Analysis
-
max time kernel
166s -
max time network
175s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-03-2024 13:05
Static task
static1
Behavioral task
behavioral1
Sample
bbe1575a07eb4abc0e1b06e70d753c8f.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bbe1575a07eb4abc0e1b06e70d753c8f.html
Resource
win10v2004-20240226-en
General
-
Target
bbe1575a07eb4abc0e1b06e70d753c8f.html
-
Size
2KB
-
MD5
bbe1575a07eb4abc0e1b06e70d753c8f
-
SHA1
d551ba6d524e04091186b80c2b6f2b37d21419c9
-
SHA256
b8b4027703b05a1f5fc06ab2bcf0f85a68ccaeaa8cd72fc7c8eb0f5f2f56db39
-
SHA512
8f84cbfdcef3ea271d47c1b328648b0f25a7104033d2d80d3f20f3a2a14768ed04bc3db324ab195793513bc6e6286ff61e8e1acb13277ed36bb7ec460a91dffb
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C79C5941-DE15-11EE-8B8C-DE62917EBCA6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50185ca22272da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007823eddbcee3e149bc4db86b21295af600000000020000000000106600000001000020000000b51dd68caea84f13e3873ad3c571916781e0807e3b454e5f0b27185e22b7f9dc000000000e8000000002000020000000fdd1eebcf36f9f3e57ca2c40c3d062a1a8d1f3ca345909362f31d2f4558e547020000000e4ab3978eef82a2395084e10489d4620c3fad85c710c599eee2b59e2ab214ec6400000004075de048dadd2e8784529b1ae615aa94add394edff38249ac0ce70fc9bb559673e3321e9ee4931e39228fc218b6552d97a59a1f1fe9d4c63d43318bd845fef5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416151436" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2672 iexplore.exe 2672 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2520 2672 iexplore.exe 28 PID 2672 wrote to memory of 2520 2672 iexplore.exe 28 PID 2672 wrote to memory of 2520 2672 iexplore.exe 28 PID 2672 wrote to memory of 2520 2672 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bbe1575a07eb4abc0e1b06e70d753c8f.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a0ae964f0112559f689fba63d7148c6
SHA17dad5bfe28698339682cf06b6f602e50fd8a3e01
SHA256eeae68230968e25235b0e7bc076889f1f8c8804f9f48301074c38139846d1aec
SHA512bacc0b6a69f73a0c6c0e15d3c7a120d0343328278177ebe003439cefb5e0a3f048b668aef3a8fbb78b9c2b270a028e8d7507233b6314170b849c9c83e2e4ef4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa944ab080986068a2fd3c0d155a846e
SHA1c9294347a25c07170f3ee3bb116327356e6e989e
SHA2566992973bcf22160c9e2c8f3a177b0955a8994e6c6058e7415d0e73ba79b56044
SHA512f22bb1e10957f35cb43fd9726449a933c06fdccd19e5a90bd5e559fcf754b5da0aaf78c1e01f9d90ab832a03351d467e39a6724637f735de1903f9c5c5e14f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be576de264e93dee88b306fe14c562e0
SHA1187f8a3e0aa13b28240977eb18b7d03068e1cf57
SHA256af2676a1cdf86f6545623b4e0419f18b3b5218561b225d9d216f25f861ce0bf2
SHA512aae1d1e6db9e7e6f16d384a5395643efe7e277b1d0d2425b4985914655d40fa29a8a86b1dedb0052a85e090b8de01fe7047411701da90ee3734ea1ac5bb2931d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5382c1c45b87d4fb1097e903f56af997d
SHA1262807dc1447ff01fdd3b9292e501ad596867f7e
SHA256bf4e470415d92ce8198e1649680f95150d44bdb17b859177473d40f069e6afe1
SHA512dc5231e37b175a63a4b6c1a702045b1f52bbd45c86f9e5e943a64376f372edd2e20790bb44f1ef37a3bc0c8676f37c443823881669152d7d0af93f9c78cfb41f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de1c904f92d6d2a9fa8fbb05e09e8b70
SHA1682a2c703a2e51723dcfd29d907cb68e87ce7653
SHA256f2a2b87717f06f70d9af2090d61c67b3622773fddf0df2a684773ae49fd29488
SHA512cc5581bad455d53f0aee035c113bf8d1f17930a7ea4d63ebfee34420868e4b1909daf36dced6d4a87b0aa8889a0f15dd93d370199afb59dd67765c44f702a792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b86ee9f77f16e8fd48d3711a013a7b49
SHA15da153042bd0eecc1113104f3efdd50d0eab9ba6
SHA256c8cdb01572c2ad511d668675124a421b8b68ca455489d42994e0196dde35a43f
SHA512f82da0d8980014d1efeac6ec4123368f2be1cf3d70dbf1573fb73395865e7b0f662949188c62d5b5d36bfd5732bc81d525a0b8f49cf2d4886cf06806a8f0799b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59efd1c2a0f9913597456bd90fe7c588b
SHA1434c8f4d9b6e32b59f8a56e0966ded5e1a1e0bfd
SHA256da5ca4105b2ea9a981d1e87c407363b21639de419f9dff24d33d3341fba7fa09
SHA512aecc88f22558361ffb67b4eb55927c5db9846a7a258999ab70fa0a5620fa24499a622181693df9e70d3d906ec5981271c91993880086d88e583b38016865a443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5425f29f51b67be9a4acc64bfdbe86913
SHA130846b3d6a5e8a2bf74a6bcc05de27c3162cf0cf
SHA25663c23d7a9a514225db26bcc4f4adcbdcac62087f444dfb47b830b6e53bd267a4
SHA512e5169673816585caca9018e29fa4f6371eaca553172e12a268f63e2fc2697bc0ef22299711a4efb4f5eed0f4482d3e68a1b4d7b32d5f4f82af483ce02cb93615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c75d9e8bd6237361ca05017360739fe0
SHA1497ea7b376faa784752ae9c03c8cb707e2747a9d
SHA256aad026e3a5191d5ee84f8821f1e8b4f12f27eb2686a3248b5deb2e13c3e53bf6
SHA5129b8a8b7503c15416a49b7ac70103f836f19aaa637d5cda13933bb6100a3fe91a898e308761d55ab1e949d822c3aed6dd2747183d2cb5ade4bb85c20f23496b8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5911e900cec24c299888fffeb1e57b112
SHA1047e09c7cadbac80a0f9cf7dd3fd9d17ab474fee
SHA256a2c61b678dbb03951d028ccf74ff2fc47c4bc183e6ee46e5e50744292010fb21
SHA5129c87e5eaa6d09659af6b684565f54cb41d9373cd9ae6403a65e0d084e5143f9c645f9c77a7c53e4f8fa08cdefeece0618dba984b4527602f4f057dfd5f016c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f138b77fb0d343d7a857e15bb5f285d
SHA188e9eb67cc98046a7e78f4ad2b54ed52f2af9d1a
SHA256f3c36f5d45a08b2e74709431253d49cd623221a55aaea34c2e4be79725f8aa12
SHA512a0c302e03db001153858f17fbae3564d4d2b94d662725f9d0a762b7b1a207ec679ce2c790dc6e02a018b11797d8c253951686b4b9cccb49b0abaaeb927b4ff5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edaffd62cfd7a25e96bf7d84f0a236c1
SHA1ce5adf8820fa585ef410adb2b248c69b187072e5
SHA25612ffbcfb67a72e13f20499ce69e618d6cc5e98dd0338fd85146c07b302bed107
SHA512f25c8866118bf6f60a6935b4a41f2d6a694d99107093500679188c6da93b90db9af4b82ae2b4bd106a3260a3c5c15e6efc93cb6fbbcb41bb21bc830133fbce07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585631ed286208acdc8371bcbbc477216
SHA127c89ca54fb4af017cc0b21b0f3e4346192d4601
SHA2566d5812c757311f5b0eca59b446b72286483712ba85a97144dbe31ce232e1c12c
SHA512c317a2a5a2c655d551208f04ce8bc3e5b4e4b6cfa3a79df1eee3739a8d464055b36b0b88dfb64133ea54569ec371b8caf2097b70cd79790469b295998912cf2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae40d53c4569022871b92b2aa0de3e82
SHA17488b499d57cb49f9751b47ae714816ecce08a2f
SHA2565f14dbe3de091717e77f60b29b675109b4ced1f7d48159495b9873558250b790
SHA5129e37032902f95c2f904f375ed53adaf4d44b384e39ca2b2ae6a7ef5936f37a295011006266d72331c52062949103c17c78a8baf58adf68bb9366006f26bc0882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526684813356ec8be98ad67b82b8ffbd3
SHA1bce880f0975cfcc88e31f02904a2cb2d6d3f29cb
SHA2568d88d18127644c7cafa596ee1f200af89decb9d7121f165ea046095125e76b1c
SHA5120f07c0917490f83b2202bcef99677304121725ebe6db62a66ae0a6d60c7974e786a9aa3deb760bd762820f046b87ea60b2886cd55d5bc8ebc8fb2d91d404761c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5136ea6c65b24b0a7648484e020e4eeef
SHA1adfa9181d823ca93d532ef7910f72640464396e7
SHA25648e39a7c5a4b43cea1fa2829f9b73745e57f3d3fa8283f3ccea2641a1ac32a88
SHA512f2bdcc4be57b7882cf78f42abe20c35009faa8b9781d7d67628cf0d4fd349e0388da8182d315d732d0df7912d6d96a22f282c8ed1d43bcdadd8ff18b3f5aa92c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3fc42820203723d8a11edc1a76a1982
SHA10ef7fc143fe1cd32bb604c7a8d8c0e0544cf1f26
SHA256d93e174d95ed981507af7aca095025f176c15689bd1c95e2da40f29323d3d7a2
SHA512f2f84cfdea188f14dac1feb9b79d52baf23f326c40f5f6f4724c3911fd5b286da1c24edffc6bd22bf5e499022f485f6bd039a174bdaaa18bfc09bf7700776abc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63