9e7bbdf20f8de7409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5ce20d11e6c193c6a22c81dacefdd2b
SHA1402d1f80b977e18a7ddb247610d75c3d3c179031
SHA256253c7663000647c069091af2ed829a687cf91f95d77eb310466a367ccfe638b1
SHA5124072a37841e46a0673dd2863b250bbffbe082acb2a004cab5fccf0d37faded6a68864245456f9fed2c5d313f6b055133993e2b56a731ce3168a2f2e4a95eecec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51727aa1aa611c3ddee3e4e4983f11f62
SHA1b35555addf62be4e3ee670c1a0b060fe47862b09
SHA256aebaf01b4752ac20843bb9e0c878be9ffeaaf6a6af26dda24fa7f1ac9904001b
SHA512316ac0d2024a0f189aefc86efe3f892b2620fc926da35b1d00bffb1fa73f494be6f04461ef1f378466f1ce2583bdb52dab843747b0f5aa837cceece2076aa6d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523b3dec304fc32d7b61484f48bbe087d
SHA15b3392dbb7a90a313ef982db70ddfb4d69a75f0c
SHA2568d4fb1dd1dddaae4c16c273501fa51b9bd19814861de015a32ddddd606f88c61
SHA512566f5e6398a66363accb20a854a6d999a9cf8002a2df366010990510e6e579488a8f07b539e8dfe2771099eac5f27b1aefd98a8ae2f51463187998821d92d17c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b7186cc5e9d9a697c40290f4fb032ad
SHA1aed5b058fe95108ee0fa4b7e0e09b4d10035368e
SHA2565155b3d345b8524a1e4d2ba3bb8d357a3092c4751f47957702f9289f8e1ddc22
SHA512b8155db89e88483c782b50c7e62cab75a98091ffae0f89ce69852f8dc7bbfbd1ffa3863affa93ee4c56ea03e85b1221b565df588a4bddddc46e201ff730fcfb2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63